last executing test programs: 2.026995726s ago: executing program 4 (id=4222): socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xa, &(0x7f0000000300), 0xdb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2d, &(0x7f0000000040), 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xcb, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000002c0), &(0x7f0000000400), 0x8, 0xe3, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) write$cgroup_int(r1, &(0x7f0000000000)=0x2, 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x3}]}, @ptr, @restrict={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x4a}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1f, 0x1, 0x0, &(0x7f0000000200)={0x0, 0x0}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x10103) 1.513759707s ago: executing program 0 (id=4228): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8920, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00l \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r3, &(0x7f0000000d40), 0x0}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 1.454626562s ago: executing program 0 (id=4231): bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x9, 0xd, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x41100, 0x78, '\x00', 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x90) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYRESHEX], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0), 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b705000008000000c5000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000600)='GPL\x00', 0x18000000, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.426394644s ago: executing program 4 (id=4233): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x112}) (async) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000400)={0x2, &(0x7f0000000140)=[{0x20, 0x0, 0x0, 0xfffff028}, {0x6}]}) 1.295984925s ago: executing program 4 (id=4238): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000f1ffffff0000000000100000850000007b000000"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='kmem_cache_free\x00', r1}, 0x10) sendmsg$tipc(r0, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="34cbf9c55466da0eadc249236ab3cbf316717306be4c08c8c7da1f1ee04ab4b4eac14995ebdf620ff778a4e3452587e42a3c6aa1bd35dfd99f23b525893bc3b5f9f3bed1986bf8d0dddd7c5cdada611f9bf641e421ed71a842d84fa289a542f941d6e06b2b14e2a706ce30acf7d82f224f3e30cadd9d15f3dddbb29dbeb9f68fb68bedb91e0b1ef48832778fe36699c7ebf101659a8f476c4a065eac71d6d1e7fafc6f25ec2c9a8f431fe347a2d30e912c5b2397613ce784637ec71e37566eb0548b461f71028459c6f137c18737d58b56949d022bf1eaf486692bb76836a233c7879d740ad0beaf5159d3380442824f536a41bb22d08fe53952b9c6fed2605d53311c71b455655f96ea6a87e41e9211e90170b0a2b1a2098175ebcd33d517085d224122264cddadd82a3d11bc4a33ce66108b22b1abc6243d306d8f6b8a2ddb5373c190d8f859a3174a200936b079f85edcac7fc03fb993ec0ff8b83f1fd3f1b888d192d99c7ede5d381784d25410cccf1b0bf26a54f065e1e3ec59cc5704fb658fc980a0ac4287ef884ee82007554be3f1e163c81468d0c26c95e3e12393776e32800bb4f086f19080c4fca3d72e8569a5627ce98f2ae0bdb3ec42c23847d47e10b1c58da7e9cea990da842d96e3a51ed7d892f7b28a10486424a69a9109ebd4d7d5a3768400ac000a6d7556ca192e5cd45efb82001ac7b53e03036b6019a07ffb545cd3853e077f08a015f6232488c1139a9409c95ed005261e36b307406ba5714ef395129345866109341feb6c7c458ce08c147a983b46375ddb3621cee0312ba1a434bcd6081e1a8ae8b6d518988b9965faf9aff86df8173b93342cceaec357a100e59b4d66553633626b0b12e9622b8f8fdfe26545b87c57f8ce8609fb8e19b0f6d1cd64e8de85c7327f543b2f38cf3086b57f85e1aaa4add723e4bc4e3ea2c27acec1e545ae3fc870bd42422f6eaf17a1f82699c9cadf224ea1e5d1705b49118d91cc3731aeed60e41bf15a9613aeda8e63a29bc7a95b2d993d23269a310b91f69d16a71243c0f4080d3359f5ddd63c7032bef14ab25eb7df4b28b2132bcbf94a281c8f5de79885a6d679f145fca292b599bb09a1864726d86b65d4781408320b968e2224c23ce7a56d8892970043737ae47f071aaeb219716bc21e3304e301eb5cd32aea951a70621eb870214a72e6c474c3a20f5bd8e089ba16326cc9a80a1a4f5f0e8f58629e20b1c73eb8af330744b187a5cfdb410466378313700ca44eb6dcbc8f3d70f58e134202546f0b1a3b61a298f2a1184b1533bdad308fa2f960087e0f239d2ccbaee3889ddc1a2bea2183b98854d255a6f708909134fab83f42f13e7604f602e264f4a3b2b2a08c673c7ce2813218159b472d3b20ecbf26dd2f7b3ba5298a4ff7444ea0936e098c126f590b05e7697ed8a3d52ba1abc7285de2f160b9b081cb775a5ab77aad1bb98d47e3da53fc4c11d4db47de1e4e6f56ad671f5d8389b33260cc546e4f0bf34fec9b2abd209e6b89e6e381367774676ed6e6eaffe42b07241c276f3c84f17a0762de83eb769bdf28991ddbc23758f01c9ecfba4ab2ca2118fcedd7adde9ff47f643c13e3ad2f13b576985128f233e329fe269d5745cd2b30e5762452a4ff58fdec30623175f8d575ced1c43411e2869aadbe6f1e79a010bca334cb08d545bc2808f359b7777d1bb5675ee210574b9f72cdeb071e07eeaa0988086213a37a972647cf21d3a3bcbd7359da327bacad41b93c5e0e494669109dddcec781774f248f5663e4fac187d42ffccf68335de2adac4f8d3e1bf04b95a9464960186ed019773ffeda18f9827a61edc5fc4088eb0965cb1bd8af1185aa3972b8f73839b4611e303bcbc1f84a330f60fa0a7795ea3cffe0e338406533e12c7deef0b5906c513eab4619a8f02fdd65dcfb7297ef971c4601ad079f7ad38278ae3ff455b37d5492af546975535450693fd4593c8157b3fdb16fd3a106d2f1509d1c06dabb8933269d790a1c5e5f7bdd4a57e1e670d7043cfed88c365b5f8eefe530ef7da5322df981723332c088fce89c2ceee23b420f64332243b9c606d67d538810a94e0ffbd37a119d8fc4d6caec0def40e62613873c74feabde63e12cb2016c1d35cf1bb95bf59e01a63be8825cb3118b74b106f21eef5ee2f41e5fb39fdde058050f780d98ced247c66fc3a03ba04edaf14d698859ba303d511cf0845dc5e269aef2287770a247fd5ae1299b45819ff41725f9da3e4dab7770eb83992b53ae9a9de69e764f6e3aee3e27cfb1bacf531a91605894ae209da6d25872fb54bf36b2ed450b51aa8ee4875b9bc7e55753f61e12a323d301faceb2ecff0686b1359343a94774a6a098dc2df440725cd8331f527d4e22f8090d8879ef4765849705b99465d7ebdf661b81c303d13b87270dc1f227d5954fcbc93bbce6fde2a1f8d573d9cd8130c173a14706f1e9dabc4d16a5b003dd3239faf91769e25cf007b0623141e4e57f11746cd62f20d73956fa84c6a12e1756b6671a64bd7a474ba425907e1a61ba6d2ffa1149165a713a141bfec0f1af51afebdb84d5f14eb51acc284403627d6ce48fd028dc04e00ed963de37f85d155c33e2b4ceb09044c4f1c7791348216b674a8831a232a638f8bfb396fabbe1f880944bc5dcac55df8abc78f804306c88617acfd4adfbb5a055d3d3e91abb763ad84e701cc5679498e04600570f4b2e57c70542043dc590ab363215e6ab3f0bd89383748783d01c9227229edac723d4e2eaa061a44f2630691f25ca6093775183fdf432e01322203dd654b336670116a6a52a27ff2032b1103a4e4be0cc2fb05b24352d72e374e90cc3db2a5a691c7f6b8d1058d7730433c742d8ce52074318b1bce9bb104cf90c8b7f65293c2b74434661444f38d94d977e03433440517f6155a3cad2621c5502dd6148b867a40e6a40be4c8265ec2164b5257f06da1784e98991f42003ced4ba67c23b8c654b542d2d31168fd853cf56cc2c464d7a8a9fbcd2715968788f8527c597ab5f917753c1f1708d2c19972373c5a22af71847de22b9f1e9d38a04ea4dd291da3099cb836a696350bf1263c3c275c27b8b82f604625451a24490b0b5367c2fd05e699546ddf17709d2e2c2710f4361d9dd6e2de2b4353b7f4f8141f6f989dc1a798a974565978e4f9ec0c59a7dbc04bcab072c8513b9ca782c22cdd31fb116c10081740fd8f7d0cbd5c54f1069297f20b45d79bb9ace8e851a655fedf47b2dc76fd30b9ba9f09c9b50d6910ffcdec7078c36fe1e9b19dbb110197496349560a43c0ab42b4ce286643e73a92246ecb71e95ce0d54114772f8477c7d5604c1a52d2f680c5868cf08a2688dd9fef492a01836112cec824483e77da93d104a9e18d06bddf9a4007740a0537ac1a5e09900acc65d52680212a15b68b0ef887228e06f533c1ca95b8f9d81b9fc6608cb5bacf4b867922999c69d46048ec3f408866789f49fcb176fc99ed9d3e6c357ed2e3ce2665925773e5d86c2ceaf8f18519a00d9d2e19e9a6b16af0a53fd7df6974f5db00494460e7f3de6ff6b642859335e020513bb525adddabf0d7d6ae85e7e56e32ca8acc07fe86b7b445358966ba3914c1dfa7b814d9e846ff02a6a8c8f5713a0f727024b5d1ea7e4ce7c64f9b24dd3337a3df33714c5404403b0304b25a66fe3ac85083965877117b3d721e7922f0ac7e278feeb8dc09f58cbcfbb81b11d4699737f37ac240a24b9c4b2b587e68974f7ca5561856f32e389d32056f7d58e4de24c11bd5c5afaa441120370d0c48341e1b8146a6bbca8c15f23c155d2533e97a8e6496bc00533ec83be8488d020708d97385a03bcbf57cadc2c1e575e1ac134cdb5047f3f88eae0230751626cea1c85da9b74ddace668afebb2dc66d302ddf3c5f8f21ac0c0535d00839457e7cac9282a8e49d018b077e38ea512cf28eacff5d98e880abfb5af2e7c039d2e1f1edaad2642963ef29d715f754e2715caa6af046a298b285e3582d903be726b608619332e1a82be48b0f5adf6838f41ff776e5290de8269794bce8fb971267d036bd6bd30e42df918125d573ced78263251bcae2b7b40f1ba855b4f2472312ea8752c4a0e09468bd25615a6c00a9b44c484c5507b8400537f20890e9499ec94ed2b6aeff21e57c6e8a93d80097f85ac9316b03a5f768721bf7d041bb9a6a03eabd615e3c4d74f56c429d53b8fec4b5e86c5b311a6cd4a86f03e04dab25ad65b68a8b8d9053993fd2440ff2b81768213084c831d31a0f8c646aff9090b5463cbee452abd6318340ec41b50f1deba7ffb60b326751de3f6dbf9b17714299233d5c43071367ece2e53212e7f4e084fea60850d4d16908d9bbbb531fbf72143fdb62d1b40afde3d0b2ac2c94c32e456bbef62f8d677e332aec8ccc8eedbac61e7b89b32d57157a39ad5c456258d9c36db0edc82c2baead990ee78007ed89c8f450e92d5e209cc25f7c13f5909ca404fddbdbeff89cc42350c91e9f1fdf9753c6e95f71257f8cbb97838684461cd1244c938b9939a4e9c7727902b6f1a5434e0a06d3fc221771dd87572ae801c5ce6886122f0c91dae57440ffc7ace4e8e0041a1d245103aaadbfc2ecff622228daed2b0cd30f7f59b2617f6f0571ee4403d84e652d78b8e64d5450b6483ef70582dcda9351f2dddd3a4ac84f514f708d3af6242501bd041beae78e6b29b517b534148ea91ef85653fec824d6ddb0c0fa2555ab2564ba29227b1046b48a11ee0e6aafda9d0b80b0f05a8d057cbeb16264cb579aea3ba2b2000052d03c77844ab7c81be3110a36a27aeffe0ad5a8a7385a1913a64fb2db630e8fc8017828cea60f327c3a510b441d94d32584e55f7c2320d89b2ba3d44d832b8e7c5f45442de9ef37d057e6d0c6664e8d74e23f18336d41a3e38c2cda49050cb32ca7040a388c75741ac07d3befc714df35dc92ff70ad041cf17b70a971c142bb89ecfe25290750e989c8666560a61b62fdc4fadef7f30b6269a669ef99be7e7ba7ddddf99949fedc0c331796988c6eedb5c66cbe2870a2affce0b550c3411a2aaf302481ee93398c0fbc0c815cfe1e78bf8fed7f19f2c2dae17a4533aa85f6b787f8072adda379118d76dbba3cebfc4c8aacbb1f79a28ec3a0ec99816e3c8721ddcde1ce73b0704063474", 0xe24}, {0x0, 0x4000}, {0x0}, {0x0}, {&(0x7f00000020c0), 0x500}], 0x5}, 0x0) 1.294991345s ago: executing program 1 (id=4239): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8920, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00l \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r3, &(0x7f0000000d40), 0x0}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 1.270753757s ago: executing program 4 (id=4241): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='percpu_alloc_percpu\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r6}, 0x10) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000280)='sched_switch\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x18, 0x10, &(0x7f00000004c0)=@raw=[@tail_call, @map_idx={0x18, 0x1, 0x5, 0x0, 0x6}, @exit, @ldst={0x1, 0x0, 0x1, 0xd, 0x4, 0x100, 0x8}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x6}, @ldst={0x1, 0x2, 0x5, 0x0, 0xb, 0xfffffffffffffff0}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @generic={0x8, 0x2, 0x7, 0x50c, 0xa1e}], &(0x7f00000006c0)='GPL\x00', 0x0, 0x2b, &(0x7f0000000700)=""/43, 0x20800, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000bc0)={0x2, 0xa, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c00)=[r0], &(0x7f0000000c40)=[{0x3, 0x1, 0xe, 0xb}, {0x1, 0x3, 0x4, 0x1}, {0x0, 0x5, 0x8, 0xa}, {0x5, 0x1, 0xd, 0x6}, {0x4, 0x2, 0x10, 0x1}], 0x10, 0x1}, 0x90) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000008000008500000006000000957076245b9f20111b348a765ba2ccc3f79777e125b35a37a8cefcf228ccd92c431f16a44ca041d8c78cebadaabf2eccdef6e5a391e1d295edbb22671e4b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.243823019s ago: executing program 1 (id=4242): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8920, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00l \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r3, &(0x7f0000000d40), 0x0}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 1.23645278s ago: executing program 2 (id=4243): socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xa, &(0x7f0000000300), 0xdb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x2d, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xcb, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000002c0), &(0x7f0000000400), 0x8, 0xe3, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) write$cgroup_int(r1, &(0x7f0000000000)=0x2, 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x3}]}, @ptr, @restrict={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x4a}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1f, 0x1, 0x0, &(0x7f0000000200)={0x0, 0x0}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x10103) 1.129069119s ago: executing program 1 (id=4244): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) (fail_nth: 2) 1.061181414s ago: executing program 4 (id=4245): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='percpu_alloc_percpu\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r6}, 0x10) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000280)='sched_switch\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x18, 0x10, &(0x7f00000004c0)=@raw=[@tail_call, @map_idx={0x18, 0x1, 0x5, 0x0, 0x6}, @exit, @ldst={0x1, 0x0, 0x1, 0xd, 0x4, 0x100, 0x8}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x6}, @ldst={0x1, 0x2, 0x5, 0x4, 0xb, 0xfffffffffffffff0}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @generic={0x8, 0x2, 0x7, 0x50c, 0xa1e}], &(0x7f00000006c0)='GPL\x00', 0x0, 0x2b, &(0x7f0000000700)=""/43, 0x20800, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000bc0)={0x2, 0xa, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c00)=[r0], &(0x7f0000000c40)=[{0x3, 0x1, 0xe, 0xb}, {0x1, 0x3, 0x4, 0x1}, {0x0, 0x5, 0x8, 0xa}, {0x5, 0x1, 0xd, 0x6}, {0x4, 0x2, 0x10, 0x1}], 0x10, 0x1}, 0x90) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000008000008500000006000000957076245b9f20111b348a765ba2ccc3f79777e125b35a37a8cefcf228ccd92c431f16a44ca041d8c78cebadaabf2eccdef6e5a391e1d295edbb22671e4b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) 712.966922ms ago: executing program 3 (id=4246): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181200", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e408"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xd, 0x6, 0x4, 0x5, 0x0, r6}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r7, &(0x7f0000000080), 0x0}, 0x20) 654.861137ms ago: executing program 1 (id=4247): bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e63"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff020000000000000040000000000001"], 0xfdef) 654.284297ms ago: executing program 1 (id=4248): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.events\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) close(r0) (async) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x1a1282, 0x0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x1a1282, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) (async) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) write$cgroup_pid(r0, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@fwd={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x61, 0x3e]}}, &(0x7f0000000500)=""/143, 0x2b, 0x8f, 0x1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r2}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r2}, 0x10) gettid() (async) gettid() perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0x38}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x19, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x19, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x7}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000539d00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) close(r5) socketpair(0x0, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x0, 0x1, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) 646.308028ms ago: executing program 2 (id=4249): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb5a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x7, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="850000009e0000006a0a00ff000000006900080f00000000950000000000000018100000", @ANYRES32, @ANYBLOB="00000000000000000500000000000000950000000c000000"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e}, 0x2d) 627.114069ms ago: executing program 4 (id=4250): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="850000002200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r5, 0x0, 0x36, 0x0, &(0x7f00000005c0)="348b0d151f8218e2c73697e4080049c416b90900000093321cfc5e8b99025e8b9900683341b35e6d127629000e3e29968c2974f50acc", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000640)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) r7 = syz_clone(0x20004000, &(0x7f0000000280)="8080427cab8c938e60977cc4303ae67d938b44f1bb7d54ffe4f8b2c9506d8a409b23f32f1884fc693d4dc8171b22d467d7decbae4835b8435bb5e65be31eb4a0f42f42981f68c700cffb42dc586cd895be5b0740d7bc60d02977d47c779ed26db09cf2f20735ffa6cf0d79de22c606629f", 0x71, &(0x7f0000000200), &(0x7f0000000300), &(0x7f0000000340)="4e10cc5d8925c55f04cbf726cde1f557e67abce7c8366b0fcda65a07ba") perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x3, 0xff, 0x5, 0x6, 0x0, 0xae, 0x15108, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80, 0x0, @perf_config_ext={0x5}, 0x10604, 0xfffffffffffffa42, 0xe, 0x6, 0x6, 0xfffffff8, 0xd61f, 0x0, 0x3, 0x0, 0x8}, r7, 0xd, r2, 0xa3173cba2d71c7e9) 589.171512ms ago: executing program 3 (id=4251): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000f1ffffff0000000000100000850000007b000000"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='kmem_cache_free\x00', r1}, 0x10) sendmsg$tipc(r0, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="34cbf9c55466da0eadc249236ab3cbf316717306be4c08c8c7da1f1ee04ab4b4eac14995ebdf620ff778a4e3452587e42a3c6aa1bd35dfd99f23b525893bc3b5f9f3bed1986bf8d0dddd7c5cdada611f9bf641e421ed71a842d84fa289a542f941d6e06b2b14e2a706ce30acf7d82f224f3e30cadd9d15f3dddbb29dbeb9f68fb68bedb91e0b1ef48832778fe36699c7ebf101659a8f476c4a065eac71d6d1e7fafc6f25ec2c9a8f431fe347a2d30e912c5b2397613ce784637ec71e37566eb0548b461f71028459c6f137c18737d58b56949d022bf1eaf486692bb76836a233c7879d740ad0beaf5159d3380442824f536a41bb22d08fe53952b9c6fed2605d53311c71b455655f96ea6a87e41e9211e90170b0a2b1a2098175ebcd33d517085d224122264cddadd82a3d11bc4a33ce66108b22b1abc6243d306d8f6b8a2ddb5373c190d8f859a3174a200936b079f85edcac7fc03fb993ec0ff8b83f1fd3f1b888d192d99c7ede5d381784d25410cccf1b0bf26a54f065e1e3ec59cc5704fb658fc980a0ac4287ef884ee82007554be3f1e163c81468d0c26c95e3e12393776e32800bb4f086f19080c4fca3d72e8569a5627ce98f2ae0bdb3ec42c23847d47e10b1c58da7e9cea990da842d96e3a51ed7d892f7b28a10486424a69a9109ebd4d7d5a3768400ac000a6d7556ca192e5cd45efb82001ac7b53e03036b6019a07ffb545cd3853e077f08a015f6232488c1139a9409c95ed005261e36b307406ba5714ef395129345866109341feb6c7c458ce08c147a983b46375ddb3621cee0312ba1a434bcd6081e1a8ae8b6d518988b9965faf9aff86df8173b93342cceaec357a100e59b4d66553633626b0b12e9622b8f8fdfe26545b87c57f8ce8609fb8e19b0f6d1cd64e8de85c7327f543b2f38cf3086b57f85e1aaa4add723e4bc4e3ea2c27acec1e545ae3fc870bd42422f6eaf17a1f82699c9cadf224ea1e5d1705b49118d91cc3731aeed60e41bf15a9613aeda8e63a29bc7a95b2d993d23269a310b91f69d16a71243c0f4080d3359f5ddd63c7032bef14ab25eb7df4b28b2132bcbf94a281c8f5de79885a6d679f145fca292b599bb09a1864726d86b65d4781408320b968e2224c23ce7a56d8892970043737ae47f071aaeb219716bc21e3304e301eb5cd32aea951a70621eb870214a72e6c474c3a20f5bd8e089ba16326cc9a80a1a4f5f0e8f58629e20b1c73eb8af330744b187a5cfdb410466378313700ca44eb6dcbc8f3d70f58e134202546f0b1a3b61a298f2a1184b1533bdad308fa2f960087e0f239d2ccbaee3889ddc1a2bea2183b98854d255a6f708909134fab83f42f13e7604f602e264f4a3b2b2a08c673c7ce2813218159b472d3b20ecbf26dd2f7b3ba5298a4ff7444ea0936e098c126f590b05e7697ed8a3d52ba1abc7285de2f160b9b081cb775a5ab77aad1bb98d47e3da53fc4c11d4db47de1e4e6f56ad671f5d8389b33260cc546e4f0bf34fec9b2abd209e6b89e6e381367774676ed6e6eaffe42b07241c276f3c84f17a0762de83eb769bdf28991ddbc23758f01c9ecfba4ab2ca2118fcedd7adde9ff47f643c13e3ad2f13b576985128f233e329fe269d5745cd2b30e5762452a4ff58fdec30623175f8d575ced1c43411e2869aadbe6f1e79a010bca334cb08d545bc2808f359b7777d1bb5675ee210574b9f72cdeb071e07eeaa0988086213a37a972647cf21d3a3bcbd7359da327bacad41b93c5e0e494669109dddcec781774f248f5663e4fac187d42ffccf68335de2adac4f8d3e1bf04b95a9464960186ed019773ffeda18f9827a61edc5fc4088eb0965cb1bd8af1185aa3972b8f73839b4611e303bcbc1f84a330f60fa0a7795ea3cffe0e338406533e12c7deef0b5906c513eab4619a8f02fdd65dcfb7297ef971c4601ad079f7ad38278ae3ff455b37d5492af546975535450693fd4593c8157b3fdb16fd3a106d2f1509d1c06dabb8933269d790a1c5e5f7bdd4a57e1e670d7043cfed88c365b5f8eefe530ef7da5322df981723332c088fce89c2ceee23b420f64332243b9c606d67d538810a94e0ffbd37a119d8fc4d6caec0def40e62613873c74feabde63e12cb2016c1d35cf1bb95bf59e01a63be8825cb3118b74b106f21eef5ee2f41e5fb39fdde058050f780d98ced247c66fc3a03ba04edaf14d698859ba303d511cf0845dc5e269aef2287770a247fd5ae1299b45819ff41725f9da3e4dab7770eb83992b53ae9a9de69e764f6e3aee3e27cfb1bacf531a91605894ae209da6d25872fb54bf36b2ed450b51aa8ee4875b9bc7e55753f61e12a323d301faceb2ecff0686b1359343a94774a6a098dc2df440725cd8331f527d4e22f8090d8879ef4765849705b99465d7ebdf661b81c303d13b87270dc1f227d5954fcbc93bbce6fde2a1f8d573d9cd8130c173a14706f1e9dabc4d16a5b003dd3239faf91769e25cf007b0623141e4e57f11746cd62f20d73956fa84c6a12e1756b6671a64bd7a474ba425907e1a61ba6d2ffa1149165a713a141bfec0f1af51afebdb84d5f14eb51acc284403627d6ce48fd028dc04e00ed963de37f85d155c33e2b4ceb09044c4f1c7791348216b674a8831a232a638f8bfb396fabbe1f880944bc5dcac55df8abc78f804306c88617acfd4adfbb5a055d3d3e91abb763ad84e701cc5679498e04600570f4b2e57c70542043dc590ab363215e6ab3f0bd89383748783d01c9227229edac723d4e2eaa061a44f2630691f25ca6093775183fdf432e01322203dd654b336670116a6a52a27ff2032b1103a4e4be0cc2fb05b24352d72e374e90cc3db2a5a691c7f6b8d1058d7730433c742d8ce52074318b1bce9bb104