last executing test programs: 4.890044118s ago: executing program 2 (id=8111): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="16000000000000000400000002000000000000000dae593fac7f6906560fb95210238b2703cd1a89b58acce5db9efb05babdc0e6b0ec1d53c0de4deae15b6419a560bbc22d3c7a10711b2050226d6dc4267c97b36517ea03b4c68f508b7ef0ce109b32d2d39488ba66e10d2cf31d77d0d9990ab5933a5d147a1b52b539bcad9b5f6fdb896382e78cff218eee849aad4cbc6c11f36ac4ba685e950ab83c3d8209154bcdb369982dda4170728671125a28ee8fe8b71fe3439a0f5f67401bdeb1ce7560d5833339af3f8957", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f00000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180100f684e1e98cb400000000ca7b718aa263", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r8, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000b80)={r4, 0xffffffffffffffff}, 0x4) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=r5, @ANYBLOB="0001cf5da30000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="05000000000000000300"/28], 0x50) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c80)=@o_path={&(0x7f0000000c40)='./file0\x00', 0x0, 0x4008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d40)={0x18, 0x19, &(0x7f0000000780)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x180}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@jmp={0x5, 0x0, 0x0, 0x2, 0x6, 0x18}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, @map_fd={0x18, 0x4, 0x1, 0x0, r5}, @map_fd={0x18, 0x6, 0x1, 0x0, r4}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000880)='syzkaller\x00', 0x9, 0xd5, &(0x7f00000008c0)=""/213, 0x40f00, 0x4a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000b00)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000b40)={0x2, 0x7, 0xffffffff, 0x56}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000cc0)=[r8, r4, r4, r1, r0, r1, r9, r10, r11], &(0x7f0000000d00)=[{0x1, 0x2, 0x4, 0xa}, {0x2, 0x4, 0xa, 0x5}, {0x2, 0x2, 0xf, 0x9}], 0x10, 0x9, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r4, 0xffffffffffffffff}, &(0x7f0000000400), &(0x7f00000004c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r3}, 0x10) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r13}, 0x10) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r14, &(0x7f0000000180), 0x40001) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xa, &(0x7f00000002c0)=@raw=[@generic={0x1, 0x0, 0x9, 0x5, 0x3ff}, @map_fd={0x18, 0x1, 0x1, 0x0, r1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xf98}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x5aa}, @jmp={0x5, 0x1, 0xa, 0x8, 0x0, 0x10, 0x4}], &(0x7f0000000180)='syzkaller\x00', 0x5, 0x54, &(0x7f0000000340)=""/84, 0x40f00, 0x8, '\x00', 0x0, 0x0, r14, 0x8, &(0x7f00000003c0)={0x2, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[r1, r12, r2, r12, r12], &(0x7f0000000600)=[{0x5, 0x3, 0x6, 0x7}, {0x3, 0x4, 0x2, 0x3}], 0x10, 0x7f, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r15, 0x89f1, &(0x7f0000000080)) 4.560402326s ago: executing program 2 (id=8114): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1b41, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'hugetlb'}]}, 0x9) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000580)={r1, &(0x7f0000000b40), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[], 0x6e8a) 4.409935483s ago: executing program 2 (id=8115): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000880)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007200000018010000696c6c2500000000002020207b1af8ff00000000bfa1000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r1}, 0xc) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe5, 0x0, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df1", 0x0, 0x24, 0x60000000}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55, 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000}, 0x50) 4.258583061s ago: executing program 2 (id=8116): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x17, 0x0, 0x1f5c, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000140)={r6, 0x0, 0x0}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r0, 0x58, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@decl_tag={0x6, 0x0, 0x0, 0x11, 0x1, 0x6}]}, {0x0, [0x61, 0x5f, 0x5f]}}, &(0x7f0000000680)=""/113, 0x2d, 0x71, 0x1, 0x4, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, r6, 0x266d, '\x00', r7, r8, 0x3, 0x0, 0x4, 0x0, @void, @value, @void, @value}, 0x50) close(r2) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007fbb385e2fae0d08967000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r9, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r9, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r11}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r13) recvmsg$unix(r12, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_pid(r14, &(0x7f0000000000), 0x12) 4.030613127s ago: executing program 2 (id=8119): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000020007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c0000000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000048000000b7030000000000008500000005000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000012c0)='blkio.bfq.io_service_time_recursive\x00', 0x100002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000280)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000069000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000006"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r4}, 0x18) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xa, 0x3, 0x0, 0x0, 0x0, 0xfb1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7eebd673}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 3.727216542s ago: executing program 2 (id=8127): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c000000"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1e00000004000000ff7f00000200000000010200", @ANYRES32=0x1, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00@\x00'/20, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB="0000000005000000040000000500"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r1}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000d"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r3, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(r6, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10, 0x0}, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.460528967s ago: executing program 4 (id=8146): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000407b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{r1}, &(0x7f00000005c0), &(0x7f0000000600)='%pI4 \x00'}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r9}, 0x18) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r10}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xc, 0xffffffffffffffff, 0x0) 1.903801591s ago: executing program 3 (