cf90c8b7f65293c2b74434661444f38d94d977e03433440517f6155a3cad2621c5502dd6148b867a40e6a40be4c8265ec2164b5257f06da1784e98991f42003ced4ba67c23b8c654b542d2d31168fd853cf56cc2c464d7a8a9fbcd2715968788f8527c597ab5f917753c1f1708d2c19972373c5a22af71847de22b9f1e9d38a04ea4dd291da3099cb836a696350bf1263c3c275c27b8b82f604625451a24490b0b5367c2fd05e699546ddf17709d2e2c2710f4361d9dd6e2de2b4353b7f4f8141f6f989dc1a798a974565978e4f9ec0c59a7dbc04bcab072c8513b9ca782c22cdd31fb116c10081740fd8f7d0cbd5c54f1069297f20b45d79bb9ace8e851a655fedf47b2dc76fd30b9ba9f09c9b50d6910ffcdec7078c36fe1e9b19dbb110197496349560a43c0ab42b4ce286643e73a92246ecb71e95ce0d54114772f8477c7d5604c1a52d2f680c5868cf08a2688dd9fef492a01836112cec824483e77da93d104a9e18d06bddf9a4007740a0537ac1a5e09900acc65d52680212a15b68b0ef887228e06f533c1ca95b8f9d81b9fc6608cb5bacf4b867922999c69d46048ec3f408866789f49fcb176fc99ed9d3e6c357ed2e3ce2665925773e5d86c2ceaf8f18519a00d9d2e19e9a6b16af0a53fd7df6974f5db00494460e7f3de6ff6b642859335e020513bb525adddabf0d7d6ae85e7e56e32ca8acc07fe86b7b445358966ba3914c1dfa7b814d9e846ff02a6a8c8f5713a0f727024b5d1ea7e4ce7c64f9b24dd3337a3df33714c5404403b0304b25a66fe3ac85083965877117b3d721e7922f0ac7e278feeb8dc09f58cbcfbb81b11d4699737f37ac240a24b9c4b2b587e68974f7ca5561856f32e389d32056f7d58e4de24c11bd5c5afaa441120370d0c48341e1b8146a6bbca8c15f23c155d2533e97a8e6496bc00533ec83be8488d020708d97385a03bcbf57cadc2c1e575e1ac134cdb5047f3f88eae0230751626cea1c85da9b74ddace668afebb2dc66d302ddf3c5f8f21ac0c0535d00839457e7cac9282a8e49d018b077e38ea512cf28eacff5d98e880abfb5af2e7c039d2e1f1edaad2642963ef29d715f754e2715caa6af046a298b285e3582d903be726b608619332e1a82be48b0f5adf6838f41ff776e5290de8269794bce8fb971267d036bd6bd30e42df918125d573ced78263251bcae2b7b40f1ba855b4f2472312ea8752c4a0e09468bd25615a6c00a9b44c484c5507b8400537f20890e9499ec94ed2b6aeff21e57c6e8a93d80097f85ac9316b03a5f768721bf7d041bb9a6a03eabd615e3c4d74f56c429d53b8fec4b5e86c5b311a6cd4a86f03e04dab25ad65b68a8b8d9053993fd2440ff2b81768213084c831d31a0f8c646aff9090b5463cbee452abd6318340ec41b50f1deba7ffb60b326751de3f6dbf9b17714299233d5c43071367ece2e53212e7f4e084fea60850d4d16908d9bbbb531fbf72143fdb62d1b40afde3d0b2ac2c94c32e456bbef62f8d677e332aec8ccc8eedbac61e7b89b32d57157a39ad5c456258d9c36db0edc82c2baead990ee78007ed89c8f450e92d5e209cc25f7c13f5909ca404fddbdbeff89cc42350c91e9f1fdf9753c6e95f71257f8cbb97838684461cd1244c938b9939a4e9c7727902b6f1a5434e0a06d3fc221771dd87572ae801c5ce6886122f0c91dae57440ffc7ace4e8e0041a1d245103aaadbfc2ecff622228daed2b0cd30f7f59b2617f6f0571ee4403d84e652d78b8e64d5450b6483ef70582dcda9351f2dddd3a4ac84f514f708d3af6242501bd041beae78e6b29b517b534148ea91ef85653fec824d6ddb0c0fa2555ab2564ba29227b1046b48a11ee0e6aafda9d0b80b0f05a8d057cbeb16264cb579aea3ba2b2000052d03c77844ab7c81be3110a36a27aeffe0ad5a8a7385a1913a64fb2db630e8fc8017828cea60f327c3a510b441d94d32584e55f7c2320d89b2ba3d44d832b8e7c5f45442de9ef37d057e6d0c6664e8d74e23f18336d41a3e38c2cda49050cb32ca7040a388c75741ac07d3befc714df35dc92ff70ad041cf17b70a971c142bb89ecfe25290750e989c8666560a61b62fdc4fadef7f30b6269a669ef99be7e7ba7ddddf99949fedc0c331796988c6eedb5c66cbe2870a2affce0b550c3411a2aaf302481ee93398c0fbc0c815cfe1e78bf8fed7f19f2c2dae17a4533aa85f6b787f8072adda379118d76dbba3cebfc4c8aacbb1f79a28ec3a0ec99816e3c8721ddcde1ce73b0704063474", 0xe24}, {0x0, 0x4000}, {0x0}, {0x0}, {&(0x7f00000020c0), 0x500}], 0x5}, 0x0) 569.699484ms ago: executing program 2 (id=4252): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8920, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00l \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r3, &(0x7f0000000d40), 0x0}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 569.347114ms ago: executing program 0 (id=4253): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x5, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x48) 569.071584ms ago: executing program 3 (id=4254): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8920, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00l \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r3, &(0x7f0000000d40), 0x0}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 523.211327ms ago: executing program 2 (id=4255): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='percpu_alloc_percpu\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r6}, 0x10) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000280)='sched_switch\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x18, 0x10, &(0x7f00000004c0)=@raw=[@tail_call, @map_idx={0x18, 0x1, 0x5, 0x0, 0x6}, @exit, @ldst={0x1, 0x0, 0x1, 0xd, 0x4, 0x100, 0x8}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x6}, @ldst={0x1, 0x2, 0x5, 0x0, 0xb, 0xfffffffffffffff0}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @generic={0x8, 0x2, 0x7, 0x50c, 0xa1e}], &(0x7f00000006c0)='GPL\x00', 0x0, 0x2b, &(0x7f0000000700)=""/43, 0x20800, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000bc0)={0x2, 0xa, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c00)=[r0], &(0x7f0000000c40)=[{0x3, 0x1, 0xe, 0xb}, {0x1, 0x3, 0x4, 0x1}, {0x0, 0x5, 0x8, 0xa}, {0x5, 0x1, 0xd, 0x6}, {0x4, 0x2, 0x10, 0x1}], 0x10, 0x1}, 0x90) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000008000008500000006000000957076245b9f20111b348a765ba2ccc3f79777e125b35a37a8cefcf228ccd92c431f16a44ca041d8c78cebadaabf2eccdef6e5a391e1d295edbb22671e4b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) 522.305328ms ago: executing program 3 (id=4256): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8920, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00l \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r3, &(0x7f0000000d40), 0x0}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 496.24217ms ago: executing program 1 (id=4257): socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000140)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x86, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000003c0)='rcu_utilization\x00', r5}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r3, 0x18000000000002a0, 0xe40, 0x2e, &(0x7f0000000040)="76389e147583ddd0569ba56a655855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000340)={0x6, 0x0}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380)=r7, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001080)=ANY=[@ANYBLOB="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", @ANYRESHEX=r6], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfd9b, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x48) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a850000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='jbd2_checkpoint_stats\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)={0x0, 0x0}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) socketpair$unix(0xa, 0x2, 0x3a, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) 495.88728ms ago: executing program 0 (id=4258): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x220, 0x1}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xffd, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000e0018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000002000000000000000100000d03000000000000000366ffffffffffffff00000105000000200000000000000000000003000000000200000002000000000000000000a545b02cebf02b7a1404000000004393306cf718000000901d0f3a5563169fa01f0b4ffde6599426e8ebe37d58b616f76e1e5301f6a1e7ead0680dcb5054b03cb642afc88912b08f66bd9f8f9987edd4a5cc8e07c78bbb4f19d376f796"], 0x0, 0x56}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) close(r0) (async) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000000) 421.942706ms ago: executing program 3 (id=4259): socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xa, &(0x7f0000000300), 0xdb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x2d, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xcb, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000002c0), &(0x7f0000000400), 0x8, 0xe3, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) write$cgroup_int(r1, &(0x7f0000000000)=0x2, 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x3}]}, @ptr, @restrict={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x4a}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1f, 0x1, 0x0, &(0x7f0000000200)={0x0, 0x0}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x10103) 386.164219ms ago: executing program 2 (id=4260): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000f8ff000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000f80)=ANY=[@ANYBLOB="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"/3112], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xf, 0xf00, &(0x7f0000000100)="b9ff0b076859268cb89e14f088a847", 0x0, 0xf00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 328.088893ms ago: executing program 0 (id=4261): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='percpu_alloc_percpu\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r6}, 0x10) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000280)='sched_switch\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x18, 0x10, &(0x7f00000004c0)=@raw=[@tail_call, @map_idx={0x18, 0x1, 0x5, 0x0, 0x6}, @exit, @ldst={0x1, 0x0, 0x1, 0xd, 0x4, 0x100, 0x8}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x6}, @ldst={0x1, 0x2, 0x5, 0x4, 0xb, 0xfffffffffffffff0}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @generic={0x8, 0x2, 0x7, 0x50c, 0xa1e}], &(0x7f00000006c0)='GPL\x00', 0x0, 0x2b, &(0x7f0000000700)=""/43, 0x20800, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000bc0)={0x2, 0xa, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c00)=[r0], &(0x7f0000000c40)=[{0x3, 0x1, 0xe, 0xb}, {0x1, 0x3, 0x4, 0x1}, {0x0, 0x5, 0x8, 0xa}, {0x5, 0x1, 0xd, 0x6}, {0x4, 0x2, 0x10, 0x1}], 0x10, 0x1}, 0x90) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000008000008500000006000000957076245b9f20111b348a765ba2ccc3f79777e125b35a37a8cefcf228ccd92c431f16a44ca041d8c78cebadaabf2eccdef6e5a391e1d295edbb22671e4b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) 220.851622ms ago: executing program 2 (id=4262): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181200", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e408"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xd, 0x6, 0x4, 0x5, 0x0, r6}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r7, &(0x7f0000000080), 0x0}, 0x20) 88.131003ms ago: executing program 0 (id=4263): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r3, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) (fail_nth: 5) 0s ago: executing program 3 (id=4264): bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%pI4 \x00'}, 0x20) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x5, 0x6, 0x529be8f6, 0x2, r0, 0x4, '\x00', 0x0, r1, 0x4, 0x4, 0x0, 0x3}, 0x48) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) close(r0) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)=@o_path={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10, r2}, 0x18) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r4, r2}, 0xc) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r5, &(0x7f00000002c0)='syz0\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r0, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x1, 0xbb4e, 0x8, 0x10, 0x1, 0x8, '\x00', r6, r3, 0x0, 0x2, 0x5}, 0x48) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440), 0xc003, 0x0) ioctl$TUNSETSTEERINGEBPF(r7, 0x800454e0, &(0x7f0000000480)=r4) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000004c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, r3, 0x2, 0x0, 0x5}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000580)={r8, &(0x7f0000000540)="1e6441a6ce956a9b"}, 0x20) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000005c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x2, '\x00', r6, r4, 0x2, 0x3, 0x3}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x6, '\x00', 0x0, r3, 0x0, 0x3, 0x2}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) recvmsg$unix(r10, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000700)=""/182, 0xb6}, {&(0x7f00000007c0)=""/192, 0xc0}, {&(0x7f0000000880)=""/128, 0x80}, {&(0x7f0000000900)=""/188, 0xbc}, {&(0x7f00000009c0)=""/225, 0xe1}], 0x5}, 0x20) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b80)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000bc0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@map=0x1, 0x2e, 0x0, 0xd6, &(0x7f0000000c00)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000c40)=[0x0], &(0x7f0000000c80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) openat$ppp(0xffffffffffffff9c, &(0x7f0000000d40), 0x401, 0x0) close(r8) write$cgroup_subtree(r11, &(0x7f0000000d80)={[{0x2d, 'net_prio'}, {0x2d, 'rdma'}, {0x2b, 'blkio'}, {0x2d, 'perf_event'}, {0x2d, 'net_prio'}, {0x2b, 'perf_event'}]}, 0x39) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000dc0)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) r12 = openat$cgroup(r5, &(0x7f0000000e00)='syz1\x00', 0x200002, 0x0) r13 = openat$cgroup_ro(r12, &(0x7f0000000e40)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r13, &(0x7f0000000e80), 0x2, 0x0) perf_event_open(&(0x7f0000000f00)={0x1, 0x80, 0x5f, 0x40, 0x80, 0x2, 0x0, 0x1, 0x180000, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000ec0), 0x3}, 0x10100, 0x34d, 0x5272, 0x6, 0x8, 0x9, 0x3, 0x0, 0x13, 0x0, 0xb}, 0x0, 0x6, 0xffffffffffffffff, 0x2) kernel console output (not intermixed with test programs): 00000000000 [ 173.584511][ T8366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 173.592317][ T8366] R13: 000000000000000b R14: 00007f4d3ad2af60 R15: 00007fff7864dd08 [ 173.600137][ T8366] [ 173.631586][ T8374] Â: renamed from pim6reg1 [ 173.688294][ T8382] device syzkaller0 entered promiscuous mode [ 173.750395][ T8379] device veth0_vlan left promiscuous mode [ 173.757033][ T8379] device veth0_vlan entered promiscuous mode [ 174.060145][ T8406] device veth0_vlan left promiscuous mode [ 174.067541][ T8406] device veth0_vlan entered promiscuous mode [ 174.156351][ T8418] device syzkaller0 entered promiscuous mode [ 174.168106][ T8420] device veth0_vlan left promiscuous mode [ 174.174396][ T8420] device veth0_vlan entered promiscuous mode [ 174.191157][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 174.203255][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 174.227022][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 174.485481][ T8450] device veth0_vlan left promiscuous mode [ 174.544677][ T8450] device veth0_vlan entered promiscuous mode [ 174.591100][ T8453] device pim6reg1 entered promiscuous mode [ 175.059492][ T8469] device veth0_vlan left promiscuous mode [ 175.065974][ T8469] device veth0_vlan entered promiscuous mode [ 175.120036][ T8477] device syzkaller0 entered promiscuous mode [ 175.145203][ T8481] device veth0_vlan left promiscuous mode [ 175.152310][ T8481] device veth0_vlan entered promiscuous mode [ 175.222688][ T8487] device veth0_vlan left promiscuous mode [ 175.237164][ T8487] device veth0_vlan entered promiscuous mode [ 175.425808][ T8511] device sit0 left promiscuous mode [ 175.437062][ T8508] device veth0_vlan left promiscuous mode [ 175.443348][ T8508] device veth0_vlan entered promiscuous mode [ 175.455859][ T8511] device sit0 entered promiscuous mode [ 175.463783][ T8511] FAULT_INJECTION: forcing a failure. [ 175.463783][ T8511] name failslab, interval 1, probability 0, space 0, times 0 [ 175.476543][ T8511] CPU: 1 PID: 8511 Comm: syz.0.3210 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 175.486344][ T8511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 175.496243][ T8511] Call Trace: [ 175.499444][ T8511] [ 175.502233][ T8511] dump_stack_lvl+0x151/0x1b7 [ 175.506739][ T8511] ? io_uring_drop_tctx_refs+0x190/0x190 [ 175.512211][ T8511] dump_stack+0x15/0x17 [ 175.516298][ T8511] should_fail+0x3c6/0x510 [ 175.520554][ T8511] __should_failslab+0xa4/0xe0 [ 175.525224][ T8511] should_failslab+0x9/0x20 [ 175.529579][ T8511] slab_pre_alloc_hook+0x37/0xd0 [ 175.534352][ T8511] kmem_cache_alloc_trace+0x48/0x210 [ 175.539558][ T8511] ? ____ip_mc_inc_group+0x215/0x8d0 [ 175.544678][ T8511] ____ip_mc_inc_group+0x215/0x8d0 [ 175.549640][ T8511] ? irqentry_exit+0x30/0x40 [ 175.554058][ T8511] ? __ip_mc_inc_group+0x30/0x30 [ 175.558826][ T8511] ? __kasan_check_read+0x11/0x20 [ 175.563684][ T8511] ip_mc_up+0x10f/0x1e0 [ 175.567677][ T8511] inetdev_event+0xc45/0x10a0 [ 175.572192][ T8511] ? ipv4_doint_and_flush+0x150/0x150 [ 175.577401][ T8511] ? raw_notifier_call_chain+0xb0/0xf0 [ 175.582692][ T8511] raw_notifier_call_chain+0x8c/0xf0 [ 175.587822][ T8511] __dev_notify_flags+0x304/0x610 [ 175.592850][ T8511] ? __dev_change_flags+0x6e0/0x6e0 [ 175.597884][ T8511] ? __dev_change_flags+0x505/0x6e0 [ 175.602917][ T8511] ? dev_get_flags+0x1e0/0x1e0 [ 175.607516][ T8511] ? asm_sysvec_reschedule_ipi+0x1b/0x20 [ 175.612982][ T8511] ? full_name_hash+0x57/0xf0 [ 175.617498][ T8511] dev_change_flags+0xf0/0x1a0 [ 175.622185][ T8511] dev_ifsioc+0x147/0x10c0 [ 175.626436][ T8511] ? irqentry_exit+0x30/0x40 [ 175.630862][ T8511] ? dev_ioctl+0xe70/0xe70 [ 175.635126][ T8511] ? mutex_lock+0x135/0x1e0 [ 175.639456][ T8511] ? wait_for_completion_killable_timeout+0x10/0x10 [ 175.645908][ T8511] dev_ioctl+0x54d/0xe70 [ 175.649964][ T8511] sock_do_ioctl+0x34f/0x5a0 [ 175.654386][ T8511] ? sock_show_fdinfo+0xa0/0xa0 [ 175.659072][ T8511] ? selinux_file_ioctl+0x3cc/0x540 [ 175.664192][ T8511] sock_ioctl+0x455/0x740 [ 175.668357][ T8511] ? sock_poll+0x400/0x400 [ 175.672611][ T8511] ? __fget_files+0x31e/0x380 [ 175.677123][ T8511] ? security_file_ioctl+0x84/0xb0 [ 175.682069][ T8511] ? sock_poll+0x400/0x400 [ 175.686324][ T8511] __se_sys_ioctl+0x114/0x190 [ 175.690836][ T8511] __x64_sys_ioctl+0x7b/0x90 [ 175.695260][ T8511] do_syscall_64+0x3d/0xb0 [ 175.699514][ T8511] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 175.705156][ T8511] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 175.710883][ T8511] RIP: 0033:0x7fe5c64b7f19 [ 175.715141][ T8511] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 175.734579][ T8511] RSP: 002b:00007fe5c5139048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 175.742823][ T8511] RAX: ffffffffffffffda RBX: 00007fe5c6647f60 RCX: 00007fe5c64b7f19 [ 175.750633][ T8511] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000007 [ 175.758450][ T8511] RBP: 00007fe5c51390a0 R08: 0000000000000000 R09: 0000000000000000 [ 175.766257][ T8511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 175.774156][ T8511] R13: 000000000000000b R14: 00007fe5c6647f60 R15: 00007ffdc111ff88 [ 175.781971][ T8511] [ 175.972509][ T8513] device veth0_vlan left promiscuous mode [ 175.978663][ T8513] device veth0_vlan entered promiscuous mode [ 176.045941][ T8518] device syzkaller0 entered promiscuous mode [ 176.100271][ T8536] device sit0 left promiscuous mode [ 176.169229][ T8545] device veth0_vlan left promiscuous mode [ 176.176340][ T8545] device veth0_vlan entered promiscuous mode [ 176.190896][ T8536] device sit0 entered promiscuous mode [ 176.446184][ T8540] device veth0_vlan left promiscuous mode [ 176.454068][ T8540] device veth0_vlan entered promiscuous mode [ 176.689241][ T8561] device veth0_vlan left promiscuous mode [ 176.696079][ T8561] device veth0_vlan entered promiscuous mode [ 176.897933][ T8579] device syzkaller0 entered promiscuous mode [ 176.904615][ T8578] device veth0_vlan left promiscuous mode [ 176.911131][ T8578] device veth0_vlan entered promiscuous mode [ 176.918594][ T8577] device veth0_vlan left promiscuous mode [ 176.926827][ T8577] device veth0_vlan entered promiscuous mode [ 176.945800][ T8581] device sit0 left promiscuous mode [ 176.975436][ T8583] FAULT_INJECTION: forcing a failure. [ 176.975436][ T8583] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 176.989493][ T8583] CPU: 1 PID: 8583 Comm: syz.0.3237 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 176.999222][ T8583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 177.009116][ T8583] Call Trace: [ 177.012236][ T8583] [ 177.015012][ T8583] dump_stack_lvl+0x151/0x1b7 [ 177.019525][ T8583] ? io_uring_drop_tctx_refs+0x190/0x190 [ 177.025002][ T8583] dump_stack+0x15/0x17 [ 177.029071][ T8583] should_fail+0x3c6/0x510 [ 177.033326][ T8583] should_fail_usercopy+0x1a/0x20 [ 177.038185][ T8583] _copy_to_user+0x20/0x90 [ 177.042443][ T8583] simple_read_from_buffer+0xc7/0x150 [ 177.047735][ T8583] proc_fail_nth_read+0x1a3/0x210 [ 177.052593][ T8583] ? proc_fault_inject_write+0x390/0x390 [ 177.058061][ T8583] ? fsnotify_perm+0x470/0x5d0 [ 177.062661][ T8583] ? security_file_permission+0x86/0xb0 [ 177.068130][ T8583] ? proc_fault_inject_write+0x390/0x390 [ 177.073600][ T8583] vfs_read+0x27d/0xd40 [ 177.077591][ T8583] ? sock_show_fdinfo+0xa0/0xa0 [ 177.082277][ T8583] ? kernel_read+0x1f0/0x1f0 [ 177.086704][ T8583] ? __kasan_check_write+0x14/0x20 [ 177.091651][ T8583] ? mutex_lock+0xb6/0x1e0 [ 177.095902][ T8583] ? wait_for_completion_killable_timeout+0x10/0x10 [ 177.102331][ T8583] ? __fdget_pos+0x2e7/0x3a0 [ 177.106753][ T8583] ? ksys_read+0x77/0x2c0 [ 177.111005][ T8583] ksys_read+0x199/0x2c0 [ 177.115088][ T8583] ? vfs_write+0x1110/0x1110 [ 177.119601][ T8583] ? debug_smp_processor_id+0x17/0x20 [ 177.124806][ T8583] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 177.130710][ T8583] __x64_sys_read+0x7b/0x90 [ 177.135238][ T8583] do_syscall_64+0x3d/0xb0 [ 177.139473][ T8583] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 177.145208][ T8583] RIP: 0033:0x7fe5c64b69fc [ 177.149463][ T8583] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8c 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 1f 8d 02 00 48 [ 177.168985][ T8583] RSP: 002b:00007fe5c5139040 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 177.177239][ T8583] RAX: ffffffffffffffda RBX: 00007fe5c6647f60 RCX: 00007fe5c64b69fc [ 177.185039][ T8583] RDX: 000000000000000f RSI: 00007fe5c51390b0 RDI: 0000000000000005 [ 177.192850][ T8583] RBP: 00007fe5c51390a0 R08: 0000000000000000 R09: 0000000000000000 [ 177.200756][ T8583] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 177.208558][ T8583] R13: 000000000000000b R14: 00007fe5c6647f60 R15: 00007ffdc111ff88 [ 177.216449][ T8583] [ 177.234972][ T8581] device sit0 entered promiscuous mode [ 177.263359][ T8586] device veth0_vlan left promiscuous mode [ 177.280470][ T8586] device veth0_vlan entered promiscuous mode [ 177.289398][ T8589] device veth0_vlan left promiscuous mode [ 177.301651][ T8589] device veth0_vlan entered promiscuous mode [ 177.539424][ T8607] device veth0_vlan left promiscuous mode [ 177.545649][ T8607] device veth0_vlan entered promiscuous mode [ 177.556771][ T8608] device veth0_vlan left promiscuous mode [ 177.563378][ T8608] device veth0_vlan entered promiscuous mode [ 177.624350][ T8611] device syzkaller0 entered promiscuous mode [ 177.718278][ T8617] device syzkaller0 entered promiscuous mode [ 177.868831][ T8629] device veth0_vlan left promiscuous mode [ 177.883237][ T8629] device veth0_vlan entered promiscuous mode [ 177.911201][ T8632] device sit0 left promiscuous mode [ 178.049243][ T8632] device sit0 entered promiscuous mode [ 178.453583][ T8646] device veth0_vlan left promiscuous mode [ 178.466737][ T8646] device veth0_vlan entered promiscuous mode [ 178.498068][ T8650] device veth0_vlan left promiscuous mode [ 178.509085][ T8650] device veth0_vlan entered promiscuous mode [ 178.612678][ T8660] device veth0_vlan left promiscuous mode [ 178.618939][ T8660] device veth0_vlan entered promiscuous mode [ 178.681890][ T8671] device syzkaller0 entered promiscuous mode [ 178.698242][ T8677] device sit0 left promiscuous mode [ 178.751200][ T8675] device syzkaller0 entered promiscuous mode [ 178.768684][ T8677] device sit0 entered promiscuous mode [ 179.365083][ T8695] device veth0_vlan left promiscuous mode [ 179.379459][ T8695] device veth0_vlan entered promiscuous mode [ 179.597265][ T8706] device syzkaller0 entered promiscuous mode [ 179.610995][ T8707] device veth0_vlan left promiscuous mode [ 179.636545][ T8707] device veth0_vlan entered promiscuous mode [ 179.996405][ T8724] device sit0 entered promiscuous mode [ 180.219459][ T8729] device veth0_vlan left promiscuous mode [ 180.241376][ T8729] device veth0_vlan entered promiscuous mode [ 180.322684][ T8732] device syzkaller0 entered promiscuous mode [ 180.697302][ T8750] device veth0_vlan left promiscuous mode [ 180.707812][ T8750] device veth0_vlan entered promiscuous mode [ 180.717997][ T7859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 180.727575][ T7859] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 180.746314][ T7859] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 180.976272][ T8759] device syzkaller0 entered promiscuous mode [ 181.109979][ T8768] device sit0 left promiscuous mode [ 181.177019][ T8773] device veth0_vlan left promiscuous mode [ 181.185982][ T8773] device veth0_vlan entered promiscuous mode [ 181.199458][ T8772] device sit0 entered promiscuous mode [ 181.403861][ T8792] device veth0_vlan left promiscuous mode [ 181.410587][ T8792] device veth0_vlan entered promiscuous mode [ 181.434614][ T8793] device syzkaller0 entered promiscuous mode [ 181.673772][ T8802] device syzkaller0 entered promiscuous mode [ 181.851777][ T8814] device veth0_vlan left promiscuous mode [ 181.857847][ T8814] device veth0_vlan entered promiscuous mode [ 181.890121][ T7833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 181.908732][ T7833] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 181.946739][ T7833] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 181.983247][ T8816] device sit0 left promiscuous mode [ 182.014835][ T8818] device sit0 entered promiscuous mode [ 182.211408][ T8824] device syzkaller0 entered promiscuous mode [ 182.404917][ T8833] device veth0_vlan left promiscuous mode [ 182.450963][ T8833] device veth0_vlan entered promiscuous mode [ 182.621822][ T8844] device sit0 left promiscuous mode [ 182.777821][ T8850] device sit0 entered promiscuous mode [ 182.786696][ T8850] FAULT_INJECTION: forcing a failure. [ 182.786696][ T8850] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 182.822085][ T8850] CPU: 0 PID: 8850 Comm: syz.3.3333 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 182.831921][ T8850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 182.841818][ T8850] Call Trace: [ 182.844942][ T8850] [ 182.847721][ T8850] dump_stack_lvl+0x151/0x1b7 [ 182.852234][ T8850] ? io_uring_drop_tctx_refs+0x190/0x190 [ 182.857697][ T8850] ? arch_stack_walk+0xf3/0x140 [ 182.862389][ T8850] dump_stack+0x15/0x17 [ 182.866376][ T8850] should_fail+0x3c6/0x510 [ 182.870638][ T8850] should_fail_alloc_page+0x5a/0x80 [ 182.875662][ T8850] prepare_alloc_pages+0x15c/0x700 [ 182.880611][ T8850] ? __alloc_pages_bulk+0xe40/0xe40 [ 182.885645][ T8850] ? kasan_set_track+0x5d/0x70 [ 182.890250][ T8850] ? kasan_set_track+0x4b/0x70 [ 182.894840][ T8850] ? kasan_set_free_info+0x23/0x40 [ 182.899793][ T8850] __alloc_pages+0x18c/0x8f0 [ 182.904217][ T8850] ? dev_ioctl+0x54d/0xe70 [ 182.908473][ T8850] ? prep_new_page+0x110/0x110 [ 182.913080][ T8850] new_slab+0x9a/0x4e0 [ 182.916975][ T8850] ___slab_alloc+0x39e/0x830 [ 182.921400][ T8850] ? ____ip_mc_inc_group+0x215/0x8d0 [ 182.926521][ T8850] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 182.932253][ T8850] ? ____ip_mc_inc_group+0x215/0x8d0 [ 182.937371][ T8850] __slab_alloc+0x4a/0x90 [ 182.941559][ T8850] kmem_cache_alloc_trace+0x142/0x210 [ 182.946844][ T8850] ? ____ip_mc_inc_group+0x215/0x8d0 [ 182.951954][ T8850] ____ip_mc_inc_group+0x215/0x8d0 [ 182.956905][ T8850] ? __ip_mc_inc_group+0x30/0x30 [ 182.961671][ T8850] ? __kasan_check_write+0x14/0x20 [ 182.966620][ T8850] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 182.971917][ T8850] ? __kasan_check_read+0x11/0x20 [ 182.976804][ T8850] ip_mc_up+0x10f/0x1e0 [ 182.980772][ T8850] inetdev_event+0xc45/0x10a0 [ 182.985370][ T8850] ? ipv4_doint_and_flush+0x150/0x150 [ 182.990575][ T8850] ? raw_notifier_call_chain+0xb0/0xf0 [ 182.995874][ T8850] raw_notifier_call_chain+0x8c/0xf0 [ 183.000994][ T8850] __dev_notify_flags+0x304/0x610 [ 183.005860][ T8850] ? __dev_change_flags+0x6e0/0x6e0 [ 183.010895][ T8850] ? dev_get_flags+0x1e0/0x1e0 [ 183.015673][ T8850] dev_change_flags+0xf0/0x1a0 [ 183.020272][ T8850] dev_ifsioc+0x147/0x10c0 [ 183.024526][ T8850] ? dev_ioctl+0xe70/0xe70 [ 183.028788][ T8850] ? mutex_lock+0x135/0x1e0 [ 183.033128][ T8850] ? wait_for_completion_killable_timeout+0x10/0x10 [ 183.039976][ T8850] dev_ioctl+0x54d/0xe70 [ 183.044054][ T8850] sock_do_ioctl+0x34f/0x5a0 [ 183.048481][ T8850] ? sock_show_fdinfo+0xa0/0xa0 [ 183.053170][ T8850] ? do_vfs_ioctl+0x121/0x2a80 [ 183.057986][ T8850] sock_ioctl+0x455/0x740 [ 183.062140][ T8850] ? sock_poll+0x400/0x400 [ 183.066390][ T8850] ? __fget_files+0x31e/0x380 [ 183.070994][ T8850] ? security_file_ioctl+0x84/0xb0 [ 183.075940][ T8850] ? sock_poll+0x400/0x400 [ 183.080278][ T8850] __se_sys_ioctl+0x114/0x190 [ 183.084792][ T8850] __x64_sys_ioctl+0x7b/0x90 [ 183.089216][ T8850] do_syscall_64+0x3d/0xb0 [ 183.093556][ T8850] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 183.099201][ T8850] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 183.104926][ T8850] RIP: 0033:0x7f8ae99b1f19 [ 183.109181][ T8850] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 183.128619][ T8850] RSP: 002b:00007f8ae8612048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 183.136864][ T8850] RAX: ffffffffffffffda RBX: 00007f8ae9b42038 RCX: 00007f8ae99b1f19 [ 183.144760][ T8850] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000007 [ 183.152573][ T8850] RBP: 00007f8ae86120a0 R08: 0000000000000000 R09: 0000000000000000 [ 183.160387][ T8850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 183.168286][ T8850] R13: 000000000000006e R14: 00007f8ae9b42038 R15: 00007ffc34c42528 [ 183.176106][ T8850] [ 183.373032][ T8853] device veth0_vlan left promiscuous mode [ 183.379592][ T8853] device veth0_vlan entered promiscuous mode [ 183.393738][ T8862] device sit0 left promiscuous mode [ 183.407461][ T8864] device sit0 entered promiscuous mode [ 183.432221][ T8865] device syzkaller0 entered promiscuous mode [ 183.443349][ T8870] device veth1_macvtap left promiscuous mode [ 183.456316][ T8872] device sit0 left promiscuous mode [ 183.464867][ T30] audit: type=1400 audit(1721877312.769:146): avc: denied { ioctl } for pid=8873 comm="syz.0.3342" path="cgroup:[4026532291]" dev="nsfs" ino=4026532291 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 183.513430][ T8870] device veth1_macvtap entered promiscuous mode [ 183.520114][ T8870] device macsec0 entered promiscuous mode [ 183.560322][ T8877] device veth0_vlan left promiscuous mode [ 183.586136][ T8877] device veth0_vlan entered promiscuous mode [ 183.693513][ T8896] device syzkaller0 entered promiscuous mode [ 183.702177][ T8894] tap0: tun_chr_ioctl cmd 1074812118 [ 183.738357][ T8902] device sit0 left promiscuous mode [ 183.779140][ T8902] device sit0 entered promiscuous mode [ 183.971932][ T8910] device syzkaller0 entered promiscuous mode [ 183.978694][ T8914] device veth1_macvtap left promiscuous mode [ 183.984706][ T8914] device macsec0 left promiscuous mode [ 184.008160][ T8922] device veth0_vlan left promiscuous mode [ 184.014559][ T8922] device veth0_vlan entered promiscuous mode [ 184.024760][ T8914] device veth1_macvtap entered promiscuous mode [ 184.031090][ T8914] device macsec0 entered promiscuous mode [ 184.119618][ T8937] device veth0_vlan left promiscuous mode [ 184.126017][ T8937] device veth0_vlan entered promiscuous mode [ 184.133631][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 184.142789][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 184.150166][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 184.242499][ T8939] device sit0 entered promiscuous mode [ 184.367897][ T8947] device syzkaller0 entered promiscuous mode [ 184.377599][ T8949] tap0: tun_chr_ioctl cmd 1074812118 [ 184.457934][ T8958] device veth1_macvtap left promiscuous mode [ 184.472693][ T8958] device veth1_macvtap entered promiscuous mode [ 184.479037][ T8958] device macsec0 entered promiscuous mode [ 184.516103][ T8960] device syzkaller0 entered promiscuous mode [ 184.559301][ T8964] device veth0_vlan left promiscuous mode [ 184.565703][ T8964] device veth0_vlan entered promiscuous mode [ 184.635649][ T8976] device sit0 left promiscuous mode [ 184.681078][ T8976] device sit0 entered promiscuous mode [ 184.926053][ T8989] device veth1_macvtap left promiscuous mode [ 184.932001][ T8989] device macsec0 left promiscuous mode [ 184.946294][ T8987] tap0: tun_chr_ioctl cmd 1074812118 [ 185.085763][ T9005] device veth0_vlan left promiscuous mode [ 185.092464][ T9005] device veth0_vlan entered promiscuous mode [ 185.127049][ T9011] device veth0_vlan left promiscuous mode [ 185.133418][ T9011] device veth0_vlan entered promiscuous mode [ 185.160153][ T9016] device sit0 left promiscuous mode [ 185.177959][ T9018] device sit0 left promiscuous mode [ 185.212198][ T9014] device syzkaller0 entered promiscuous mode [ 185.220252][ T9016] device sit0 entered promiscuous mode [ 185.381159][ T9022] device veth1_macvtap left promiscuous mode [ 185.387131][ T9022] device macsec0 left promiscuous mode [ 185.397608][ T9018] device sit0 entered promiscuous mode [ 185.511109][ T9035] FAULT_INJECTION: forcing a failure. [ 185.511109][ T9035] name failslab, interval 1, probability 0, space 0, times 0 [ 185.524105][ T9035] CPU: 1 PID: 9035 Comm: syz.4.3405 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 185.533827][ T9035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 185.543728][ T9035] Call Trace: [ 185.546853][ T9035] [ 185.549623][ T9035] dump_stack_lvl+0x151/0x1b7 [ 185.554224][ T9035] ? io_uring_drop_tctx_refs+0x190/0x190 [ 185.559700][ T9035] dump_stack+0x15/0x17 [ 185.563682][ T9035] should_fail+0x3c6/0x510 [ 185.568028][ T9035] __should_failslab+0xa4/0xe0 [ 185.572622][ T9035] ? __alloc_skb+0xbe/0x550 [ 185.576957][ T9035] should_failslab+0x9/0x20 [ 185.581299][ T9035] slab_pre_alloc_hook+0x37/0xd0 [ 185.586161][ T9035] ? __alloc_skb+0xbe/0x550 [ 185.590496][ T9035] kmem_cache_alloc+0x44/0x200 [ 185.595131][ T9035] __alloc_skb+0xbe/0x550 [ 185.599263][ T9035] alloc_skb_with_frags+0xa6/0x680 [ 185.604305][ T9035] ? 0xffffffffa002a658 [ 185.608443][ T9035] ? is_bpf_text_address+0x172/0x190 [ 185.613559][ T9035] ? stack_trace_save+0x1c0/0x1c0 [ 185.618435][ T9035] sock_alloc_send_pskb+0x915/0xa50 [ 185.623472][ T9035] ? sock_kzfree_s+0x60/0x60 [ 185.627880][ T9035] ? stack_trace_snprint+0xf0/0xf0 [ 185.632843][ T9035] ? __stack_depot_save+0x34/0x470 [ 185.637781][ T9035] tun_get_user+0xf1b/0x3aa0 [ 185.642203][ T9035] ? kasan_set_track+0x4b/0x70 [ 185.646802][ T9035] ? kasan_set_free_info+0x23/0x40 [ 185.651847][ T9035] ? _kstrtoull+0x3a0/0x4a0 [ 185.656295][ T9035] ? tun_do_read+0x1ef0/0x1ef0 [ 185.660867][ T9035] ? kstrtouint_from_user+0x20a/0x2a0 [ 185.666609][ T9035] ? kstrtol_from_user+0x310/0x310 [ 185.671562][ T9035] ? avc_policy_seqno+0x1b/0x70 [ 185.676227][ T9035] ? selinux_file_permission+0x2c4/0x570 [ 185.681700][ T9035] tun_chr_write_iter+0x1e1/0x2e0 [ 185.686593][ T9035] vfs_write+0xd5d/0x1110 [ 185.690725][ T9035] ? kmem_cache_free+0x116/0x2e0 [ 185.695499][ T9035] ? file_end_write+0x1c0/0x1c0 [ 185.700192][ T9035] ? __fdget_pos+0x209/0x3a0 [ 185.704698][ T9035] ? ksys_write+0x77/0x2c0 [ 185.708950][ T9035] ksys_write+0x199/0x2c0 [ 185.713126][ T9035] ? __ia32_sys_read+0x90/0x90 [ 185.717718][ T9035] ? debug_smp_processor_id+0x17/0x20 [ 185.722925][ T9035] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 185.728828][ T9035] __x64_sys_write+0x7b/0x90 [ 185.733254][ T9035] do_syscall_64+0x3d/0xb0 [ 185.737511][ T9035] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 185.743231][ T9035] RIP: 0033:0x7f986b1b5f19 [ 185.747485][ T9035] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 185.766932][ T9035] RSP: 002b:00007f9869e37048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 185.775172][ T9035] RAX: ffffffffffffffda RBX: 00007f986b345f60 RCX: 00007f986b1b5f19 [ 185.782988][ T9035] RDX: 000000000000fdef RSI: 0000000020000300 RDI: 00000000000000c8 [ 185.790793][ T9035] RBP: 00007f9869e370a0 R08: 0000000000000000 R09: 0000000000000000 [ 185.798606][ T9035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 185.806416][ T9035] R13: 000000000000000b R14: 00007f986b345f60 R15: 00007ffed82f5bb8 [ 185.814237][ T9035] [ 185.949473][ T9046] device veth0_vlan left promiscuous mode [ 185.955872][ T9046] device veth0_vlan entered promiscuous mode [ 185.966352][ T9045] tap0: tun_chr_ioctl cmd 1074812118 [ 185.971981][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 185.980271][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 185.987629][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 186.019757][ T9048] device veth0_vlan left promiscuous mode [ 186.031692][ T9048] device veth0_vlan entered promiscuous mode [ 186.039715][ T9052] device sit0 left promiscuous mode [ 186.089133][ T9052] device sit0 entered promiscuous mode [ 186.320666][ T9068] device sit0 left promiscuous mode [ 186.345064][ T9071] device sit0 entered promiscuous mode [ 186.490398][ T9075] device sit0 left promiscuous mode [ 186.562877][ T9081] device veth0_vlan left promiscuous mode [ 186.571543][ T9081] device veth0_vlan entered promiscuous mode [ 186.579219][ T9082] device sit0 entered promiscuous mode [ 186.586938][ T9082] FAULT_INJECTION: forcing a failure. [ 186.586938][ T9082] name failslab, interval 1, probability 0, space 0, times 0 [ 186.611423][ T9082] CPU: 1 PID: 9082 Comm: syz.3.3421 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 186.621158][ T9082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 186.631057][ T9082] Call Trace: [ 186.634178][ T9082] [ 186.636957][ T9082] dump_stack_lvl+0x151/0x1b7 [ 186.641470][ T9082] ? io_uring_drop_tctx_refs+0x190/0x190 [ 186.646936][ T9082] dump_stack+0x15/0x17 [ 186.651189][ T9082] should_fail+0x3c6/0x510 [ 186.655447][ T9082] __should_failslab+0xa4/0xe0 [ 186.660039][ T9082] should_failslab+0x9/0x20 [ 186.664390][ T9082] slab_pre_alloc_hook+0x37/0xd0 [ 186.669673][ T9082] kmem_cache_alloc_trace+0x48/0x210 [ 186.674794][ T9082] ? ____ip_mc_inc_group+0x215/0x8d0 [ 186.679924][ T9082] ____ip_mc_inc_group+0x215/0x8d0 [ 186.684862][ T9082] ? __ip_mc_inc_group+0x30/0x30 [ 186.689634][ T9082] ? __kasan_check_write+0x14/0x20 [ 186.694598][ T9082] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 186.699896][ T9082] ? __kasan_check_read+0x11/0x20 [ 186.704743][ T9082] ip_mc_up+0x10f/0x1e0 [ 186.708732][ T9082] inetdev_event+0xc45/0x10a0 [ 186.713244][ T9082] ? ipv4_doint_and_flush+0x150/0x150 [ 186.718475][ T9082] ? raw_notifier_call_chain+0xb0/0xf0 [ 186.723745][ T9082] ? raw_notifier_call_chain+0xc5/0xf0 [ 186.729042][ T9082] raw_notifier_call_chain+0x8c/0xf0 [ 186.734172][ T9082] __dev_notify_flags+0x304/0x610 [ 186.739019][ T9082] ? __dev_change_flags+0x6e0/0x6e0 [ 186.744227][ T9082] ? irqentry_exit+0x30/0x40 [ 186.748658][ T9082] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 186.754648][ T9082] ? __dev_change_flags+0x4f8/0x6e0 [ 186.759685][ T9082] dev_change_flags+0xf0/0x1a0 [ 186.764277][ T9082] dev_ifsioc+0x147/0x10c0 [ 186.768532][ T9082] ? dev_ioctl+0xe70/0xe70 [ 186.772782][ T9082] ? mutex_lock+0x135/0x1e0 [ 186.777121][ T9082] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 186.783112][ T9082] ? wait_for_completion_killable_timeout+0x10/0x10 [ 186.789545][ T9082] dev_ioctl+0x54d/0xe70 [ 186.793617][ T9082] sock_do_ioctl+0x34f/0x5a0 [ 186.798041][ T9082] ? sock_show_fdinfo+0xa0/0xa0 [ 186.802725][ T9082] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 186.808375][ T9082] ? selinux_file_ioctl+0x3cc/0x540 [ 186.813404][ T9082] sock_ioctl+0x455/0x740 [ 186.817657][ T9082] ? sock_poll+0x400/0x400 [ 186.821906][ T9082] ? __fget_files+0x31e/0x380 [ 186.826427][ T9082] ? security_file_ioctl+0x84/0xb0 [ 186.831365][ T9082] ? sock_poll+0x400/0x400 [ 186.835711][ T9082] __se_sys_ioctl+0x114/0x190 [ 186.840222][ T9082] __x64_sys_ioctl+0x7b/0x90 [ 186.844806][ T9082] do_syscall_64+0x3d/0xb0 [ 186.849043][ T9082] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 186.854686][ T9082] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 186.860416][ T9082] RIP: 0033:0x7f8ae99b1f19 [ 186.864668][ T9082] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 186.884203][ T9082] RSP: 002b:00007f8ae8612048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 186.892455][ T9082] RAX: ffffffffffffffda RBX: 00007f8ae9b42038 RCX: 00007f8ae99b1f19 [ 186.900249][ T9082] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000007 [ 186.908145][ T9082] RBP: 00007f8ae86120a0 R08: 0000000000000000 R09: 0000000000000000 [ 186.915959][ T9082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 186.923772][ T9082] R13: 000000000000006e R14: 00007f8ae9b42038 R15: 00007ffc34c42528 [ 186.931587][ T9082] [ 187.114695][ T9084] device syzkaller0 entered promiscuous mode [ 187.145342][ T9095] device veth0_vlan left promiscuous mode [ 187.153462][ T9095] device veth0_vlan entered promiscuous mode [ 187.161087][ T9100] device sit0 left promiscuous mode [ 187.213197][ T9106] device sit0 left promiscuous mode [ 187.239465][ T9109] tap0: tun_chr_ioctl cmd 1074812118 [ 187.251881][ T9106] device sit0 entered promiscuous mode [ 187.468998][ T9114] device sit0 entered promiscuous mode [ 187.627156][ T9116] device sit0 left promiscuous mode [ 187.642877][ T9118] device sit0 entered promiscuous mode [ 187.792033][ T9127] device veth0_vlan left promiscuous mode [ 187.798589][ T9127] device veth0_vlan entered promiscuous mode [ 187.914632][ T9134] device syzkaller0 entered promiscuous mode [ 187.943135][ T9139] device veth0_vlan left promiscuous mode [ 187.949620][ T9139] device veth0_vlan entered promiscuous mode [ 188.013663][ T9143] device veth1_macvtap left promiscuous mode [ 188.095089][ T9149] device sit0 left promiscuous mode [ 188.133276][ T9158] device sit0 left promiscuous mode [ 188.155709][ T9158] device sit0 entered promiscuous mode [ 188.383248][ T9149] device sit0 entered promiscuous mode [ 188.538750][ T9163] device veth0_vlan left promiscuous mode [ 188.545614][ T9163] device veth0_vlan entered promiscuous mode [ 188.553205][ T9168] tap0: tun_chr_ioctl cmd 1074812118 [ 188.621278][ T9175] device veth0_vlan left promiscuous mode [ 188.627602][ T9175] device veth0_vlan entered promiscuous mode [ 188.636514][ T9177] device sit0 left promiscuous mode [ 188.709861][ T9184] device sit0 entered promiscuous mode [ 188.963823][ T9190] device syzkaller0 entered promiscuous mode [ 189.109519][ T9204] device sit0 left promiscuous mode [ 189.164422][ T9204] device sit0 entered promiscuous mode [ 189.319710][ T9207] device veth0_vlan left promiscuous mode [ 189.326186][ T9207] device veth0_vlan entered promiscuous mode [ 189.340958][ T9210] device veth0_vlan left promiscuous mode [ 189.351636][ T9210] device veth0_vlan entered promiscuous mode [ 189.372560][ T9217] tap0: tun_chr_ioctl cmd 1074812118 [ 189.463526][ T9222] device sit0 left promiscuous mode [ 189.518659][ T9222] device sit0 entered promiscuous mode [ 189.645351][ T9228] device veth1_macvtap left promiscuous mode [ 189.658656][ T9232] device sit0 left promiscuous mode [ 189.704682][ T9234] device syzkaller0 entered promiscuous mode [ 189.711529][ T9236] device sit0 left promiscuous mode [ 189.724845][ T9238] device sit0 left promiscuous mode [ 189.738511][ T9232] device sit0 entered promiscuous mode [ 189.860869][ T9236] device sit0 entered promiscuous mode [ 189.995198][ T9238] device sit0 entered promiscuous mode [ 190.171731][ T9243] device veth0_vlan left promiscuous mode [ 190.178007][ T9243] device veth0_vlan entered promiscuous mode [ 190.195564][ T9248] device veth0_vlan left promiscuous mode [ 190.203245][ T9248] device veth0_vlan entered promiscuous mode [ 190.221706][ T9256] device veth0_vlan left promiscuous mode [ 190.237865][ T9256] device veth0_vlan entered promiscuous mode [ 190.252592][ T9255] tap0: tun_chr_ioctl cmd 1074812118 [ 190.515145][ T9276] device sit0 left promiscuous mode [ 190.530774][ T9273] device sit0 left promiscuous mode [ 190.584444][ T9276] device sit0 entered promiscuous mode [ 190.789845][ T9273] device sit0 entered promiscuous mode [ 190.917581][ T9284] device syzkaller0 entered promiscuous mode [ 190.925881][ T9286] device sit0 left promiscuous mode [ 190.948703][ T9288] device sit0 entered promiscuous mode [ 191.085264][ T9293] device veth0_vlan left promiscuous mode [ 191.092975][ T9293] device veth0_vlan entered promiscuous mode [ 191.101282][ T9294] device veth0_vlan left promiscuous mode [ 191.107765][ T9294] device veth0_vlan entered promiscuous mode [ 191.155228][ T9298] device veth0_vlan left promiscuous mode [ 191.164423][ T9298] device veth0_vlan entered promiscuous mode [ 191.327422][ T9311] tap0: tun_chr_ioctl cmd 1074812118 [ 191.383022][ T9316] device sit0 left promiscuous mode [ 191.407716][ T9316] device sit0 entered promiscuous mode [ 191.687475][ T9325] device sit0 left promiscuous mode [ 191.697187][ T9328] device sit0 left promiscuous mode [ 191.711410][ T9330] device sit0 entered promiscuous mode [ 191.842519][ T9328] device sit0 entered promiscuous mode [ 191.988695][ T9324] device syzkaller0 entered promiscuous mode [ 192.009121][ T9335] device veth0_vlan left promiscuous mode [ 192.017566][ T9335] device veth0_vlan entered promiscuous mode [ 192.065159][ T9338] device veth0_vlan left promiscuous mode [ 192.073039][ T9338] device veth0_vlan entered promiscuous mode [ 192.082955][ T9342] device veth0_vlan left promiscuous mode [ 192.089177][ T9342] device veth0_vlan entered promiscuous mode [ 192.152355][ T9351] tap0: tun_chr_ioctl cmd 1074812118 [ 192.273747][ T9355] device sit0 left promiscuous mode [ 192.299545][ T9357] device sit0 entered promiscuous mode [ 192.512873][ T9364] device sit0 left promiscuous mode [ 192.531364][ T9363] device sit0 left promiscuous mode [ 192.547056][ T9366] device sit0 left promiscuous mode [ 192.566609][ T9364] device sit0 entered promiscuous mode [ 192.693294][ T9366] device sit0 entered promiscuous mode [ 192.830448][ T9363] device sit0 entered promiscuous mode [ 193.007433][ T9372] device veth0_vlan left promiscuous mode [ 193.014044][ T9372] device veth0_vlan entered promiscuous mode [ 193.022847][ T9375] device veth1_macvtap left promiscuous mode [ 193.028944][ T9375] device macsec0 left promiscuous mode [ 193.047231][ T9381] device veth0_vlan left promiscuous mode [ 193.060468][ T9381] device veth0_vlan entered promiscuous mode [ 193.074696][ T9380] device veth0_vlan left promiscuous mode [ 193.088037][ T9380] device veth0_vlan entered promiscuous mode [ 193.155401][ T9385] device syzkaller0 entered promiscuous mode [ 193.173453][ T9387] tap0: tun_chr_ioctl cmd 1074812118 [ 193.364320][ T9400] device sit0 left promiscuous mode [ 193.444237][ T9400] device sit0 entered promiscuous mode [ 193.618992][ T9403] device sit0 left promiscuous mode [ 193.642191][ T9406] device sit0 entered promiscuous mode [ 193.778819][ T9409] device sit0 left promiscuous mode [ 193.812282][ T9412] device sit0 entered promiscuous mode [ 193.966751][ T9413] device veth0_vlan left promiscuous mode [ 193.973801][ T9413] device veth0_vlan entered promiscuous mode [ 194.058082][ T9423] device veth0_vlan left promiscuous mode [ 194.064458][ T9423] device veth0_vlan entered promiscuous mode [ 194.114747][ T9434] tap0: tun_chr_ioctl cmd 1074812118 [ 194.141293][ T9431] device syzkaller0 entered promiscuous mode [ 194.179232][ T9437] device sit0 left promiscuous mode [ 194.198115][ T9437] device sit0 entered promiscuous mode [ 194.492079][ T9452] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.499376][ T9452] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.575610][ T9460] device veth0_vlan left promiscuous mode [ 194.585531][ T9460] device veth0_vlan entered promiscuous mode [ 194.596455][ T9458] device veth0_vlan left promiscuous mode [ 194.611249][ T9458] device veth0_vlan entered promiscuous mode [ 194.635644][ T9466] device sit0 left promiscuous mode [ 194.737648][ T9466] device sit0 entered promiscuous mode [ 194.876879][ T9474] device syzkaller0 entered promiscuous mode [ 194.885232][ T9479] tap0: tun_chr_ioctl cmd 1074812118 [ 194.926142][ T9483] device sit0 left promiscuous mode [ 194.944428][ T9483] device sit0 entered promiscuous mode [ 195.066264][ T9485] device pim6reg1 entered promiscuous mode [ 195.107255][ T9494] FAULT_INJECTION: forcing a failure. [ 195.107255][ T9494] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 195.120576][ T9494] CPU: 1 PID: 9494 Comm: syz.2.3577 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 195.130299][ T9494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 195.140206][ T9494] Call Trace: [ 195.143323][ T9494] [ 195.146093][ T9494] dump_stack_lvl+0x151/0x1b7 [ 195.150701][ T9494] ? io_uring_drop_tctx_refs+0x190/0x190 [ 195.156246][ T9494] ? stack_trace_save+0x113/0x1c0 [ 195.161108][ T9494] dump_stack+0x15/0x17 [ 195.165097][ T9494] should_fail+0x3c6/0x510 [ 195.169362][ T9494] should_fail_alloc_page+0x5a/0x80 [ 195.174394][ T9494] prepare_alloc_pages+0x15c/0x700 [ 195.179333][ T9494] ? __alloc_pages_bulk+0xe40/0xe40 [ 195.184372][ T9494] ? do_syscall_64+0x3d/0xb0 [ 195.188794][ T9494] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 195.194786][ T9494] __alloc_pages+0x18c/0x8f0 [ 195.199294][ T9494] ? prep_new_page+0x110/0x110 [ 195.203902][ T9494] kmalloc_order+0x4a/0x160 [ 195.208234][ T9494] kmalloc_order_trace+0x1a/0xb0 [ 195.213004][ T9494] ? alloc_skb_with_frags+0xa6/0x680 [ 195.218136][ T9494] __kmalloc_track_caller+0x19b/0x260 [ 195.223425][ T9494] ? kmem_cache_alloc+0xf5/0x200 [ 195.228207][ T9494] ? alloc_skb_with_frags+0xa6/0x680 [ 195.233323][ T9494] __alloc_skb+0x10c/0x550 [ 195.237575][ T9494] alloc_skb_with_frags+0xa6/0x680 [ 195.242525][ T9494] ? 0xffffffffa0024354 [ 195.246515][ T9494] ? is_bpf_text_address+0x172/0x190 [ 195.251717][ T9494] ? stack_trace_save+0x1c0/0x1c0 [ 195.256613][ T9494] sock_alloc_send_pskb+0x915/0xa50 [ 195.261787][ T9494] ? sock_kzfree_s+0x60/0x60 [ 195.266211][ T9494] ? bpf_bprintf_prepare+0x11b4/0x1450 [ 195.271505][ T9494] ? bstr_printf+0x1020/0x10c0 [ 195.276107][ T9494] tun_get_user+0xf1b/0x3aa0 [ 195.280532][ T9494] ? memcpy+0x30/0x70 [ 195.284353][ T9494] ? _kstrtoull+0x3a0/0x4a0 [ 195.288691][ T9494] ? tun_do_read+0x1ef0/0x1ef0 [ 195.293292][ T9494] ? kstrtouint_from_user+0x20a/0x2a0 [ 195.298496][ T9494] ? kstrtol_from_user+0x310/0x310 [ 195.303442][ T9494] ? bpf_get_current_ancestor_cgroup_id+0x168/0x190 [ 195.309872][ T9494] ? bpf_trace_run3+0x123/0x250 [ 195.314640][ T9494] ? avc_policy_seqno+0x1b/0x70 [ 195.319326][ T9494] ? selinux_file_permission+0x2c4/0x570 [ 195.324883][ T9494] tun_chr_write_iter+0x1e1/0x2e0 [ 195.329748][ T9494] vfs_write+0xd5d/0x1110 [ 195.333909][ T9494] ? kmem_cache_free+0x2c3/0x2e0 [ 195.338688][ T9494] ? file_end_write+0x1c0/0x1c0 [ 195.343373][ T9494] ? __fdget_pos+0x209/0x3a0 [ 195.347794][ T9494] ? ksys_write+0x77/0x2c0 [ 195.352048][ T9494] ksys_write+0x199/0x2c0 [ 195.356216][ T9494] ? __ia32_sys_read+0x90/0x90 [ 195.360816][ T9494] ? debug_smp_processor_id+0x17/0x20 [ 195.366022][ T9494] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 195.371925][ T9494] __x64_sys_write+0x7b/0x90 [ 195.376351][ T9494] do_syscall_64+0x3d/0xb0 [ 195.380602][ T9494] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 195.386330][ T9494] RIP: 0033:0x7f4d3ab9af19 [ 195.390586][ T9494] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 195.410200][ T9494] RSP: 002b:00007f4d3981c048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 195.418449][ T9494] RAX: ffffffffffffffda RBX: 00007f4d3ad2af60 RCX: 00007f4d3ab9af19 [ 195.426343][ T9494] RDX: 000000000000fdef RSI: 0000000020000300 RDI: 00000000000000c8 [ 195.434153][ T9494] RBP: 00007f4d3981c0a0 R08: 0000000000000000 R09: 0000000000000000 [ 195.441976][ T9494] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 195.449776][ T9494] R13: 000000000000000b R14: 00007f4d3ad2af60 R15: 00007fff7864dd08 [ 195.457596][ T9494] [ 195.522221][ T9491] device veth0_vlan left promiscuous mode [ 195.528935][ T9491] device veth0_vlan entered promiscuous mode [ 195.621016][ T9500] device veth0_vlan left promiscuous mode [ 195.627785][ T9500] device veth0_vlan entered promiscuous mode [ 195.788808][ T9521] device syzkaller0 entered promiscuous mode [ 195.858192][ T9523] tap0: tun_chr_ioctl cmd 1074812118 [ 195.922850][ T9519] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.929917][ T9519] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.937482][ T9519] device bridge_slave_0 entered promiscuous mode [ 195.950082][ T9536] device veth0_vlan left promiscuous mode [ 195.957169][ T9536] device veth0_vlan entered promiscuous mode [ 195.974531][ T9519] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.981791][ T9519] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.989622][ T9519] device bridge_slave_1 entered promiscuous mode [ 196.087353][ T9540] device veth0_vlan left promiscuous mode [ 196.113852][ T9540] device veth0_vlan entered promiscuous mode [ 196.122626][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 196.138560][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 196.146996][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 196.460472][ T9562] device syzkaller0 entered promiscuous mode [ 196.499273][ T9561] tap0: tun_chr_ioctl cmd 1074812118 [ 196.561318][ T9565] device veth0_vlan left promiscuous mode [ 196.567395][ T9565] device veth0_vlan entered promiscuous mode [ 196.646639][ T9571] device sit0 left promiscuous mode [ 196.703985][ T9572] device sit0 entered promiscuous mode [ 196.713109][ T9572] FAULT_INJECTION: forcing a failure. [ 196.713109][ T9572] name failslab, interval 1, probability 0, space 0, times 0 [ 196.730119][ T9572] CPU: 1 PID: 9572 Comm: syz.3.3606 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 196.739857][ T9572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 196.750211][ T9572] Call Trace: [ 196.753330][ T9572] [ 196.756198][ T9572] dump_stack_lvl+0x151/0x1b7 [ 196.760969][ T9572] ? io_uring_drop_tctx_refs+0x190/0x190 [ 196.766445][ T9572] ? __kasan_check_write+0x14/0x20 [ 196.771387][ T9572] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 196.776241][ T9572] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 196.781283][ T9572] dump_stack+0x15/0x17 [ 196.785267][ T9572] should_fail+0x3c6/0x510 [ 196.789527][ T9572] __should_failslab+0xa4/0xe0 [ 196.794127][ T9572] ? fib_table_insert+0x853/0x20c0 [ 196.799070][ T9572] should_failslab+0x9/0x20 [ 196.803410][ T9572] slab_pre_alloc_hook+0x37/0xd0 [ 196.808187][ T9572] ? fib_table_insert+0x853/0x20c0 [ 196.813131][ T9572] kmem_cache_alloc+0x44/0x200 [ 196.817731][ T9572] fib_table_insert+0x853/0x20c0 [ 196.822512][ T9572] ? fib_alias_hw_flags_set+0xb20/0xb20 [ 196.827887][ T9572] ? __dev_notify_flags+0x304/0x610 [ 196.832923][ T9572] ? dev_ifsioc+0x147/0x10c0 [ 196.837347][ T9572] ? dev_ioctl+0x54d/0xe70 [ 196.841601][ T9572] fib_add_ifaddr+0xb7d/0x15e0 [ 196.846200][ T9572] ? nlmsg_parse_deprecated_strict+0xf0/0xf0 [ 196.852009][ T9572] ? arp_mc_map+0x4f1/0x910 [ 196.856437][ T9572] ? igmp_group_added+0x1fa/0x800 [ 196.861299][ T9572] ? igmpv3_del_delrec+0x740/0x740 [ 196.866249][ T9572] ? __kasan_check_write+0x14/0x20 [ 196.871195][ T9572] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 196.876054][ T9572] ? igmp_group_added+0x1fa/0x800 [ 196.880912][ T9572] ? igmpv3_del_delrec+0x740/0x740 [ 196.885858][ T9572] ? __local_bh_enable_ip+0x58/0x80 [ 196.890894][ T9572] ? _raw_spin_unlock_bh+0x51/0x60 [ 196.895846][ T9572] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 196.901490][ T9572] fib_netdev_event+0x235/0x5d0 [ 196.906259][ T9572] raw_notifier_call_chain+0x8c/0xf0 [ 196.911376][ T9572] __dev_notify_flags+0x304/0x610 [ 196.916236][ T9572] ? __dev_change_flags+0x6e0/0x6e0 [ 196.921270][ T9572] ? __dev_change_flags+0x505/0x6e0 [ 196.926309][ T9572] ? dev_get_flags+0x1e0/0x1e0 [ 196.930908][ T9572] dev_change_flags+0xf0/0x1a0 [ 196.935506][ T9572] dev_ifsioc+0x147/0x10c0 [ 196.939758][ T9572] ? dev_ioctl+0xe70/0xe70 [ 196.944009][ T9572] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 196.950007][ T9572] dev_ioctl+0x54d/0xe70 [ 196.954191][ T9572] sock_do_ioctl+0x34f/0x5a0 [ 196.958628][ T9572] ? sock_show_fdinfo+0xa0/0xa0 [ 196.963305][ T9572] ? selinux_file_ioctl+0x3cc/0x540 [ 196.968334][ T9572] sock_ioctl+0x455/0x740 [ 196.972502][ T9572] ? sock_poll+0x400/0x400 [ 196.976754][ T9572] ? __fget_files+0x31e/0x380 [ 196.981282][ T9572] ? security_file_ioctl+0x84/0xb0 [ 196.986217][ T9572] ? sock_poll+0x400/0x400 [ 196.990466][ T9572] __se_sys_ioctl+0x114/0x190 [ 196.994992][ T9572] __x64_sys_ioctl+0x7b/0x90 [ 196.999406][ T9572] do_syscall_64+0x3d/0xb0 [ 197.003657][ T9572] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 197.009388][ T9572] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 197.015118][ T9572] RIP: 0033:0x7f8ae99b1f19 [ 197.019544][ T9572] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 197.039075][ T9572] RSP: 002b:00007f8ae8612048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 197.047404][ T9572] RAX: ffffffffffffffda RBX: 00007f8ae9b42038 RCX: 00007f8ae99b1f19 [ 197.055214][ T9572] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000007 [ 197.063111][ T9572] RBP: 00007f8ae86120a0 R08: 0000000000000000 R09: 0000000000000000 [ 197.070939][ T9572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.078735][ T9572] R13: 000000000000006e R14: 00007f8ae9b42038 R15: 00007ffc34c42528 [ 197.086555][ T9572] [ 197.156432][ T9576] device sit0 left promiscuous mode [ 197.183342][ T9587] device veth0_vlan left promiscuous mode [ 197.189754][ T9587] device veth0_vlan entered promiscuous mode [ 197.198277][ T9586] device sit0 entered promiscuous mode [ 197.252113][ T30] audit: type=1400 audit(1721877326.559:147): avc: denied { create } for pid=9596 comm="syz.4.3614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 197.419933][ T9601] device veth0_vlan left promiscuous mode [ 197.426430][ T9601] device veth0_vlan entered promiscuous mode [ 197.447302][ T319] device bridge_slave_1 left promiscuous mode [ 197.453434][ T319] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.461086][ T319] device bridge_slave_0 left promiscuous mode [ 197.467131][ T319] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.476871][ T319] device veth0_vlan left promiscuous mode [ 197.582950][ T9605] device syzkaller0 entered promiscuous mode [ 197.598666][ T1811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.606916][ T1811] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.646946][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.657121][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.665206][ T320] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.672069][ T320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.679271][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.687854][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.695937][ T320] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.702818][ T320] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.710446][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 197.718547][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.727165][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.740330][ T9617] tap0: tun_chr_ioctl cmd 1074812118 [ 197.786365][ T1811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.805826][ T1811] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.820034][ T1811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 197.831311][ T1811] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 197.840491][ T1811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 197.848341][ T1811] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 197.861395][ T9519] device veth0_vlan entered promiscuous mode [ 197.886426][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 197.894156][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 197.966060][ T9629] device veth0_vlan left promiscuous mode [ 197.991507][ T9629] device veth0_vlan entered promiscuous mode [ 198.004014][ T9519] device veth1_macvtap entered promiscuous mode [ 198.096887][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 198.115746][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 198.130808][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 198.170833][ T9640] device veth0_vlan left promiscuous mode [ 198.177729][ T9640] device veth0_vlan entered promiscuous mode [ 198.188664][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 198.197337][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 198.407386][ T1811] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 198.415576][ T1811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 198.436042][ T9647] device syzkaller0 entered promiscuous mode [ 198.596642][ T9656] tap0: tun_chr_ioctl cmd 1074812118 [ 198.603763][ T9659] device sit0 entered promiscuous mode [ 198.761408][ T9667] device veth0_vlan left promiscuous mode [ 198.768028][ T9667] device veth0_vlan entered promiscuous mode [ 198.816128][ T9671] device veth1_macvtap left promiscuous mode [ 198.879336][ T9675] device veth0_vlan left promiscuous mode [ 198.887417][ T9675] device veth0_vlan entered promiscuous mode [ 199.054050][ T9686] device syzkaller0 entered promiscuous mode [ 199.113189][ T9690] device sit0 left promiscuous mode [ 199.144531][ T9690] device sit0 entered promiscuous mode [ 199.311398][ T9696] device veth0_vlan left promiscuous mode [ 199.317616][ T9696] device veth0_vlan entered promiscuous mode [ 199.327566][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 199.341919][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 199.356324][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 199.399429][ T9704] device sit0 left promiscuous mode [ 199.482290][ T9704] device sit0 entered promiscuous mode [ 199.596681][ T9705] device veth0_vlan left promiscuous mode [ 199.604825][ T9705] device veth0_vlan entered promiscuous mode [ 199.685373][ T9710] tap0: tun_chr_ioctl cmd 1074812118 [ 199.917468][ T9727] device sit0 left promiscuous mode [ 199.980311][ T9727] device sit0 entered promiscuous mode [ 200.239443][ T9737] device syzkaller0 entered promiscuous mode [ 200.266853][ T9745] device sit0 left promiscuous mode [ 200.305630][ T9745] device sit0 entered promiscuous mode [ 200.507651][ T9742] device veth0_vlan left promiscuous mode [ 200.521477][ T9742] device veth0_vlan entered promiscuous mode [ 200.586816][ T9751] device veth0_vlan left promiscuous mode [ 200.593359][ T9751] device veth0_vlan entered promiscuous mode [ 200.608148][ T9753] tap0: tun_chr_ioctl cmd 1074812118 [ 200.937889][ T9769] device sit0 left promiscuous mode [ 200.954503][ T9773] device sit0 left promiscuous mode [ 200.982452][ T9771] device syzkaller0 entered promiscuous mode [ 200.993587][ T9769] device sit0 entered promiscuous mode [ 201.088117][ T9777] device sit0 left promiscuous mode [ 201.106229][ T9773] device sit0 entered promiscuous mode [ 201.234958][ T9778] device sit0 entered promiscuous mode [ 201.372066][ T9781] device veth0_vlan left promiscuous mode [ 201.379961][ T9781] device veth0_vlan entered promiscuous mode [ 201.443406][ T9787] device veth0_vlan left promiscuous mode [ 201.450147][ T9787] device veth0_vlan entered promiscuous mode [ 201.472096][ T9791] tap0: tun_chr_ioctl cmd 1074812118 [ 201.482824][ T9793] device veth0_vlan left promiscuous mode [ 201.489460][ T9793] device veth0_vlan entered promiscuous mode [ 201.500294][ T9796] device veth0_vlan left promiscuous mode [ 201.515039][ T9796] device veth0_vlan entered promiscuous mode [ 201.563463][ T9807] device sit0 left promiscuous mode [ 201.714294][ T9813] device sit0 left promiscuous mode [ 201.831804][ T9813] device sit0 entered promiscuous mode [ 201.989865][ T9819] device veth0_vlan left promiscuous mode [ 201.996767][ T9819] device veth0_vlan entered promiscuous mode [ 202.046833][ T9823] device syzkaller0 entered promiscuous mode [ 202.132086][ T9829] device veth0_vlan left promiscuous mode [ 202.138614][ T9829] device veth0_vlan entered promiscuous mode [ 202.334873][ T9838] device veth0_vlan left promiscuous mode [ 202.341096][ T9838] device veth0_vlan entered promiscuous mode [ 202.406771][ T9846] tap0: tun_chr_ioctl cmd 1074812118 [ 202.437672][ T9852] device sit0 left promiscuous mode [ 202.454865][ T9848] device veth0_vlan left promiscuous mode [ 202.461854][ T9848] device veth0_vlan entered promiscuous mode [ 202.477270][ T9850] device veth0_vlan left promiscuous mode [ 202.488988][ T9850] device veth0_vlan entered promiscuous mode [ 202.506981][ T9852] device sit0 entered promiscuous mode [ 202.661063][ T9860] device veth0_vlan left promiscuous mode [ 202.667384][ T9860] device veth0_vlan entered promiscuous mode [ 202.731540][ T9864] device syzkaller0 entered promiscuous mode [ 202.755278][ T9868] device veth0_vlan left promiscuous mode [ 202.761729][ T9868] device veth0_vlan entered promiscuous mode [ 202.793774][ T9874] device sit0 left promiscuous mode [ 202.955582][ T9878] device veth0_vlan left promiscuous mode [ 202.962244][ T9878] device veth0_vlan entered promiscuous mode [ 202.979604][ T9885] tap0: tun_chr_ioctl cmd 1074812118 [ 203.027382][ T9882] device veth0_vlan left promiscuous mode [ 203.034502][ T9882] device veth0_vlan entered promiscuous mode [ 203.071470][ T9887] device veth0_vlan left promiscuous mode [ 203.094676][ T9887] device veth0_vlan entered promiscuous mode [ 203.108813][ T9891] FAULT_INJECTION: forcing a failure. [ 203.108813][ T9891] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 203.161258][ T9891] CPU: 1 PID: 9891 Comm: syz.2.3726 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 203.171317][ T9891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 203.181205][ T9891] Call Trace: [ 203.184327][ T9891] [ 203.187117][ T9891] dump_stack_lvl+0x151/0x1b7 [ 203.191627][ T9891] ? io_uring_drop_tctx_refs+0x190/0x190 [ 203.197090][ T9891] ? __kasan_check_write+0x14/0x20 [ 203.202036][ T9891] ? __alloc_skb+0x355/0x550 [ 203.206465][ T9891] dump_stack+0x15/0x17 [ 203.210453][ T9891] should_fail+0x3c6/0x510 [ 203.214811][ T9891] should_fail_usercopy+0x1a/0x20 [ 203.219656][ T9891] _copy_from_iter+0x22f/0xdc0 [ 203.224259][ T9891] ? copy_mc_pipe_to_iter+0x760/0x760 [ 203.229459][ T9891] ? __check_object_size+0x2ec/0x3d0 [ 203.234580][ T9891] skb_copy_datagram_from_iter+0x100/0x6d0 [ 203.240230][ T9891] tun_get_user+0x112d/0x3aa0 [ 203.244737][ T9891] ? _kstrtoull+0x3a0/0x4a0 [ 203.249183][ T9891] ? tun_do_read+0x1ef0/0x1ef0 [ 203.253758][ T9891] ? kstrtouint_from_user+0x20a/0x2a0 [ 203.259142][ T9891] ? kstrtol_from_user+0x310/0x310 [ 203.264095][ T9891] ? avc_policy_seqno+0x1b/0x70 [ 203.268773][ T9891] ? selinux_file_permission+0x2c4/0x570 [ 203.274243][ T9891] tun_chr_write_iter+0x1e1/0x2e0 [ 203.279105][ T9891] vfs_write+0xd5d/0x1110 [ 203.283269][ T9891] ? kmem_cache_free+0x2c3/0x2e0 [ 203.288044][ T9891] ? file_end_write+0x1c0/0x1c0 [ 203.292736][ T9891] ? __fdget_pos+0x209/0x3a0 [ 203.297154][ T9891] ? ksys_write+0x77/0x2c0 [ 203.301409][ T9891] ksys_write+0x199/0x2c0 [ 203.305577][ T9891] ? __ia32_sys_read+0x90/0x90 [ 203.310177][ T9891] ? debug_smp_processor_id+0x17/0x20 [ 203.315381][ T9891] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 203.321286][ T9891] __x64_sys_write+0x7b/0x90 [ 203.325910][ T9891] do_syscall_64+0x3d/0xb0 [ 203.330171][ T9891] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 203.335892][ T9891] RIP: 0033:0x7f4d3ab9af19 [ 203.340148][ T9891] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 203.359587][ T9891] RSP: 002b:00007f4d3981c048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 203.367833][ T9891] RAX: ffffffffffffffda RBX: 00007f4d3ad2af60 RCX: 00007f4d3ab9af19 [ 203.375640][ T9891] RDX: 000000000000fdef RSI: 0000000020000300 RDI: 00000000000000c8 [ 203.383454][ T9891] RBP: 00007f4d3981c0a0 R08: 0000000000000000 R09: 0000000000000000 [ 203.391279][ T9891] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 203.399112][ T9891] R13: 000000000000000b R14: 00007f4d3ad2af60 R15: 00007fff7864dd08 [ 203.406896][ T9891] [ 203.482853][ T9901] device veth0_vlan left promiscuous mode [ 203.490760][ T9901] device veth0_vlan entered promiscuous mode [ 203.498819][ T9894] device veth0_vlan left promiscuous mode [ 203.507046][ T9894] device veth0_vlan entered promiscuous mode [ 203.591535][ T9910] device syzkaller0 entered promiscuous mode [ 204.068287][ T9932] device veth0_vlan left promiscuous mode [ 204.075624][ T9932] device veth0_vlan entered promiscuous mode [ 204.139518][ T9936] device sit0 entered promiscuous mode [ 204.368904][ T9939] device veth0_vlan left promiscuous mode [ 204.390949][ T9939] device veth0_vlan entered promiscuous mode [ 204.530181][ T9946] device syzkaller0 entered promiscuous mode [ 204.552182][ T9954] device veth0_vlan left promiscuous mode [ 204.568017][ T9954] device veth0_vlan entered promiscuous mode [ 204.896094][ T9970] device sit0 entered promiscuous mode [ 205.091480][ T9986] device veth0_vlan left promiscuous mode [ 205.098692][ T9986] device veth0_vlan entered promiscuous mode [ 205.107707][ T9988] device veth0_vlan left promiscuous mode [ 205.114823][ T9988] device veth0_vlan entered promiscuous mode [ 205.227454][ T9994] device syzkaller0 entered promiscuous mode [ 205.297316][T10001] device pim6reg1 entered promiscuous mode [ 205.430566][T10015] device veth0_vlan left promiscuous mode [ 205.436754][T10015] device veth0_vlan entered promiscuous mode [ 205.445260][T10017] device veth0_vlan left promiscuous mode [ 205.451620][T10017] device veth0_vlan entered promiscuous mode [ 205.496946][T10023] device sit0 left promiscuous mode [ 205.536441][T10027] device syzkaller0 entered promiscuous mode [ 205.564236][T10023] device sit0 entered promiscuous mode [ 205.574473][T10023] FAULT_INJECTION: forcing a failure. [ 205.574473][T10023] name failslab, interval 1, probability 0, space 0, times 0 [ 205.589352][T10023] CPU: 1 PID: 10023 Comm: syz.2.3780 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 205.599151][T10023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 205.609128][T10023] Call Trace: [ 205.612252][T10023] [ 205.615027][T10023] dump_stack_lvl+0x151/0x1b7 [ 205.619541][T10023] ? io_uring_drop_tctx_refs+0x190/0x190 [ 205.625010][T10023] ? slab_post_alloc_hook+0x53/0x2c0 [ 205.630131][T10023] ? fib_table_insert+0x853/0x20c0 [ 205.635208][T10023] ? fib_add_ifaddr+0xb7d/0x15e0 [ 205.639975][T10023] ? fib_netdev_event+0x235/0x5d0 [ 205.644837][T10023] ? __dev_notify_flags+0x304/0x610 [ 205.649878][T10023] dump_stack+0x15/0x17 [ 205.653867][T10023] should_fail+0x3c6/0x510 [ 205.658114][T10023] __should_failslab+0xa4/0xe0 [ 205.662720][T10023] ? __alloc_skb+0xbe/0x550 [ 205.667055][T10023] should_failslab+0x9/0x20 [ 205.671397][T10023] slab_pre_alloc_hook+0x37/0xd0 [ 205.676165][T10023] ? __alloc_skb+0xbe/0x550 [ 205.680507][T10023] kmem_cache_alloc+0x44/0x200 [ 205.685208][T10023] ? irqentry_exit+0x30/0x40 [ 205.689633][T10023] __alloc_skb+0xbe/0x550 [ 205.693799][T10023] rtmsg_fib+0x13f/0x620 [ 205.697930][T10023] ? fib_info_nhc+0x1d0/0x1d0 [ 205.702392][T10023] ? fib_insert_alias+0x65c/0x1060 [ 205.707523][T10023] fib_table_insert+0xe1f/0x20c0 [ 205.712396][T10023] ? fib_alias_hw_flags_set+0xb20/0xb20 [ 205.717757][T10023] ? __dev_notify_flags+0x304/0x610 [ 205.722787][T10023] ? dev_ifsioc+0x147/0x10c0 [ 205.727430][T10023] ? dev_ioctl+0x54d/0xe70 [ 205.731705][T10023] fib_add_ifaddr+0xb7d/0x15e0 [ 205.736279][T10023] ? nlmsg_parse_deprecated_strict+0xf0/0xf0 [ 205.742214][T10023] ? arp_mc_map+0x4f1/0x910 [ 205.746558][T10023] ? igmp_group_added+0x1fa/0x800 [ 205.751422][T10023] ? igmpv3_del_delrec+0x740/0x740 [ 205.756365][T10023] ? __kasan_check_write+0x14/0x20 [ 205.761394][T10023] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 205.766262][T10023] ? igmp_group_added+0x1fa/0x800 [ 205.771116][T10023] ? igmpv3_del_delrec+0x740/0x740 [ 205.776064][T10023] ? __local_bh_enable_ip+0x58/0x80 [ 205.781099][T10023] ? fib_netdev_event+0x1e9/0x5d0 [ 205.785960][T10023] fib_netdev_event+0x235/0x5d0 [ 205.790646][T10023] raw_notifier_call_chain+0x8c/0xf0 [ 205.795773][T10023] __dev_notify_flags+0x304/0x610 [ 205.800627][T10023] ? __dev_change_flags+0x6e0/0x6e0 [ 205.805672][T10023] ? __dev_change_flags+0x505/0x6e0 [ 205.810693][T10023] ? dev_get_flags+0x1e0/0x1e0 [ 205.815390][T10023] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 205.821378][T10023] ? full_name_hash+0x57/0xf0 [ 205.825893][T10023] dev_change_flags+0xf0/0x1a0 [ 205.830489][T10023] dev_ifsioc+0x147/0x10c0 [ 205.834741][T10023] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 205.840759][T10023] ? dev_ioctl+0xe70/0xe70 [ 205.844983][T10023] ? mutex_lock+0x135/0x1e0 [ 205.849412][T10023] ? wait_for_completion_killable_timeout+0x10/0x10 [ 205.855843][T10023] dev_ioctl+0x54d/0xe70 [ 205.860001][T10023] sock_do_ioctl+0x34f/0x5a0 [ 205.864427][T10023] ? sock_show_fdinfo+0xa0/0xa0 [ 205.869124][T10023] ? sock_ioctl+0x19e/0x740 [ 205.873480][T10023] ? sock_ioctl+0x441/0x740 [ 205.877913][T10023] sock_ioctl+0x455/0x740 [ 205.882076][T10023] ? sock_poll+0x400/0x400 [ 205.886322][T10023] ? __fget_files+0x31e/0x380 [ 205.890840][T10023] ? security_file_ioctl+0x84/0xb0 [ 205.895783][T10023] ? sock_poll+0x400/0x400 [ 205.900036][T10023] __se_sys_ioctl+0x114/0x190 [ 205.904550][T10023] __x64_sys_ioctl+0x7b/0x90 [ 205.908974][T10023] do_syscall_64+0x3d/0xb0 [ 205.913229][T10023] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 205.918871][T10023] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 205.924599][T10023] RIP: 0033:0x7f4d3ab9af19 [ 205.928858][T10023] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 205.948468][T10023] RSP: 002b:00007f4d3981c048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 205.956709][T10023] RAX: ffffffffffffffda RBX: 00007f4d3ad2af60 RCX: 00007f4d3ab9af19 [ 205.964613][T10023] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000007 [ 205.973030][T10023] RBP: 00007f4d3981c0a0 R08: 0000000000000000 R09: 0000000000000000 [ 205.980863][T10023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 205.988747][T10023] R13: 000000000000000b R14: 00007f4d3ad2af60 R15: 00007fff7864dd08 [ 205.996559][T10023] [ 206.328013][T10042] device veth0_vlan left promiscuous mode [ 206.344443][T10042] device veth0_vlan entered promiscuous mode [ 206.367124][T10047] device veth0_vlan left promiscuous mode [ 206.398193][T10047] device veth0_vlan entered promiscuous mode [ 206.512907][T10056] device syzkaller0 entered promiscuous mode [ 206.612943][T10075] device sit0 left promiscuous mode [ 206.649008][T10075] device sit0 entered promiscuous mode [ 206.763732][T10080] device veth0_vlan left promiscuous mode [ 206.770155][T10080] device veth0_vlan entered promiscuous mode [ 206.777786][T10081] device veth0_vlan left promiscuous mode [ 206.784973][T10081] device veth0_vlan entered promiscuous mode [ 206.813701][T10091] device veth0_vlan left promiscuous mode [ 206.833689][T10091] device veth0_vlan entered promiscuous mode [ 206.928080][T10103] device syzkaller0 entered promiscuous mode [ 207.004942][T10113] device veth0_vlan left promiscuous mode [ 207.011240][T10113] device veth0_vlan entered promiscuous mode [ 207.186789][T10123] device veth0_vlan left promiscuous mode [ 207.197697][T10123] device veth0_vlan entered promiscuous mode [ 207.254753][T10129] device veth0_vlan left promiscuous mode [ 207.266867][T10129] device veth0_vlan entered promiscuous mode [ 207.283007][ T7859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 207.293786][ T7859] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 207.305431][ T7859] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 207.336482][T10136] device veth0_vlan left promiscuous mode [ 207.352212][T10136] device veth0_vlan entered promiscuous mode [ 207.398548][T10138] device syzkaller0 entered promiscuous mode [ 207.417996][T10140] device veth0_vlan left promiscuous mode [ 207.424847][T10140] device veth0_vlan entered promiscuous mode [ 207.547355][T10158] device veth0_vlan left promiscuous mode [ 207.577343][T10158] device veth0_vlan entered promiscuous mode [ 207.593575][T10160] device veth0_vlan left promiscuous mode [ 207.599797][T10160] device veth0_vlan entered promiscuous mode [ 207.697805][T10178] device veth0_vlan left promiscuous mode [ 207.704095][T10178] device veth0_vlan entered promiscuous mode [ 207.723670][T10181] device veth0_vlan left promiscuous mode [ 207.731859][T10181] device veth0_vlan entered promiscuous mode [ 207.785942][T10190] syz.0.3853[10190] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.786021][T10190] syz.0.3853[10190] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.846334][T10193] device syzkaller0 entered promiscuous mode [ 207.908343][T10201] device veth0_vlan left promiscuous mode [ 207.915694][T10201] device veth0_vlan entered promiscuous mode [ 207.962931][T10208] FAULT_INJECTION: forcing a failure. [ 207.962931][T10208] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 207.977515][T10208] CPU: 0 PID: 10208 Comm: syz.2.3860 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 207.987329][T10208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 207.997224][T10208] Call Trace: [ 208.000342][T10208] [ 208.003121][T10208] dump_stack_lvl+0x151/0x1b7 [ 208.007635][T10208] ? io_uring_drop_tctx_refs+0x190/0x190 [ 208.013141][T10208] ? kstrtouint_from_user+0x20a/0x2a0 [ 208.018312][T10208] dump_stack+0x15/0x17 [ 208.022302][T10208] should_fail+0x3c6/0x510 [ 208.026563][T10208] should_fail_usercopy+0x1a/0x20 [ 208.031505][T10208] _copy_to_user+0x20/0x90 [ 208.035758][T10208] simple_read_from_buffer+0xc7/0x150 [ 208.040962][T10208] proc_fail_nth_read+0x1a3/0x210 [ 208.045822][T10208] ? proc_fault_inject_write+0x390/0x390 [ 208.051378][T10208] ? fsnotify_perm+0x470/0x5d0 [ 208.055982][T10208] ? security_file_permission+0x86/0xb0 [ 208.061493][T10208] ? proc_fault_inject_write+0x390/0x390 [ 208.066948][T10208] vfs_read+0x27d/0xd40 [ 208.070943][T10208] ? kernel_read+0x1f0/0x1f0 [ 208.075364][T10208] ? __kasan_check_write+0x14/0x20 [ 208.080574][T10208] ? mutex_lock+0xb6/0x1e0 [ 208.084827][T10208] ? wait_for_completion_killable_timeout+0x10/0x10 [ 208.091250][T10208] ? __fdget_pos+0x2e7/0x3a0 [ 208.095677][T10208] ? ksys_read+0x77/0x2c0 [ 208.099843][T10208] ksys_read+0x199/0x2c0 [ 208.103942][T10208] ? vfs_write+0x1110/0x1110 [ 208.108433][T10208] ? debug_smp_processor_id+0x17/0x20 [ 208.113642][T10208] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 208.119545][T10208] __x64_sys_read+0x7b/0x90 [ 208.123890][T10208] do_syscall_64+0x3d/0xb0 [ 208.128137][T10208] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 208.133874][T10208] RIP: 0033:0x7f4d3ab999fc [ 208.138135][T10208] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8c 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 1f 8d 02 00 48 [ 208.157822][T10208] RSP: 002b:00007f4d3981c040 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 208.166066][T10208] RAX: ffffffffffffffda RBX: 00007f4d3ad2af60 RCX: 00007f4d3ab999fc [ 208.173879][T10208] RDX: 000000000000000f RSI: 00007f4d3981c0b0 RDI: 000000000000000a [ 208.181687][T10208] RBP: 00007f4d3981c0a0 R08: 0000000000000000 R09: 0000000000000000 [ 208.189497][T10208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 208.197395][T10208] R13: 000000000000000b R14: 00007f4d3ad2af60 R15: 00007fff7864dd08 [ 208.205215][T10208] [ 208.245595][T10215] device veth0_vlan left promiscuous mode [ 208.251552][T10215] device veth0_vlan entered promiscuous mode [ 208.264129][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 208.272686][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 208.280710][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 208.297273][T10210] device veth0_vlan left promiscuous mode [ 208.308690][T10210] device veth0_vlan entered promiscuous mode [ 208.353007][ T30] audit: type=1400 audit(1721877337.659:148): avc: denied { create } for pid=10223 comm="syz.0.3867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 208.373460][T10224] device sit0 left promiscuous mode [ 208.423477][T10230] device syzkaller0 entered promiscuous mode [ 208.492053][T10232] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 208.545112][T10235] device veth0_vlan left promiscuous mode [ 208.561237][T10235] device veth0_vlan entered promiscuous mode [ 208.706787][T10249] device veth0_vlan left promiscuous mode [ 208.713192][T10249] device veth0_vlan entered promiscuous mode [ 208.721811][T10262] device sit0 left promiscuous mode [ 208.755453][T10262] device sit0 entered promiscuous mode [ 208.765876][T10262] FAULT_INJECTION: forcing a failure. [ 208.765876][T10262] name failslab, interval 1, probability 0, space 0, times 0 [ 208.785753][T10262] CPU: 1 PID: 10262 Comm: syz.3.3883 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 208.795617][T10262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 208.805562][T10262] Call Trace: [ 208.808683][T10262] [ 208.811457][T10262] dump_stack_lvl+0x151/0x1b7 [ 208.815973][T10262] ? io_uring_drop_tctx_refs+0x190/0x190 [ 208.821447][T10262] dump_stack+0x15/0x17 [ 208.825429][T10262] should_fail+0x3c6/0x510 [ 208.829770][T10262] __should_failslab+0xa4/0xe0 [ 208.834377][T10262] should_failslab+0x9/0x20 [ 208.838707][T10262] slab_pre_alloc_hook+0x37/0xd0 [ 208.843570][T10262] ? rtmsg_fib+0x13f/0x620 [ 208.847821][T10262] __kmalloc_track_caller+0x6c/0x260 [ 208.852942][T10262] ? rtmsg_fib+0x13f/0x620 [ 208.857194][T10262] ? rtmsg_fib+0x13f/0x620 [ 208.861481][T10262] __alloc_skb+0x10c/0x550 [ 208.865705][T10262] rtmsg_fib+0x13f/0x620 [ 208.869778][T10262] ? fib_insert_alias+0x80e/0x1060 [ 208.874729][T10262] ? fib_info_nhc+0x1d0/0x1d0 [ 208.879576][T10262] ? fib_insert_alias+0x65c/0x1060 [ 208.884499][T10262] fib_table_insert+0xe1f/0x20c0 [ 208.889369][T10262] ? __stack_depot_save+0x34/0x470 [ 208.894306][T10262] ? fib_alias_hw_flags_set+0xb20/0xb20 [ 208.899685][T10262] fib_add_ifaddr+0xb7d/0x15e0 [ 208.904288][T10262] ? nlmsg_parse_deprecated_strict+0xf0/0xf0 [ 208.910184][T10262] ? arp_mc_map+0x4f1/0x910 [ 208.914524][T10262] ? igmp_group_added+0x1fa/0x800 [ 208.919418][T10262] ? igmpv3_del_delrec+0x740/0x740 [ 208.924496][T10262] ? __kasan_check_write+0x14/0x20 [ 208.929445][T10262] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 208.934287][T10262] ? igmp_group_added+0x1fa/0x800 [ 208.939149][T10262] ? igmpv3_del_delrec+0x740/0x740 [ 208.944095][T10262] ? __local_bh_enable_ip+0x58/0x80 [ 208.949226][T10262] ? _raw_spin_unlock_bh+0x51/0x60 [ 208.954167][T10262] ? inetdev_event+0xe0c/0x10a0 [ 208.958855][T10262] ? ipv4_doint_and_flush+0x150/0x150 [ 208.964062][T10262] fib_netdev_event+0x235/0x5d0 [ 208.968748][T10262] raw_notifier_call_chain+0x8c/0xf0 [ 208.973866][T10262] __dev_notify_flags+0x304/0x610 [ 208.978725][T10262] ? __dev_change_flags+0x6e0/0x6e0 [ 208.983763][T10262] ? __dev_change_flags+0x505/0x6e0 [ 208.988891][T10262] ? dev_get_flags+0x1e0/0x1e0 [ 208.993479][T10262] ? _kstrtoull+0x3a0/0x4a0 [ 208.997820][T10262] dev_change_flags+0xf0/0x1a0 [ 209.002426][T10262] dev_ifsioc+0x147/0x10c0 [ 209.006672][T10262] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 209.012667][T10262] ? dev_ioctl+0xe70/0xe70 [ 209.016913][T10262] ? mutex_lock+0xb6/0x1e0 [ 209.021283][T10262] ? wait_for_completion_killable_timeout+0x10/0x10 [ 209.027800][T10262] dev_ioctl+0x54d/0xe70 [ 209.031873][T10262] sock_do_ioctl+0x34f/0x5a0 [ 209.036299][T10262] ? sock_show_fdinfo+0xa0/0xa0 [ 209.040985][T10262] ? selinux_file_ioctl+0x3cc/0x540 [ 209.046102][T10262] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 209.052098][T10262] sock_ioctl+0x455/0x740 [ 209.056259][T10262] ? sock_poll+0x400/0x400 [ 209.060511][T10262] ? __fget_files+0x31e/0x380 [ 209.065028][T10262] ? security_file_ioctl+0x84/0xb0 [ 209.070000][T10262] ? sock_poll+0x400/0x400 [ 209.074240][T10262] __se_sys_ioctl+0x114/0x190 [ 209.078738][T10262] __x64_sys_ioctl+0x7b/0x90 [ 209.083168][T10262] do_syscall_64+0x3d/0xb0 [ 209.087417][T10262] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 209.093061][T10262] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 209.098787][T10262] RIP: 0033:0x7f8ae99b1f19 [ 209.103047][T10262] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 209.122481][T10262] RSP: 002b:00007f8ae8633048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 209.130725][T10262] RAX: ffffffffffffffda RBX: 00007f8ae9b41f60 RCX: 00007f8ae99b1f19 [ 209.138712][T10262] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000007 [ 209.146613][T10262] RBP: 00007f8ae86330a0 R08: 0000000000000000 R09: 0000000000000000 [ 209.154424][T10262] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 209.162234][T10262] R13: 000000000000000b R14: 00007f8ae9b41f60 R15: 00007ffc34c42528 [ 209.170051][T10262] [ 209.257559][T10271] device veth0_vlan left promiscuous mode [ 209.267736][T10271] device veth0_vlan entered promiscuous mode [ 209.288143][T10269] device syzkaller0 entered promiscuous mode [ 209.295093][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 209.307873][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 209.318963][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 209.357317][T10284] device sit0 entered promiscuous mode [ 209.516838][T10291] device veth0_vlan left promiscuous mode [ 209.556010][T10291] device veth0_vlan entered promiscuous mode [ 209.605870][T10303] device veth0_vlan left promiscuous mode [ 209.612848][T10303] device veth0_vlan entered promiscuous mode [ 209.777750][T10313] device syzkaller0 entered promiscuous mode [ 210.161666][T10342] FAULT_INJECTION: forcing a failure. [ 210.161666][T10342] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 210.163011][T10340] device veth0_vlan left promiscuous mode [ 210.180314][T10342] CPU: 1 PID: 10342 Comm: syz.3.3918 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 210.190119][T10342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 210.200016][T10342] Call Trace: [ 210.203139][T10342] [ 210.205915][T10342] dump_stack_lvl+0x151/0x1b7 [ 210.210427][T10342] ? io_uring_drop_tctx_refs+0x190/0x190 [ 210.215897][T10342] ? kmem_cache_free+0x116/0x2e0 [ 210.220676][T10342] dump_stack+0x15/0x17 [ 210.224661][T10342] should_fail+0x3c6/0x510 [ 210.228914][T10342] should_fail_usercopy+0x1a/0x20 [ 210.233792][T10342] _copy_from_user+0x20/0xd0 [ 210.238202][T10342] __copy_msghdr_from_user+0xaf/0x7c0 [ 210.243408][T10342] ? __ia32_sys_shutdown+0x70/0x70 [ 210.248357][T10342] ___sys_sendmsg+0x166/0x2e0 [ 210.252873][T10342] ? __sys_sendmsg+0x260/0x260 [ 210.257478][T10342] ? __fdget+0x1bc/0x240 [ 210.261547][T10342] __se_sys_sendmsg+0x19a/0x260 [ 210.266234][T10342] ? __x64_sys_sendmsg+0x90/0x90 [ 210.271005][T10342] ? ksys_write+0x260/0x2c0 [ 210.275348][T10342] ? debug_smp_processor_id+0x17/0x20 [ 210.280553][T10342] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 210.286544][T10342] __x64_sys_sendmsg+0x7b/0x90 [ 210.291142][T10342] do_syscall_64+0x3d/0xb0 [ 210.295403][T10342] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 210.301219][T10342] RIP: 0033:0x7f8ae99b1f19 [ 210.305473][T10342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 210.325087][T10342] RSP: 002b:00007f8ae8633048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 210.333332][T10342] RAX: ffffffffffffffda RBX: 00007f8ae9b41f60 RCX: 00007f8ae99b1f19 [ 210.341152][T10342] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000006 [ 210.348954][T10342] RBP: 00007f8ae86330a0 R08: 0000000000000000 R09: 0000000000000000 [ 210.356761][T10342] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 210.364573][T10342] R13: 000000000000000b R14: 00007f8ae9b41f60 R15: 00007ffc34c42528 [ 210.372395][T10342] [ 210.377201][T10340] device veth0_vlan entered promiscuous mode [ 210.386549][T10338] device veth0_vlan left promiscuous mode [ 210.392929][T10338] device veth0_vlan entered promiscuous mode [ 210.491848][T10353] device syzkaller0 entered promiscuous mode [ 210.606267][T10358] device syzkaller0 entered promiscuous mode [ 210.703311][T10371] device syzkaller0 entered promiscuous mode [ 210.848380][T10377] device veth0_vlan left promiscuous mode [ 210.858504][T10377] device veth0_vlan entered promiscuous mode [ 210.887951][T10383] device veth0_vlan left promiscuous mode [ 210.908277][T10383] device veth0_vlan entered promiscuous mode [ 211.082360][T10392] device syzkaller0 entered promiscuous mode [ 211.206774][T10402] device syzkaller0 entered promiscuous mode [ 213.424906][T10416] device veth0_vlan left promiscuous mode [ 213.431241][T10416] device veth0_vlan entered promiscuous mode [ 213.534933][T10432] device syzkaller0 entered promiscuous mode [ 213.544627][T10424] device veth0_vlan left promiscuous mode [ 213.551612][T10424] device veth0_vlan entered promiscuous mode [ 213.626712][T10438] device syzkaller0 entered promiscuous mode [ 213.748618][T10447] device sit0 left promiscuous mode [ 213.783118][T10447] device sit0 entered promiscuous mode [ 213.789556][T10447] FAULT_INJECTION: forcing a failure. [ 213.789556][T10447] name failslab, interval 1, probability 0, space 0, times 0 [ 213.814954][T10447] CPU: 1 PID: 10447 Comm: syz.1.3962 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 213.824864][T10447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 213.834764][T10447] Call Trace: [ 213.837879][T10447] [ 213.840658][T10447] dump_stack_lvl+0x151/0x1b7 [ 213.845256][T10447] ? io_uring_drop_tctx_refs+0x190/0x190 [ 213.850725][T10447] ? netlink_broadcast_filtered+0x11e0/0x1220 [ 213.856717][T10447] dump_stack+0x15/0x17 [ 213.860792][T10447] should_fail+0x3c6/0x510 [ 213.865222][T10447] __should_failslab+0xa4/0xe0 [ 213.869822][T10447] should_failslab+0x9/0x20 [ 213.874163][T10447] slab_pre_alloc_hook+0x37/0xd0 [ 213.878938][T10447] __kmalloc+0x6d/0x270 [ 213.883314][T10447] ? fib_create_info+0x8b2/0x1ec0 [ 213.888142][T10447] fib_create_info+0x8b2/0x1ec0 [ 213.892820][T10447] ? fib_info_nhc+0x1d0/0x1d0 [ 213.897832][T10447] ? fib_insert_alias+0x65c/0x1060 [ 213.902717][T10447] fib_table_insert+0x1df/0x20c0 [ 213.907593][T10447] ? fib_alias_hw_flags_set+0xb20/0xb20 [ 213.912972][T10447] ? __dev_notify_flags+0x304/0x610 [ 213.918182][T10447] ? dev_ifsioc+0x147/0x10c0 [ 213.922621][T10447] ? dev_ioctl+0x54d/0xe70 [ 213.926853][T10447] fib_add_ifaddr+0xe49/0x15e0 [ 213.931454][T10447] ? nlmsg_parse_deprecated_strict+0xf0/0xf0 [ 213.937272][T10447] ? igmpv3_del_delrec+0x740/0x740 [ 213.942227][T10447] ? __kasan_check_write+0x14/0x20 [ 213.947162][T10447] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 213.952028][T10447] ? irqentry_exit+0x30/0x40 [ 213.956454][T10447] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 213.962094][T10447] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 213.968089][T10447] ? inetdev_event+0xe0c/0x10a0 [ 213.972944][T10447] ? ipv4_doint_and_flush+0x150/0x150 [ 213.978147][T10447] fib_netdev_event+0x235/0x5d0 [ 213.982832][T10447] raw_notifier_call_chain+0x8c/0xf0 [ 213.987952][T10447] __dev_notify_flags+0x304/0x610 [ 213.992829][T10447] ? __dev_change_flags+0x6e0/0x6e0 [ 213.997855][T10447] ? __dev_change_flags+0x505/0x6e0 [ 214.002975][T10447] ? dev_get_flags+0x1e0/0x1e0 [ 214.007654][T10447] ? _kstrtoull+0x3a0/0x4a0 [ 214.011996][T10447] dev_change_flags+0xf0/0x1a0 [ 214.016599][T10447] dev_ifsioc+0x147/0x10c0 [ 214.020935][T10447] ? dev_ioctl+0xe70/0xe70 [ 214.025186][T10447] ? mutex_lock+0xb6/0x1e0 [ 214.029436][T10447] ? __sanitizer_cov_trace_const_cmp2+0x90/0x90 [ 214.035515][T10447] ? wait_for_completion_killable_timeout+0x10/0x10 [ 214.041939][T10447] dev_ioctl+0x54d/0xe70 [ 214.046018][T10447] sock_do_ioctl+0x34f/0x5a0 [ 214.050445][T10447] ? sock_show_fdinfo+0xa0/0xa0 [ 214.055132][T10447] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 214.060769][T10447] ? selinux_file_ioctl+0x3cc/0x540 [ 214.065806][T10447] sock_ioctl+0x455/0x740 [ 214.069971][T10447] ? sock_poll+0x400/0x400 [ 214.074224][T10447] ? __fget_files+0x31e/0x380 [ 214.078740][T10447] ? security_file_ioctl+0x84/0xb0 [ 214.083693][T10447] ? sock_poll+0x400/0x400 [ 214.088025][T10447] __se_sys_ioctl+0x114/0x190 [ 214.092538][T10447] __x64_sys_ioctl+0x7b/0x90 [ 214.096963][T10447] do_syscall_64+0x3d/0xb0 [ 214.101214][T10447] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 214.106857][T10447] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 214.112593][T10447] RIP: 0033:0x7f8864090f19 [ 214.116839][T10447] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 214.136370][T10447] RSP: 002b:00007f8862d12048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 214.144611][T10447] RAX: ffffffffffffffda RBX: 00007f8864220f60 RCX: 00007f8864090f19 [ 214.152420][T10447] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000007 [ 214.160237][T10447] RBP: 00007f8862d120a0 R08: 0000000000000000 R09: 0000000000000000 [ 214.168305][T10447] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 214.176117][T10447] R13: 000000000000000b R14: 00007f8864220f60 R15: 00007ffc36ea14c8 [ 214.183935][T10447] [ 214.372773][T10460] device syzkaller0 entered promiscuous mode [ 214.394484][T10459] device veth0_vlan left promiscuous mode [ 214.401620][T10459] device veth0_vlan entered promiscuous mode [ 214.409612][T10467] device veth0_vlan left promiscuous mode [ 214.420979][T10467] device veth0_vlan entered promiscuous mode [ 214.482999][T10480] syz.0.3974[10480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.483085][T10480] syz.0.3974[10480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.484841][T10471] device syzkaller0 entered promiscuous mode [ 214.628940][T10488] device syzkaller0 entered promiscuous mode [ 214.784441][T10500] device veth0_vlan left promiscuous mode [ 214.790999][T10500] device veth0_vlan entered promiscuous mode [ 214.861539][T10503] device veth0_vlan left promiscuous mode [ 214.867886][T10503] device veth0_vlan entered promiscuous mode [ 215.004920][T10521] device syzkaller0 entered promiscuous mode [ 215.052289][T10523] device syzkaller0 entered promiscuous mode [ 215.069619][T10529] device veth0_vlan left promiscuous mode [ 215.076152][T10529] device veth0_vlan entered promiscuous mode [ 215.105711][T10533] device syzkaller0 entered promiscuous mode [ 215.339072][T10549] device veth0_vlan left promiscuous mode [ 215.352468][T10549] device veth0_vlan entered promiscuous mode [ 215.436304][T10561] device syzkaller0 entered promiscuous mode [ 215.451095][T10562] device veth0_vlan left promiscuous mode [ 215.462494][T10562] device veth0_vlan entered promiscuous mode [ 215.547391][T10578] FAULT_INJECTION: forcing a failure. [ 215.547391][T10578] name failslab, interval 1, probability 0, space 0, times 0 [ 215.570254][T10578] CPU: 0 PID: 10578 Comm: syz.1.4013 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 215.580080][T10578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 215.589982][T10578] Call Trace: [ 215.593098][T10578] [ 215.595878][T10578] dump_stack_lvl+0x151/0x1b7 [ 215.600388][T10578] ? io_uring_drop_tctx_refs+0x190/0x190 [ 215.605855][T10578] ? new_inode_pseudo+0x93/0x220 [ 215.610629][T10578] ? proc_pid_make_inode+0x27/0x1d0 [ 215.615747][T10578] ? proc_pident_instantiate+0x7a/0x2e0 [ 215.621128][T10578] ? proc_pident_lookup+0x1c4/0x260 [ 215.626163][T10578] ? path_openat+0x1194/0x2f40 [ 215.630760][T10578] ? do_filp_open+0x21c/0x460 [ 215.635273][T10578] ? do_sys_openat2+0x13f/0x830 [ 215.639963][T10578] ? __x64_sys_openat+0x243/0x290 [ 215.644833][T10578] dump_stack+0x15/0x17 [ 215.648816][T10578] should_fail+0x3c6/0x510 [ 215.653072][T10578] __should_failslab+0xa4/0xe0 [ 215.657669][T10578] ? __alloc_skb+0xbe/0x550 [ 215.662008][T10578] should_failslab+0x9/0x20 [ 215.666346][T10578] slab_pre_alloc_hook+0x37/0xd0 [ 215.671122][T10578] ? __alloc_skb+0xbe/0x550 [ 215.675461][T10578] kmem_cache_alloc+0x44/0x200 [ 215.680061][T10578] __alloc_skb+0xbe/0x550 [ 215.684229][T10578] alloc_skb_with_frags+0xa6/0x680 [ 215.689177][T10578] ? memcpy+0x56/0x70 [ 215.693000][T10578] sock_alloc_send_pskb+0x915/0xa50 [ 215.698031][T10578] ? sock_kzfree_s+0x60/0x60 [ 215.702454][T10578] ? __kasan_check_write+0x14/0x20 [ 215.707401][T10578] ? _raw_spin_lock+0xa4/0x1b0 [ 215.712005][T10578] ? _raw_spin_trylock_bh+0x190/0x190 [ 215.717219][T10578] unix_dgram_sendmsg+0x6fd/0x2090 [ 215.722161][T10578] ? unix_dgram_poll+0x710/0x710 [ 215.726935][T10578] ? kmem_cache_free+0x116/0x2e0 [ 215.731709][T10578] ? ____kasan_slab_free+0x126/0x160 [ 215.736819][T10578] ? __kasan_slab_free+0x11/0x20 [ 215.741681][T10578] ? slab_free_freelist_hook+0xbd/0x190 [ 215.747066][T10578] ? security_socket_sendmsg+0x82/0xb0 [ 215.752360][T10578] ? unix_dgram_poll+0x710/0x710 [ 215.757137][T10578] ____sys_sendmsg+0x59e/0x8f0 [ 215.761733][T10578] ? __sys_sendmsg_sock+0x40/0x40 [ 215.766595][T10578] ? import_iovec+0xe5/0x120 [ 215.771027][T10578] ___sys_sendmsg+0x252/0x2e0 [ 215.775538][T10578] ? __sys_sendmsg+0x260/0x260 [ 215.780141][T10578] ? __fdget+0x1bc/0x240 [ 215.784220][T10578] __se_sys_sendmsg+0x19a/0x260 [ 215.788897][T10578] ? __x64_sys_sendmsg+0x90/0x90 [ 215.793671][T10578] ? ksys_write+0x260/0x2c0 [ 215.798018][T10578] ? debug_smp_processor_id+0x17/0x20 [ 215.803221][T10578] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 215.809126][T10578] __x64_sys_sendmsg+0x7b/0x90 [ 215.813723][T10578] do_syscall_64+0x3d/0xb0 [ 215.817982][T10578] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 215.823708][T10578] RIP: 0033:0x7f8864090f19 [ 215.827957][T10578] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 215.848097][T10578] RSP: 002b:00007f8862d12048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 215.856333][T10578] RAX: ffffffffffffffda RBX: 00007f8864220f60 RCX: 00007f8864090f19 [ 215.864144][T10578] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000006 [ 215.871958][T10578] RBP: 00007f8862d120a0 R08: 0000000000000000 R09: 0000000000000000 [ 215.879853][T10578] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 215.887669][T10578] R13: 000000000000000b R14: 00007f8864220f60 R15: 00007ffc36ea14c8 [ 215.895492][T10578] [ 216.254479][T10601] device veth0_vlan left promiscuous mode [ 216.261202][T10601] device veth0_vlan entered promiscuous mode [ 216.326502][T10607] device veth0_vlan left promiscuous mode [ 216.333094][T10607] device veth0_vlan entered promiscuous mode [ 216.371368][T10611] device syzkaller0 entered promiscuous mode [ 216.404115][ T30] audit: type=1400 audit(1721877345.709:149): avc: denied { tracepoint } for pid=10618 comm="syz.2.4029" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 216.580466][T10640] device veth0_vlan left promiscuous mode [ 216.588733][T10640] device veth0_vlan entered promiscuous mode [ 216.656651][T10646] device veth0_vlan left promiscuous mode [ 216.663409][T10646] device veth0_vlan entered promiscuous mode [ 216.859327][T10663] device syzkaller0 entered promiscuous mode [ 216.896595][T10665] device syzkaller0 entered promiscuous mode [ 217.004437][T10669] device veth0_vlan left promiscuous mode [ 217.015472][T10669] device veth0_vlan entered promiscuous mode [ 217.049177][T10671] device sit0 left promiscuous mode [ 217.072197][T10671] device sit0 entered promiscuous mode [ 217.079560][T10671] FAULT_INJECTION: forcing a failure. [ 217.079560][T10671] name failslab, interval 1, probability 0, space 0, times 0 [ 217.106057][T10671] CPU: 0 PID: 10671 Comm: syz.2.4051 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 217.115870][T10671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 217.126026][T10671] Call Trace: [ 217.129245][T10671] [ 217.132023][T10671] dump_stack_lvl+0x151/0x1b7 [ 217.136536][T10671] ? io_uring_drop_tctx_refs+0x190/0x190 [ 217.142293][T10671] ? __kasan_check_write+0x14/0x20 [ 217.147238][T10671] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 217.152447][T10671] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 217.157481][T10671] dump_stack+0x15/0x17 [ 217.161476][T10671] should_fail+0x3c6/0x510 [ 217.165728][T10671] __should_failslab+0xa4/0xe0 [ 217.170327][T10671] ? fib_table_insert+0x853/0x20c0 [ 217.175272][T10671] should_failslab+0x9/0x20 [ 217.179613][T10671] slab_pre_alloc_hook+0x37/0xd0 [ 217.184485][T10671] ? fib_table_insert+0x853/0x20c0 [ 217.189462][T10671] kmem_cache_alloc+0x44/0x200 [ 217.194026][T10671] fib_table_insert+0x853/0x20c0 [ 217.198849][T10671] ? fib_alias_hw_flags_set+0xb20/0xb20 [ 217.204177][T10671] fib_add_ifaddr+0xe49/0x15e0 [ 217.208778][T10671] ? nlmsg_parse_deprecated_strict+0xf0/0xf0 [ 217.214593][T10671] ? igmpv3_del_delrec+0x740/0x740 [ 217.219707][T10671] ? __kasan_check_write+0x14/0x20 [ 217.224651][T10671] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 217.229515][T10671] ? igmp_group_added+0x1fa/0x800 [ 217.234373][T10671] ? igmpv3_del_delrec+0x740/0x740 [ 217.239321][T10671] ? __local_bh_enable_ip+0x58/0x80 [ 217.244361][T10671] ? raw_notifier_call_chain+0xb0/0xf0 [ 217.249655][T10671] fib_netdev_event+0x235/0x5d0 [ 217.254339][T10671] raw_notifier_call_chain+0x8c/0xf0 [ 217.259456][T10671] __dev_notify_flags+0x304/0x610 [ 217.264319][T10671] ? __dev_change_flags+0x6e0/0x6e0 [ 217.269349][T10671] ? __dev_change_flags+0x505/0x6e0 [ 217.274384][T10671] ? dev_get_flags+0x1e0/0x1e0 [ 217.278987][T10671] ? _kstrtoull+0x3a0/0x4a0 [ 217.283328][T10671] dev_change_flags+0xf0/0x1a0 [ 217.287928][T10671] dev_ifsioc+0x147/0x10c0 [ 217.292179][T10671] ? irqentry_exit+0x30/0x40 [ 217.296606][T10671] ? dev_ioctl+0xe70/0xe70 [ 217.300856][T10671] ? mutex_lock+0xb6/0x1e0 [ 217.305119][T10671] ? wait_for_completion_killable_timeout+0x10/0x10 [ 217.311533][T10671] dev_ioctl+0x54d/0xe70 [ 217.315615][T10671] sock_do_ioctl+0x34f/0x5a0 [ 217.320040][T10671] ? sock_show_fdinfo+0xa0/0xa0 [ 217.324727][T10671] ? selinux_file_ioctl+0x3cc/0x540 [ 217.329761][T10671] sock_ioctl+0x455/0x740 [ 217.333926][T10671] ? sock_poll+0x400/0x400 [ 217.338175][T10671] ? __fget_files+0x31e/0x380 [ 217.342692][T10671] ? security_file_ioctl+0x84/0xb0 [ 217.347635][T10671] ? sock_poll+0x400/0x400 [ 217.352093][T10671] __se_sys_ioctl+0x114/0x190 [ 217.356579][T10671] __x64_sys_ioctl+0x7b/0x90 [ 217.361127][T10671] do_syscall_64+0x3d/0xb0 [ 217.365373][T10671] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 217.371018][T10671] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 217.376747][T10671] RIP: 0033:0x7f4d3ab9af19 [ 217.381001][T10671] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 217.400526][T10671] RSP: 002b:00007f4d3981c048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 217.408773][T10671] RAX: ffffffffffffffda RBX: 00007f4d3ad2af60 RCX: 00007f4d3ab9af19 [ 217.416580][T10671] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000007 [ 217.424394][T10671] RBP: 00007f4d3981c0a0 R08: 0000000000000000 R09: 0000000000000000 [ 217.432203][T10671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 217.440014][T10671] R13: 000000000000000b R14: 00007f4d3ad2af60 R15: 00007fff7864dd08 [ 217.447834][T10671] [ 217.620311][T10674] device veth0_vlan left promiscuous mode [ 217.634110][T10674] device veth0_vlan entered promiscuous mode [ 217.755042][T10698] device syzkaller0 entered promiscuous mode [ 217.768022][T10705] device vlan1 entered promiscuous mode [ 217.801173][T10700] device syzkaller0 entered promiscuous mode [ 217.813932][T10702] device veth0_vlan left promiscuous mode [ 217.821504][T10702] device veth0_vlan entered promiscuous mode [ 218.121671][T10733] device veth0_vlan left promiscuous mode [ 218.135041][T10733] device veth0_vlan entered promiscuous mode [ 218.178065][T10737] device sit0 left promiscuous mode [ 218.226945][T10743] device syzkaller0 entered promiscuous mode [ 218.255638][T10746] device veth0_vlan left promiscuous mode [ 218.263874][T10750] FAULT_INJECTION: forcing a failure. [ 218.263874][T10750] name failslab, interval 1, probability 0, space 0, times 0 [ 218.271376][T10746] device veth0_vlan entered promiscuous mode [ 218.284838][T10750] CPU: 0 PID: 10750 Comm: syz.0.4081 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 218.286883][T10737] device sit0 entered promiscuous mode [ 218.294655][T10750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 218.294673][T10750] Call Trace: [ 218.294679][T10750] [ 218.294687][T10750] dump_stack_lvl+0x151/0x1b7 [ 218.294716][T10750] ? io_uring_drop_tctx_refs+0x190/0x190 [ 218.294743][T10750] dump_stack+0x15/0x17 [ 218.294766][T10750] should_fail+0x3c6/0x510 [ 218.294797][T10750] __should_failslab+0xa4/0xe0 [ 218.294825][T10750] should_failslab+0x9/0x20 [ 218.294852][T10750] slab_pre_alloc_hook+0x37/0xd0 [ 218.294875][T10750] ? alloc_skb_with_frags+0xa6/0x680 [ 218.294909][T10750] __kmalloc_track_caller+0x6c/0x260 [ 218.294938][T10750] ? alloc_skb_with_frags+0xa6/0x680 [ 218.294961][T10750] ? alloc_skb_with_frags+0xa6/0x680 [ 218.294985][T10750] __alloc_skb+0x10c/0x550 [ 218.295005][T10750] alloc_skb_with_frags+0xa6/0x680 [ 218.295028][T10750] ? memcpy+0x56/0x70 [ 218.295050][T10750] sock_alloc_send_pskb+0x915/0xa50 [ 218.295076][T10750] ? sock_kzfree_s+0x60/0x60 [ 218.295093][T10750] ? __kasan_check_write+0x14/0x20 [ 218.295114][T10750] ? _raw_spin_lock+0xa4/0x1b0 [ 218.295132][T10750] ? _raw_spin_trylock_bh+0x190/0x190 [ 218.295155][T10750] unix_dgram_sendmsg+0x6fd/0x2090 [ 218.295186][T10750] ? unix_dgram_poll+0x710/0x710 [ 218.295207][T10750] ? kmem_cache_free+0x116/0x2e0 [ 218.295230][T10750] ? ____kasan_slab_free+0x126/0x160 [ 218.295251][T10750] ? __kasan_slab_free+0x11/0x20 [ 218.295269][T10750] ? slab_free_freelist_hook+0xbd/0x190 [ 218.295294][T10750] ? security_socket_sendmsg+0x82/0xb0 [ 218.295315][T10750] ? unix_dgram_poll+0x710/0x710 [ 218.295338][T10750] ____sys_sendmsg+0x59e/0x8f0 [ 218.295363][T10750] ? __sys_sendmsg_sock+0x40/0x40 [ 218.295387][T10750] ? import_iovec+0xe5/0x120 [ 218.295411][T10750] ___sys_sendmsg+0x252/0x2e0 [ 218.295434][T10750] ? __sys_sendmsg+0x260/0x260 [ 218.295470][T10750] ? __fdget+0x1bc/0x240 [ 218.295490][T10750] __se_sys_sendmsg+0x19a/0x260 [ 218.295512][T10750] ? __x64_sys_sendmsg+0x90/0x90 [ 218.295533][T10750] ? ksys_write+0x260/0x2c0 [ 218.295555][T10750] ? debug_smp_processor_id+0x17/0x20 [ 218.295578][T10750] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 218.295604][T10750] __x64_sys_sendmsg+0x7b/0x90 [ 218.295626][T10750] do_syscall_64+0x3d/0xb0 [ 218.295647][T10750] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 218.295669][T10750] RIP: 0033:0x7f5ca9389f19 [ 218.295689][T10750] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 218.295708][T10750] RSP: 002b:00007f5ca800b048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 218.295731][T10750] RAX: ffffffffffffffda RBX: 00007f5ca9519f60 RCX: 00007f5ca9389f19 [ 218.295748][T10750] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000006 [ 218.295762][T10750] RBP: 00007f5ca800b0a0 R08: 0000000000000000 R09: 0000000000000000 [ 218.295776][T10750] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 218.295795][T10750] R13: 000000000000000b R14: 00007f5ca9519f60 R15: 00007ffd72c52ae8 [ 218.295816][T10750] [ 218.867298][T10766] device syzkaller0 entered promiscuous mode [ 219.083872][T10778] device veth0_vlan left promiscuous mode [ 219.090730][T10778] device veth0_vlan entered promiscuous mode [ 219.107628][T10791] device veth0_vlan left promiscuous mode [ 219.114076][T10791] device veth0_vlan entered promiscuous mode [ 219.174308][T10797] device syzkaller0 entered promiscuous mode [ 219.208815][T10805] device sit0 left promiscuous mode [ 219.259396][T10805] device syzkaller0 entered promiscuous mode [ 219.299849][T10821] device veth0_vlan left promiscuous mode [ 219.306903][T10821] device veth0_vlan entered promiscuous mode [ 219.322646][T10805] device sit0 entered promiscuous mode [ 219.552985][T10830] device veth0_vlan left promiscuous mode [ 219.559868][T10830] device veth0_vlan entered promiscuous mode [ 219.636030][T10851] device syzkaller0 entered promiscuous mode [ 219.673886][T10858] device sit0 left promiscuous mode [ 219.698936][T10860] device veth0_vlan left promiscuous mode [ 219.705634][T10860] device veth0_vlan entered promiscuous mode [ 219.714781][T10858] device sit0 entered promiscuous mode [ 219.731154][T10858] FAULT_INJECTION: forcing a failure. [ 219.731154][T10858] name failslab, interval 1, probability 0, space 0, times 0 [ 219.745383][T10858] CPU: 0 PID: 10858 Comm: syz.3.4123 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 219.755343][T10858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 219.765202][T10858] Call Trace: [ 219.768318][T10858] [ 219.771099][T10858] dump_stack_lvl+0x151/0x1b7 [ 219.775622][T10858] ? io_uring_drop_tctx_refs+0x190/0x190 [ 219.781455][T10858] ? slab_post_alloc_hook+0x53/0x2c0 [ 219.786581][T10858] ? fib_table_insert+0x853/0x20c0 [ 219.791521][T10858] ? fib_add_ifaddr+0xe49/0x15e0 [ 219.796296][T10858] ? fib_netdev_event+0x235/0x5d0 [ 219.801157][T10858] ? __dev_notify_flags+0x304/0x610 [ 219.806210][T10858] dump_stack+0x15/0x17 [ 219.810187][T10858] should_fail+0x3c6/0x510 [ 219.814539][T10858] __should_failslab+0xa4/0xe0 [ 219.819122][T10858] ? __alloc_skb+0xbe/0x550 [ 219.823463][T10858] should_failslab+0x9/0x20 [ 219.827810][T10858] slab_pre_alloc_hook+0x37/0xd0 [ 219.832755][T10858] ? __alloc_skb+0xbe/0x550 [ 219.837088][T10858] kmem_cache_alloc+0x44/0x200 [ 219.842038][T10858] __alloc_skb+0xbe/0x550 [ 219.846201][T10858] rtmsg_fib+0x13f/0x620 [ 219.850288][T10858] ? fib_info_nhc+0x1d0/0x1d0 [ 219.854882][T10858] ? fib_insert_alias+0x65c/0x1060 [ 219.859836][T10858] fib_table_insert+0xe1f/0x20c0 [ 219.864599][T10858] ? __stack_depot_save+0x34/0x470 [ 219.869566][T10858] ? fib_alias_hw_flags_set+0xb20/0xb20 [ 219.875017][T10858] fib_add_ifaddr+0xe49/0x15e0 [ 219.879929][T10858] ? nlmsg_parse_deprecated_strict+0xf0/0xf0 [ 219.885726][T10858] ? irqentry_exit+0x30/0x40 [ 219.890147][T10858] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 219.895795][T10858] ? igmp_group_added+0xa5/0x800 [ 219.900566][T10858] ? irqentry_exit+0x30/0x40 [ 219.904995][T10858] ? fib_netdev_event+0x1e9/0x5d0 [ 219.909854][T10858] fib_netdev_event+0x235/0x5d0 [ 219.914546][T10858] raw_notifier_call_chain+0x8c/0xf0 [ 219.919675][T10858] __dev_notify_flags+0x304/0x610 [ 219.924529][T10858] ? __dev_change_flags+0x6e0/0x6e0 [ 219.929559][T10858] ? __dev_change_flags+0x505/0x6e0 [ 219.934642][T10858] ? dev_get_flags+0x1e0/0x1e0 [ 219.939190][T10858] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 219.945177][T10858] ? full_name_hash+0x57/0xf0 [ 219.949689][T10858] dev_change_flags+0xf0/0x1a0 [ 219.954294][T10858] dev_ifsioc+0x147/0x10c0 [ 219.958541][T10858] ? dev_ioctl+0xe70/0xe70 [ 219.962799][T10858] ? mutex_lock+0x135/0x1e0 [ 219.967134][T10858] ? wait_for_completion_killable_timeout+0x10/0x10 [ 219.973568][T10858] dev_ioctl+0x54d/0xe70 [ 219.977654][T10858] sock_do_ioctl+0x34f/0x5a0 [ 219.982062][T10858] ? sock_show_fdinfo+0xa0/0xa0 [ 219.986752][T10858] ? sock_ioctl+0x19e/0x740 [ 219.991092][T10858] ? sock_ioctl+0x441/0x740 [ 219.995564][T10858] sock_ioctl+0x455/0x740 [ 220.000076][T10858] ? sock_poll+0x400/0x400 [ 220.004333][T10858] ? __fget_files+0x31e/0x380 [ 220.008844][T10858] ? security_file_ioctl+0x84/0xb0 [ 220.013790][T10858] ? sock_poll+0x400/0x400 [ 220.018040][T10858] __se_sys_ioctl+0x114/0x190 [ 220.022608][T10858] __x64_sys_ioctl+0x7b/0x90 [ 220.026983][T10858] do_syscall_64+0x3d/0xb0 [ 220.031232][T10858] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 220.036923][T10858] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 220.042610][T10858] RIP: 0033:0x7f8ae99b1f19 [ 220.046860][T10858] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 220.066638][T10858] RSP: 002b:00007f8ae8633048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 220.074881][T10858] RAX: ffffffffffffffda RBX: 00007f8ae9b41f60 RCX: 00007f8ae99b1f19 [ 220.082778][T10858] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000007 [ 220.090673][T10858] RBP: 00007f8ae86330a0 R08: 0000000000000000 R09: 0000000000000000 [ 220.098579][T10858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 220.106381][T10858] R13: 000000000000000b R14: 00007f8ae9b41f60 R15: 00007ffc34c42528 [ 220.114202][T10858] [ 220.257634][T10873] device veth0_vlan left promiscuous mode [ 220.264151][T10873] device veth0_vlan entered promiscuous mode [ 220.281254][T10875] device sit0 left promiscuous mode [ 220.543637][T10883] device syzkaller0 entered promiscuous mode [ 220.557748][T10875] device sit0 entered promiscuous mode [ 220.794358][T10891] device veth0_vlan left promiscuous mode [ 220.809097][T10891] device veth0_vlan entered promiscuous mode [ 220.923113][T10902] FAULT_INJECTION: forcing a failure. [ 220.923113][T10902] name failslab, interval 1, probability 0, space 0, times 0 [ 220.968658][T10898] device syzkaller0 entered promiscuous mode [ 220.975803][T10902] CPU: 0 PID: 10902 Comm: syz.3.4141 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 220.985621][T10902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 220.995513][T10902] Call Trace: [ 220.998631][T10902] [ 221.001410][T10902] dump_stack_lvl+0x151/0x1b7 [ 221.005922][T10902] ? io_uring_drop_tctx_refs+0x190/0x190 [ 221.011399][T10902] dump_stack+0x15/0x17 [ 221.015383][T10902] should_fail+0x3c6/0x510 [ 221.019643][T10902] __should_failslab+0xa4/0xe0 [ 221.024239][T10902] ? __alloc_skb+0xbe/0x550 [ 221.028663][T10902] should_failslab+0x9/0x20 [ 221.033010][T10902] slab_pre_alloc_hook+0x37/0xd0 [ 221.037779][T10902] ? __alloc_skb+0xbe/0x550 [ 221.042116][T10902] kmem_cache_alloc+0x44/0x200 [ 221.046719][T10902] __alloc_skb+0xbe/0x550 [ 221.050883][T10902] alloc_skb_with_frags+0xa6/0x680 [ 221.055832][T10902] ? 0xffffffffa0024c90 [ 221.059822][T10902] ? is_bpf_text_address+0x172/0x190 [ 221.064942][T10902] ? stack_trace_save+0x1c0/0x1c0 [ 221.069804][T10902] sock_alloc_send_pskb+0x915/0xa50 [ 221.074929][T10902] ? sock_kzfree_s+0x60/0x60 [ 221.079347][T10902] ? stack_trace_snprint+0xf0/0xf0 [ 221.084297][T10902] ? __stack_depot_save+0x34/0x470 [ 221.089257][T10902] tun_get_user+0xf1b/0x3aa0 [ 221.093669][T10902] ? kasan_set_track+0x4b/0x70 [ 221.098267][T10902] ? kasan_set_free_info+0x23/0x40 [ 221.103217][T10902] ? _kstrtoull+0x3a0/0x4a0 [ 221.107560][T10902] ? tun_do_read+0x1ef0/0x1ef0 [ 221.112155][T10902] ? kstrtouint_from_user+0x20a/0x2a0 [ 221.117446][T10902] ? kstrtol_from_user+0x310/0x310 [ 221.122396][T10902] ? bpf_ringbuf_query+0xad/0x130 [ 221.127259][T10902] ? bpf_trace_run3+0x123/0x250 [ 221.131946][T10902] ? avc_policy_seqno+0x1b/0x70 [ 221.136815][T10902] ? selinux_file_permission+0x2c4/0x570 [ 221.142279][T10902] tun_chr_write_iter+0x1e1/0x2e0 [ 221.147134][T10902] vfs_write+0xd5d/0x1110 [ 221.151328][T10902] ? kmem_cache_free+0x2c3/0x2e0 [ 221.156163][T10902] ? file_end_write+0x1c0/0x1c0 [ 221.160851][T10902] ? __fdget_pos+0x209/0x3a0 [ 221.165272][T10902] ? ksys_write+0x77/0x2c0 [ 221.169527][T10902] ksys_write+0x199/0x2c0 [ 221.173694][T10902] ? __ia32_sys_read+0x90/0x90 [ 221.178294][T10902] ? debug_smp_processor_id+0x17/0x20 [ 221.183501][T10902] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 221.189410][T10902] __x64_sys_write+0x7b/0x90 [ 221.193827][T10902] do_syscall_64+0x3d/0xb0 [ 221.198089][T10902] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 221.203808][T10902] RIP: 0033:0x7f8ae99b1f19 [ 221.208063][T10902] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 221.227503][T10902] RSP: 002b:00007f8ae8633048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 221.235833][T10902] RAX: ffffffffffffffda RBX: 00007f8ae9b41f60 RCX: 00007f8ae99b1f19 [ 221.243647][T10902] RDX: 000000000000fdef RSI: 0000000020000640 RDI: 00000000000000c8 [ 221.251461][T10902] RBP: 00007f8ae86330a0 R08: 0000000000000000 R09: 0000000000000000 [ 221.259528][T10902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 221.267346][T10902] R13: 000000000000000b R14: 00007f8ae9b41f60 R15: 00007ffc34c42528 [ 221.275422][T10902] [ 221.278712][T10904] bond_slave_1: mtu greater than device maximum [ 221.321605][T10906] device veth0_vlan left promiscuous mode [ 221.327969][T10906] device veth0_vlan entered promiscuous mode [ 221.338009][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 221.480025][T10921] device syzkaller0 entered promiscuous mode [ 221.627304][T10926] device veth0_vlan left promiscuous mode [ 221.634038][T10926] device veth0_vlan entered promiscuous mode [ 221.835662][T10933] device sit0 left promiscuous mode [ 221.878053][T10933] device syzkaller0 entered promiscuous mode [ 221.901931][T10933] device sit0 entered promiscuous mode [ 222.042624][T10947] device syzkaller0 entered promiscuous mode [ 222.053519][T10951] device veth0_vlan left promiscuous mode [ 222.060456][T10951] device veth0_vlan entered promiscuous mode [ 222.099091][T10955] device veth0_vlan left promiscuous mode [ 222.105536][T10955] device veth0_vlan entered promiscuous mode [ 222.287097][T10961] device veth0_vlan left promiscuous mode [ 222.293187][T10961] device veth0_vlan entered promiscuous mode [ 222.301185][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 222.309678][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 222.317592][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 222.506320][T10983] device veth0_vlan left promiscuous mode [ 222.527952][T10985] FAULT_INJECTION: forcing a failure. [ 222.527952][T10985] name failslab, interval 1, probability 0, space 0, times 0 [ 222.551060][T10983] device veth0_vlan entered promiscuous mode [ 222.561062][T10985] CPU: 0 PID: 10985 Comm: syz.3.4173 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 222.570880][T10985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 222.580861][T10985] Call Trace: [ 222.583981][T10985] [ 222.586763][T10985] dump_stack_lvl+0x151/0x1b7 [ 222.591276][T10985] ? io_uring_drop_tctx_refs+0x190/0x190 [ 222.596740][T10985] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 222.602392][T10985] ? __skb_try_recv_datagram+0x495/0x6a0 [ 222.607942][T10985] dump_stack+0x15/0x17 [ 222.611931][T10985] should_fail+0x3c6/0x510 [ 222.616194][T10985] __should_failslab+0xa4/0xe0 [ 222.621021][T10985] ? skb_clone+0x1d1/0x360 [ 222.625277][T10985] should_failslab+0x9/0x20 [ 222.629611][T10985] slab_pre_alloc_hook+0x37/0xd0 [ 222.634472][T10985] ? skb_clone+0x1d1/0x360 [ 222.638816][T10985] kmem_cache_alloc+0x44/0x200 [ 222.643429][T10985] skb_clone+0x1d1/0x360 [ 222.647588][T10985] sk_psock_verdict_recv+0x53/0x840 [ 222.652615][T10985] ? avc_has_perm_noaudit+0x430/0x430 [ 222.657828][T10985] unix_read_sock+0x132/0x370 [ 222.662344][T10985] ? sk_psock_skb_redirect+0x440/0x440 [ 222.667637][T10985] ? unix_stream_splice_actor+0x120/0x120 [ 222.673306][T10985] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 222.678658][T10985] ? unix_stream_splice_actor+0x120/0x120 [ 222.684297][T10985] sk_psock_verdict_data_ready+0x147/0x1a0 [ 222.689941][T10985] ? sk_psock_start_verdict+0xc0/0xc0 [ 222.695140][T10985] ? _raw_spin_lock+0xa4/0x1b0 [ 222.699750][T10985] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 222.705411][T10985] ? skb_queue_tail+0xfb/0x120 [ 222.709989][T10985] unix_dgram_sendmsg+0x15fa/0x2090 [ 222.715029][T10985] ? unix_dgram_poll+0x710/0x710 [ 222.719790][T10985] ? kmem_cache_free+0x116/0x2e0 [ 222.724571][T10985] ? security_socket_sendmsg+0x82/0xb0 [ 222.729859][T10985] ? unix_dgram_poll+0x710/0x710 [ 222.734738][T10985] ____sys_sendmsg+0x59e/0x8f0 [ 222.739340][T10985] ? __sys_sendmsg_sock+0x40/0x40 [ 222.744205][T10985] ? import_iovec+0xe5/0x120 [ 222.748628][T10985] ___sys_sendmsg+0x252/0x2e0 [ 222.753154][T10985] ? __sys_sendmsg+0x260/0x260 [ 222.757753][T10985] ? __fdget+0x1bc/0x240 [ 222.761823][T10985] __se_sys_sendmsg+0x19a/0x260 [ 222.766506][T10985] ? __x64_sys_sendmsg+0x90/0x90 [ 222.771281][T10985] ? ksys_write+0x260/0x2c0 [ 222.775653][T10985] ? debug_smp_processor_id+0x17/0x20 [ 222.780826][T10985] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 222.786730][T10985] __x64_sys_sendmsg+0x7b/0x90 [ 222.791331][T10985] do_syscall_64+0x3d/0xb0 [ 222.795591][T10985] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 222.801424][T10985] RIP: 0033:0x7f8ae99b1f19 [ 222.805677][T10985] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 222.825349][T10985] RSP: 002b:00007f8ae8633048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 222.833585][T10985] RAX: ffffffffffffffda RBX: 00007f8ae9b41f60 RCX: 00007f8ae99b1f19 [ 222.841393][T10985] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000006 [ 222.849295][T10985] RBP: 00007f8ae86330a0 R08: 0000000000000000 R09: 0000000000000000 [ 222.857105][T10985] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 222.864913][T10985] R13: 000000000000000b R14: 00007f8ae9b41f60 R15: 00007ffc34c42528 [ 222.872734][T10985] [ 222.895562][T10988] device syzkaller0 entered promiscuous mode [ 222.946506][T10991] device veth0_vlan left promiscuous mode [ 222.957461][T10991] device veth0_vlan entered promiscuous mode [ 222.977184][T10999] device sit0 left promiscuous mode [ 223.046055][T10999] device syzkaller0 entered promiscuous mode [ 223.184411][T10999] device sit0 entered promiscuous mode [ 223.197923][T11017] device veth0_vlan left promiscuous mode [ 223.209458][T11017] device veth0_vlan entered promiscuous mode [ 223.217054][T11019] device sit0 left promiscuous mode [ 223.240141][T11020] device sit0 entered promiscuous mode [ 223.435748][T11027] device veth0_vlan left promiscuous mode [ 223.441762][T11027] device veth0_vlan entered promiscuous mode [ 223.461267][T11033] device veth0_vlan left promiscuous mode [ 223.468578][T11033] device veth0_vlan entered promiscuous mode [ 223.476810][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 223.485511][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 223.495128][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 223.505823][T11045] syz.1.4196[11045] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.505899][T11045] syz.1.4196[11045] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.535439][T11035] device syzkaller0 entered promiscuous mode [ 223.725858][T11057] device veth0_vlan left promiscuous mode [ 223.746802][T11057] device veth0_vlan entered promiscuous mode [ 223.944180][T11069] device veth0_vlan left promiscuous mode [ 223.950643][T11069] device veth0_vlan entered promiscuous mode [ 224.072536][T11087] device veth0_vlan left promiscuous mode [ 224.080762][T11087] device veth0_vlan entered promiscuous mode [ 224.179307][T11089] device syzkaller0 entered promiscuous mode [ 224.206874][ T30] audit: type=1400 audit(1721877353.509:150): avc: denied { create } for pid=11092 comm="syz.4.4216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 224.343435][T11099] device veth0_vlan left promiscuous mode [ 224.441252][T11099] device veth0_vlan entered promiscuous mode [ 224.505896][T11103] device sit0 left promiscuous mode [ 224.576699][T11103] device sit0 entered promiscuous mode [ 224.598077][T11103] FAULT_INJECTION: forcing a failure. [ 224.598077][T11103] name failslab, interval 1, probability 0, space 0, times 0 [ 224.652498][T11103] CPU: 0 PID: 11103 Comm: syz.2.4219 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 224.662331][T11103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 224.672226][T11103] Call Trace: [ 224.675343][T11103] [ 224.678122][T11103] dump_stack_lvl+0x151/0x1b7 [ 224.682639][T11103] ? io_uring_drop_tctx_refs+0x190/0x190 [ 224.688105][T11103] ? slab_post_alloc_hook+0x53/0x2c0 [ 224.693225][T11103] ? fib_table_insert+0x853/0x20c0 [ 224.698173][T11103] ? fib_add_ifaddr+0xe49/0x15e0 [ 224.702945][T11103] ? fib_netdev_event+0x235/0x5d0 [ 224.707808][T11103] ? __dev_notify_flags+0x304/0x610 [ 224.713012][T11103] dump_stack+0x15/0x17 [ 224.717004][T11103] should_fail+0x3c6/0x510 [ 224.721262][T11103] __should_failslab+0xa4/0xe0 [ 224.725856][T11103] ? __alloc_skb+0xbe/0x550 [ 224.730460][T11103] should_failslab+0x9/0x20 [ 224.734796][T11103] slab_pre_alloc_hook+0x37/0xd0 [ 224.739662][T11103] ? __alloc_skb+0xbe/0x550 [ 224.743996][T11103] kmem_cache_alloc+0x44/0x200 [ 224.748597][T11103] __alloc_skb+0xbe/0x550 [ 224.752764][T11103] rtmsg_fib+0x13f/0x620 [ 224.756847][T11103] ? fib_info_nhc+0x1d0/0x1d0 [ 224.761353][T11103] ? fib_insert_alias+0x65c/0x1060 [ 224.766309][T11103] fib_table_insert+0xe1f/0x20c0 [ 224.771076][T11103] ? __stack_depot_save+0x34/0x470 [ 224.776031][T11103] ? fib_alias_hw_flags_set+0xb20/0xb20 [ 224.781407][T11103] ? __dev_notify_flags+0x304/0x610 [ 224.786437][T11103] ? dev_ifsioc+0x147/0x10c0 [ 224.790866][T11103] ? dev_ioctl+0x54d/0xe70 [ 224.795125][T11103] fib_add_ifaddr+0xe49/0x15e0 [ 224.799723][T11103] ? nlmsg_parse_deprecated_strict+0xf0/0xf0 [ 224.805539][T11103] ? igmpv3_del_delrec+0x740/0x740 [ 224.810488][T11103] ? __kasan_check_write+0x14/0x20 [ 224.815429][T11103] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 224.820295][T11103] ? igmp_group_added+0x1fa/0x800 [ 224.825146][T11103] ? igmpv3_del_delrec+0x740/0x740 [ 224.830093][T11103] ? __local_bh_enable_ip+0x58/0x80 [ 224.835133][T11103] ? _raw_spin_unlock_bh+0x51/0x60 [ 224.840080][T11103] ? inetdev_event+0xe0c/0x10a0 [ 224.844767][T11103] ? ipv4_doint_and_flush+0x150/0x150 [ 224.849968][T11103] fib_netdev_event+0x235/0x5d0 [ 224.854664][T11103] raw_notifier_call_chain+0x8c/0xf0 [ 224.859788][T11103] __dev_notify_flags+0x304/0x610 [ 224.864640][T11103] ? __dev_change_flags+0x6e0/0x6e0 [ 224.869760][T11103] ? __dev_change_flags+0x505/0x6e0 [ 224.874796][T11103] ? dev_get_flags+0x1e0/0x1e0 [ 224.879390][T11103] ? _kstrtoull+0x3a0/0x4a0 [ 224.883734][T11103] dev_change_flags+0xf0/0x1a0 [ 224.888337][T11103] dev_ifsioc+0x147/0x10c0 [ 224.892586][T11103] ? dev_ioctl+0xe70/0xe70 [ 224.896838][T11103] ? mutex_lock+0xb6/0x1e0 [ 224.901103][T11103] ? wait_for_completion_killable_timeout+0x10/0x10 [ 224.907516][T11103] dev_ioctl+0x54d/0xe70 [ 224.911593][T11103] sock_do_ioctl+0x34f/0x5a0 [ 224.916020][T11103] ? sock_show_fdinfo+0xa0/0xa0 [ 224.920713][T11103] ? selinux_file_ioctl+0x3cc/0x540 [ 224.925744][T11103] sock_ioctl+0x455/0x740 [ 224.929905][T11103] ? sock_poll+0x400/0x400 [ 224.934160][T11103] ? __fget_files+0x31e/0x380 [ 224.938675][T11103] ? security_file_ioctl+0x84/0xb0 [ 224.943623][T11103] ? sock_poll+0x400/0x400 [ 224.947879][T11103] __se_sys_ioctl+0x114/0x190 [ 224.952390][T11103] __x64_sys_ioctl+0x7b/0x90 [ 224.956847][T11103] do_syscall_64+0x3d/0xb0 [ 224.961069][T11103] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 224.966792][T11103] RIP: 0033:0x7f4d3ab9af19 [ 224.971045][T11103] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 224.990486][T11103] RSP: 002b:00007f4d3981c048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 224.998734][T11103] RAX: ffffffffffffffda RBX: 00007f4d3ad2af60 RCX: 00007f4d3ab9af19 [ 225.006542][T11103] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000007 [ 225.014355][T11103] RBP: 00007f4d3981c0a0 R08: 0000000000000000 R09: 0000000000000000 [ 225.022168][T11103] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 225.029979][T11103] R13: 000000000000000b R14: 00007f4d3ad2af60 R15: 00007fff7864dd08 [ 225.037881][T11103] [ 225.139177][T11113] device veth0_vlan left promiscuous mode [ 225.146422][T11113] device veth0_vlan entered promiscuous mode [ 225.166262][T11123] device veth0_vlan left promiscuous mode [ 225.172727][T11123] device veth0_vlan entered promiscuous mode [ 225.208110][T11127] device syzkaller0 entered promiscuous mode [ 225.440888][T11159] device veth0_vlan left promiscuous mode [ 225.482884][T11159] device veth0_vlan entered promiscuous mode [ 225.578249][T11167] FAULT_INJECTION: forcing a failure. [ 225.578249][T11167] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 225.595769][T11167] CPU: 0 PID: 11167 Comm: syz.1.4244 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 225.608641][T11167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 225.618529][T11167] Call Trace: [ 225.621644][T11167] [ 225.624509][T11167] dump_stack_lvl+0x151/0x1b7 [ 225.629022][T11167] ? io_uring_drop_tctx_refs+0x190/0x190 [ 225.634488][T11167] ? stack_trace_save+0x113/0x1c0 [ 225.639349][T11167] dump_stack+0x15/0x17 [ 225.643355][T11167] should_fail+0x3c6/0x510 [ 225.647596][T11167] should_fail_alloc_page+0x5a/0x80 [ 225.652627][T11167] prepare_alloc_pages+0x15c/0x700 [ 225.657610][T11167] ? __alloc_pages_bulk+0xe40/0xe40 [ 225.662694][T11167] ? do_syscall_64+0x3d/0xb0 [ 225.667207][T11167] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 225.673110][T11167] __alloc_pages+0x18c/0x8f0 [ 225.677537][T11167] ? prep_new_page+0x110/0x110 [ 225.682141][T11167] kmalloc_order+0x4a/0x160 [ 225.686478][T11167] kmalloc_order_trace+0x1a/0xb0 [ 225.691249][T11167] ? alloc_skb_with_frags+0xa6/0x680 [ 225.696370][T11167] __kmalloc_track_caller+0x19b/0x260 [ 225.701707][T11167] ? kmem_cache_alloc+0xf5/0x200 [ 225.706468][T11167] ? alloc_skb_with_frags+0xa6/0x680 [ 225.711594][T11167] __alloc_skb+0x10c/0x550 [ 225.715844][T11167] alloc_skb_with_frags+0xa6/0x680 [ 225.720790][T11167] ? 0xffffffffa0024b10 [ 225.724783][T11167] ? is_bpf_text_address+0x172/0x190 [ 225.729903][T11167] ? stack_trace_save+0x1c0/0x1c0 [ 225.734850][T11167] sock_alloc_send_pskb+0x915/0xa50 [ 225.739892][T11167] ? sock_kzfree_s+0x60/0x60 [ 225.744311][T11167] ? stack_trace_snprint+0xf0/0xf0 [ 225.749259][T11167] ? __stack_depot_save+0x34/0x470 [ 225.754226][T11167] tun_get_user+0xf1b/0x3aa0 [ 225.758637][T11167] ? kasan_set_track+0x4b/0x70 [ 225.763242][T11167] ? kasan_set_free_info+0x23/0x40 [ 225.768270][T11167] ? _kstrtoull+0x3a0/0x4a0 [ 225.772607][T11167] ? tun_do_read+0x1ef0/0x1ef0 [ 225.777202][T11167] ? kstrtouint_from_user+0x20a/0x2a0 [ 225.782413][T11167] ? kstrtol_from_user+0x310/0x310 [ 225.787362][T11167] ? avc_policy_seqno+0x1b/0x70 [ 225.792050][T11167] ? selinux_file_permission+0x2c4/0x570 [ 225.797516][T11167] tun_chr_write_iter+0x1e1/0x2e0 [ 225.802386][T11167] vfs_write+0xd5d/0x1110 [ 225.806653][T11167] ? kmem_cache_free+0x2c3/0x2e0 [ 225.811429][T11167] ? file_end_write+0x1c0/0x1c0 [ 225.816137][T11167] ? __fdget_pos+0x209/0x3a0 [ 225.820635][T11167] ? ksys_write+0x77/0x2c0 [ 225.824889][T11167] ksys_write+0x199/0x2c0 [ 225.829053][T11167] ? __ia32_sys_read+0x90/0x90 [ 225.833645][T11167] ? debug_smp_processor_id+0x17/0x20 [ 225.838854][T11167] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 225.844759][T11167] __x64_sys_write+0x7b/0x90 [ 225.849235][T11167] do_syscall_64+0x3d/0xb0 [ 225.853435][T11167] ? sysvec_call_function_single+0x52/0xb0 [ 225.859165][T11167] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 225.864896][T11167] RIP: 0033:0x7f8864090f19 [ 225.869231][T11167] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 225.888793][T11167] RSP: 002b:00007f8862d12048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 225.897134][T11167] RAX: ffffffffffffffda RBX: 00007f8864220f60 RCX: 00007f8864090f19 [ 225.905208][T11167] RDX: 000000000000fdef RSI: 0000000020000640 RDI: 00000000000000c8 [ 225.913102][T11167] RBP: 00007f8862d120a0 R08: 0000000000000000 R09: 0000000000000000 [ 225.920914][T11167] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 225.928724][T11167] R13: 000000000000000b R14: 00007f8864220f60 R15: 00007ffc36ea14c8 [ 225.936543][T11167] [ 225.974910][T11172] device syzkaller0 entered promiscuous mode [ 225.996535][T11169] device veth0_vlan left promiscuous mode [ 226.003442][T11169] device veth0_vlan entered promiscuous mode [ 226.171614][T11195] device veth0_vlan left promiscuous mode [ 226.184194][T11195] device veth0_vlan entered promiscuous mode [ 226.490112][T11214] device veth0_vlan left promiscuous mode [ 226.500771][T11214] device veth0_vlan entered promiscuous mode [ 226.579353][T11216] device syzkaller0 entered promiscuous mode [ 226.597662][T11218] FAULT_INJECTION: forcing a failure. [ 226.597662][T11218] name failslab, interval 1, probability 0, space 0, times 0 [ 226.627977][T11218] CPU: 0 PID: 11218 Comm: syz.0.4263 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 226.637804][T11218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 226.647786][T11218] Call Trace: [ 226.650916][T11218] [ 226.653687][T11218] dump_stack_lvl+0x151/0x1b7 [ 226.658384][T11218] ? io_uring_drop_tctx_refs+0x190/0x190 [ 226.663846][T11218] dump_stack+0x15/0x17 [ 226.667839][T11218] should_fail+0x3c6/0x510 [ 226.672088][T11218] __should_failslab+0xa4/0xe0 [ 226.676702][T11218] should_failslab+0x9/0x20 [ 226.681208][T11218] slab_pre_alloc_hook+0x37/0xd0 [ 226.685975][T11218] kmem_cache_alloc_trace+0x48/0x210 [ 226.691093][T11218] ? sk_psock_skb_ingress_self+0x60/0x330 [ 226.696647][T11218] ? migrate_disable+0x190/0x190 [ 226.701423][T11218] sk_psock_skb_ingress_self+0x60/0x330 [ 226.706805][T11218] sk_psock_verdict_recv+0x66d/0x840 [ 226.711927][T11218] unix_read_sock+0x132/0x370 [ 226.716441][T11218] ? sk_psock_skb_redirect+0x440/0x440 [ 226.721839][T11218] ? unix_stream_splice_actor+0x120/0x120 [ 226.727394][T11218] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 226.732690][T11218] ? unix_stream_splice_actor+0x120/0x120 [ 226.738245][T11218] sk_psock_verdict_data_ready+0x147/0x1a0 [ 226.743882][T11218] ? sk_psock_start_verdict+0xc0/0xc0 [ 226.749095][T11218] ? _raw_spin_lock+0xa4/0x1b0 [ 226.753797][T11218] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 226.759423][T11218] ? skb_queue_tail+0xfb/0x120 [ 226.764022][T11218] unix_dgram_sendmsg+0x15fa/0x2090 [ 226.769058][T11218] ? unix_dgram_poll+0x710/0x710 [ 226.773824][T11218] ? kmem_cache_free+0x116/0x2e0 [ 226.778693][T11218] ? ____kasan_slab_free+0x126/0x160 [ 226.783935][T11218] ? __kasan_slab_free+0x11/0x20 [ 226.788687][T11218] ? slab_free_freelist_hook+0xbd/0x190 [ 226.794154][T11218] ? security_socket_sendmsg+0x82/0xb0 [ 226.799450][T11218] ? unix_dgram_poll+0x710/0x710 [ 226.804223][T11218] ____sys_sendmsg+0x59e/0x8f0 [ 226.808828][T11218] ? __sys_sendmsg_sock+0x40/0x40 [ 226.813703][T11218] ? import_iovec+0xe5/0x120 [ 226.818117][T11218] ___sys_sendmsg+0x252/0x2e0 [ 226.822622][T11218] ? __sys_sendmsg+0x260/0x260 [ 226.827235][T11218] ? __fdget+0x1bc/0x240 [ 226.831303][T11218] __se_sys_sendmsg+0x19a/0x260 [ 226.835988][T11218] ? __x64_sys_sendmsg+0x90/0x90 [ 226.840762][T11218] ? ksys_write+0x260/0x2c0 [ 226.845107][T11218] ? debug_smp_processor_id+0x17/0x20 [ 226.850309][T11218] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 226.856226][T11218] __x64_sys_sendmsg+0x7b/0x90 [ 226.860896][T11218] do_syscall_64+0x3d/0xb0 [ 226.865151][T11218] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 226.870966][T11218] RIP: 0033:0x7f5ca9389f19 [ 226.875305][T11218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 226.894748][T11218] RSP: 002b:00007f5ca800b048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 226.902996][T11218] RAX: ffffffffffffffda RBX: 00007f5ca9519f60 RCX: 00007f5ca9389f19 [ 226.911235][T11218] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000006 [ 226.919045][T11218] RBP: 00007f5ca800b0a0 R08: 0000000000000000 R09: 0000000000000000 [ 226.926946][T11218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 226.934757][T11218] R13: 000000000000000b R14: 00007f5ca9519f60 R15: 00007ffd72c52ae8 [ 226.942572][T11218] [ 226.947047][ T30] audit: type=1400 audit(1721877356.249:151): avc: denied { append } for pid=11220 comm="syz.3.4264" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 226.970565][ T7833] ================================================================== [ 226.978450][ T7833] BUG: KASAN: use-after-free in consume_skb+0x3c/0x250 [ 226.985130][ T7833] Read of size 4 at addr ffff88811f3f55ec by task kworker/1:19/7833 [ 226.992941][ T7833] [ 226.995119][ T7833] CPU: 1 PID: 7833 Comm: kworker/1:19 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 227.005007][ T7833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 227.014900][ T7833] Workqueue: events bpf_map_free_deferred [ 227.020453][ T7833] Call Trace: [ 227.023578][ T7833] [ 227.026369][ T7833] dump_stack_lvl+0x151/0x1b7 [ 227.030898][ T7833] ? io_uring_drop_tctx_refs+0x190/0x190 [ 227.036336][ T7833] ? panic+0x751/0x751 [ 227.040246][ T7833] print_address_description+0x87/0x3b0 [ 227.045625][ T7833] kasan_report+0x179/0x1c0 [ 227.049967][ T7833] ? consume_skb+0x3c/0x250 [ 227.054303][ T7833] ? consume_skb+0x3c/0x250 [ 227.058647][ T7833] kasan_check_range+0x293/0x2a0 [ 227.063417][ T7833] __kasan_check_read+0x11/0x20 [ 227.068187][ T7833] consume_skb+0x3c/0x250 [ 227.072358][ T7833] __sk_msg_free+0x2dd/0x370 [ 227.076872][ T7833] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 227.082601][ T7833] sk_psock_stop+0x44c/0x4d0 [ 227.087027][ T7833] sk_psock_drop+0x219/0x310 [ 227.091461][ T7833] sock_map_unref+0x48f/0x4d0 [ 227.096060][ T7833] sock_map_free+0x137/0x2b0 [ 227.100480][ T7833] bpf_map_free_deferred+0x10d/0x1e0 [ 227.105685][ T7833] process_one_work+0x6bb/0xc10 [ 227.110375][ T7833] worker_thread+0xad5/0x12a0 [ 227.114891][ T7833] kthread+0x421/0x510 [ 227.118793][ T7833] ? worker_clr_flags+0x180/0x180 [ 227.123737][ T7833] ? kthread_blkcg+0xd0/0xd0 [ 227.128167][ T7833] ret_from_fork+0x1f/0x30 [ 227.132416][ T7833] [ 227.135278][ T7833] [ 227.137452][ T7833] Allocated by task 11218: [ 227.141702][ T7833] __kasan_slab_alloc+0xb1/0xe0 [ 227.146561][ T7833] slab_post_alloc_hook+0x53/0x2c0 [ 227.151509][ T7833] kmem_cache_alloc+0xf5/0x200 [ 227.156194][ T7833] skb_clone+0x1d1/0x360 [ 227.160276][ T7833] sk_psock_verdict_recv+0x53/0x840 [ 227.165310][ T7833] unix_read_sock+0x132/0x370 [ 227.169820][ T7833] sk_psock_verdict_data_ready+0x147/0x1a0 [ 227.175555][ T7833] unix_dgram_sendmsg+0x15fa/0x2090 [ 227.180584][ T7833] ____sys_sendmsg+0x59e/0x8f0 [ 227.185190][ T7833] ___sys_sendmsg+0x252/0x2e0 [ 227.189697][ T7833] __se_sys_sendmsg+0x19a/0x260 [ 227.194473][ T7833] __x64_sys_sendmsg+0x7b/0x90 [ 227.199073][ T7833] do_syscall_64+0x3d/0xb0 [ 227.203326][ T7833] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 227.209051][ T7833] [ 227.211228][ T7833] Freed by task 10211: [ 227.215127][ T7833] kasan_set_track+0x4b/0x70 [ 227.219555][ T7833] kasan_set_free_info+0x23/0x40 [ 227.224341][ T7833] ____kasan_slab_free+0x126/0x160 [ 227.229273][ T7833] __kasan_slab_free+0x11/0x20 [ 227.233875][ T7833] slab_free_freelist_hook+0xbd/0x190 [ 227.239095][ T7833] kmem_cache_free+0x116/0x2e0 [ 227.243683][ T7833] kfree_skbmem+0x104/0x170 [ 227.248022][ T7833] kfree_skb+0xc2/0x360 [ 227.252013][ T7833] sk_psock_backlog+0xc21/0xd90 [ 227.256704][ T7833] process_one_work+0x6bb/0xc10 [ 227.261387][ T7833] worker_thread+0xad5/0x12a0 [ 227.265901][ T7833] kthread+0x421/0x510 [ 227.269806][ T7833] ret_from_fork+0x1f/0x30 [ 227.274061][ T7833] [ 227.276234][ T7833] The buggy address belongs to the object at ffff88811f3f5500 [ 227.276234][ T7833] which belongs to the cache skbuff_head_cache of size 248 [ 227.290727][ T7833] The buggy address is located 236 bytes inside of [ 227.290727][ T7833] 248-byte region [ffff88811f3f5500, ffff88811f3f55f8) [ 227.303844][ T7833] The buggy address belongs to the page: [ 227.309318][ T7833] page:ffffea00047cfd40 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11f3f5 [ 227.319372][ T7833] flags: 0x4000000000000200(slab|zone=1) [ 227.324939][ T7833] raw: 4000000000000200 0000000000000000 dead000000000122 ffff888107f99380 [ 227.333356][ T7833] raw: 0000000000000000 00000000000c000c 00000001ffffffff 0000000000000000 [ 227.341764][ T7833] page dumped because: kasan: bad access detected [ 227.348025][ T7833] page_owner tracks the page as allocated [ 227.353569][ T7833] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 11216, ts 226546785275, free_ts 226092275654 [ 227.369629][ T7833] post_alloc_hook+0x1a3/0x1b0 [ 227.374226][ T7833] prep_new_page+0x1b/0x110 [ 227.378568][ T7833] get_page_from_freelist+0x3550/0x35d0 [ 227.383966][ T7833] __alloc_pages+0x27e/0x8f0 [ 227.388375][ T7833] new_slab+0x9a/0x4e0 [ 227.392277][ T7833] ___slab_alloc+0x39e/0x830 [ 227.396704][ T7833] __slab_alloc+0x4a/0x90 [ 227.400875][ T7833] kmem_cache_alloc+0x134/0x200 [ 227.405572][ T7833] __alloc_skb+0xbe/0x550 [ 227.409885][ T7833] alloc_uevent_skb+0x80/0x230 [ 227.414474][ T7833] kobject_uevent_net_broadcast+0x188/0x590 [ 227.420204][ T7833] kobject_uevent_env+0x525/0x700 [ 227.425063][ T7833] kobject_uevent+0x1f/0x30 [ 227.429401][ T7833] device_add+0xa6e/0xf10 [ 227.433654][ T7833] netdev_register_kobject+0x177/0x320 [ 227.438949][ T7833] register_netdevice+0xde9/0x1390 [ 227.443898][ T7833] page last free stack trace: [ 227.448409][ T7833] free_unref_page_prepare+0x7c8/0x7d0 [ 227.453714][ T7833] free_unref_page_list+0x14b/0xa60 [ 227.458858][ T7833] release_pages+0x1310/0x1370 [ 227.463545][ T7833] free_pages_and_swap_cache+0x8a/0xa0 [ 227.468845][ T7833] tlb_finish_mmu+0x177/0x320 [ 227.473358][ T7833] exit_mmap+0x40d/0x940 [ 227.477431][ T7833] __mmput+0x95/0x310 [ 227.481255][ T7833] mmput+0x5b/0x170 [ 227.484983][ T7833] do_exit+0xb9c/0x2ca0 [ 227.488981][ T7833] do_group_exit+0x141/0x310 [ 227.493404][ T7833] get_signal+0x7a3/0x1630 [ 227.497654][ T7833] arch_do_signal_or_restart+0xbd/0x1680 [ 227.503219][ T7833] exit_to_user_mode_loop+0xa0/0xe0 [ 227.508255][ T7833] exit_to_user_mode_prepare+0x5a/0xa0 [ 227.513547][ T7833] syscall_exit_to_user_mode+0x26/0x160 [ 227.518927][ T7833] do_syscall_64+0x49/0xb0 [ 227.523182][ T7833] [ 227.525349][ T7833] Memory state around the buggy address: [ 227.530825][ T7833] ffff88811f3f5480: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 227.538807][ T7833] ffff88811f3f5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 227.546790][ T7833] >ffff88811f3f5580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc [ 227.554684][ T7833] ^ [ 227.561980][ T7833] ffff88811f3f5600: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 227.569969][ T7833] ffff88811f3f5680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 227.577865][ T7833] ================================================================== [ 227.585759][ T7833] Disabling lock debugging due to kernel taint [ 227.591813][ T7833] ================================================================== [ 227.599653][ T7833] BUG: KASAN: double-free or invalid-free in kmem_cache_free+0x116/0x2e0 [ 227.607922][ T7833] [ 227.610074][ T7833] CPU: 1 PID: 7833 Comm: kworker/1:19 Tainted: G B 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 227.621346][ T7833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 227.631249][ T7833] Workqueue: events bpf_map_free_deferred [ 227.636792][ T7833] Call Trace: [ 227.639920][ T7833] [ 227.642695][ T7833] dump_stack_lvl+0x151/0x1b7 [ 227.647298][ T7833] ? io_uring_drop_tctx_refs+0x190/0x190 [ 227.652763][ T7833] ? panic+0x751/0x751 [ 227.656667][ T7833] ? irqentry_exit+0x30/0x40 [ 227.661094][ T7833] ? kmem_cache_free+0x116/0x2e0 [ 227.665872][ T7833] print_address_description+0x87/0x3b0 [ 227.671336][ T7833] ? asm_common_interrupt+0x27/0x40 [ 227.676375][ T7833] ? kmem_cache_free+0x116/0x2e0 [ 227.681142][ T7833] ? kmem_cache_free+0x116/0x2e0 [ 227.685921][ T7833] kasan_report_invalid_free+0x6b/0xa0 [ 227.691210][ T7833] ____kasan_slab_free+0x13e/0x160 [ 227.696168][ T7833] __kasan_slab_free+0x11/0x20 [ 227.700762][ T7833] slab_free_freelist_hook+0xbd/0x190 [ 227.705967][ T7833] ? kfree_skbmem+0x104/0x170 [ 227.710616][ T7833] kmem_cache_free+0x116/0x2e0 [ 227.715207][ T7833] kfree_skbmem+0x104/0x170 [ 227.719542][ T7833] consume_skb+0xb4/0x250 [ 227.723704][ T7833] __sk_msg_free+0x2dd/0x370 [ 227.728132][ T7833] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 227.733945][ T7833] sk_psock_stop+0x44c/0x4d0 [ 227.738374][ T7833] sk_psock_drop+0x219/0x310 [ 227.742889][ T7833] sock_map_unref+0x48f/0x4d0 [ 227.747399][ T7833] sock_map_free+0x137/0x2b0 [ 227.751830][ T7833] bpf_map_free_deferred+0x10d/0x1e0 [ 227.756948][ T7833] process_one_work+0x6bb/0xc10 [ 227.761638][ T7833] worker_thread+0xad5/0x12a0 [ 227.766152][ T7833] kthread+0x421/0x510 [ 227.770047][ T7833] ? worker_clr_flags+0x180/0x180 [ 227.774916][ T7833] ? kthread_blkcg+0xd0/0xd0 [ 227.779340][ T7833] ret_from_fork+0x1f/0x30 [ 227.783591][ T7833] [ 227.786455][ T7833] [ 227.788625][ T7833] Allocated by task 11218: [ 227.793006][ T7833] __kasan_slab_alloc+0xb1/0xe0 [ 227.797686][ T7833] slab_post_alloc_hook+0x53/0x2c0 [ 227.802720][ T7833] kmem_cache_alloc+0xf5/0x200 [ 227.807314][ T7833] skb_clone+0x1d1/0x360 [ 227.811398][ T7833] sk_psock_verdict_recv+0x53/0x840 [ 227.816547][ T7833] unix_read_sock+0x132/0x370 [ 227.821056][ T7833] sk_psock_verdict_data_ready+0x147/0x1a0 [ 227.826709][ T7833] unix_dgram_sendmsg+0x15fa/0x2090 [ 227.831729][ T7833] ____sys_sendmsg+0x59e/0x8f0 [ 227.836332][ T7833] ___sys_sendmsg+0x252/0x2e0 [ 227.840932][ T7833] __se_sys_sendmsg+0x19a/0x260 [ 227.845615][ T7833] __x64_sys_sendmsg+0x7b/0x90 [ 227.850305][ T7833] do_syscall_64+0x3d/0xb0 [ 227.854557][ T7833] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 227.860284][ T7833] [ 227.862460][ T7833] Freed by task 10211: [ 227.866373][ T7833] kasan_set_track+0x4b/0x70 [ 227.870788][ T7833] kasan_set_free_info+0x23/0x40 [ 227.875571][ T7833] ____kasan_slab_free+0x126/0x160 [ 227.880608][ T7833] __kasan_slab_free+0x11/0x20 [ 227.885199][ T7833] slab_free_freelist_hook+0xbd/0x190 [ 227.890401][ T7833] kmem_cache_free+0x116/0x2e0 [ 227.895004][ T7833] kfree_skbmem+0x104/0x170 [ 227.899345][ T7833] kfree_skb+0xc2/0x360 [ 227.903338][ T7833] sk_psock_backlog+0xc21/0xd90 [ 227.908038][ T7833] process_one_work+0x6bb/0xc10 [ 227.912711][ T7833] worker_thread+0xad5/0x12a0 [ 227.917328][ T7833] kthread+0x421/0x510 [ 227.921224][ T7833] ret_from_fork+0x1f/0x30 [ 227.925478][ T7833] [ 227.927649][ T7833] The buggy address belongs to the object at ffff88811f3f5500 [ 227.927649][ T7833] which belongs to the cache skbuff_head_cache of size 248 [ 227.942139][ T7833] The buggy address is located 0 bytes inside of [ 227.942139][ T7833] 248-byte region [ffff88811f3f5500, ffff88811f3f55f8) [ 227.955075][ T7833] The buggy address belongs to the page: [ 227.960716][ T7833] page:ffffea00047cfd40 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11f3f5 [ 227.970783][ T7833] flags: 0x4000000000000200(slab|zone=1) [ 227.976262][ T7833] raw: 4000000000000200 0000000000000000 dead000000000122 ffff888107f99380 [ 227.984677][ T7833] raw: 0000000000000000 00000000000c000c 00000001ffffffff 0000000000000000 [ 227.993089][ T7833] page dumped because: kasan: bad access detected [ 227.999338][ T7833] page_owner tracks the page as allocated [ 228.004891][ T7833] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 11216, ts 226546785275, free_ts 226092275654 [ 228.020951][ T7833] post_alloc_hook+0x1a3/0x1b0 [ 228.025719][ T7833] prep_new_page+0x1b/0x110 [ 228.030077][ T7833] get_page_from_freelist+0x3550/0x35d0 [ 228.035441][ T7833] __alloc_pages+0x27e/0x8f0 [ 228.039868][ T7833] new_slab+0x9a/0x4e0 [ 228.043772][ T7833] ___slab_alloc+0x39e/0x830 [ 228.048198][ T7833] __slab_alloc+0x4a/0x90 [ 228.052373][ T7833] kmem_cache_alloc+0x134/0x200 [ 228.057055][ T7833] __alloc_skb+0xbe/0x550 [ 228.061217][ T7833] alloc_uevent_skb+0x80/0x230 [ 228.065824][ T7833] kobject_uevent_net_broadcast+0x188/0x590 [ 228.071810][ T7833] kobject_uevent_env+0x525/0x700 [ 228.076666][ T7833] kobject_uevent+0x1f/0x30 [ 228.081008][ T7833] device_add+0xa6e/0xf10 [ 228.085171][ T7833] netdev_register_kobject+0x177/0x320 [ 228.090469][ T7833] register_netdevice+0xde9/0x1390 [ 228.095592][ T7833] page last free stack trace: [ 228.100103][ T7833] free_unref_page_prepare+0x7c8/0x7d0 [ 228.105396][ T7833] free_unref_page_list+0x14b/0xa60 [ 228.110427][ T7833] release_pages+0x1310/0x1370 [ 228.115036][ T7833] free_pages_and_swap_cache+0x8a/0xa0 [ 228.120325][ T7833] tlb_finish_mmu+0x177/0x320 [ 228.124835][ T7833] exit_mmap+0x40d/0x940 [ 228.128929][ T7833] __mmput+0x95/0x310 [ 228.132740][ T7833] mmput+0x5b/0x170 [ 228.136379][ T7833] do_exit+0xb9c/0x2ca0 [ 228.140374][ T7833] do_group_exit+0x141/0x310 [ 228.144802][ T7833] get_signal+0x7a3/0x1630 [ 228.149055][ T7833] arch_do_signal_or_restart+0xbd/0x1680 [ 228.154523][ T7833] exit_to_user_mode_loop+0xa0/0xe0 [ 228.159554][ T7833] exit_to_user_mode_prepare+0x5a/0xa0 [ 228.164953][ T7833] syscall_exit_to_user_mode+0x26/0x160 [ 228.170322][ T7833] do_syscall_64+0x49/0xb0 [ 228.174581][ T7833] [ 228.176750][ T7833] Memory state around the buggy address: [ 228.182225][ T7833] ffff88811f3f5400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 228.190115][ T7833] ffff88811f3f5480: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 228.198019][ T7833] >ffff88811f3f5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 228.205912][ T7833] ^ [ 228.209820][ T7833] ffff88811f3f5580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc [ 228.217727][ T7833] ffff88811f3f5600: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 228.225609][ T7833] ==================================================================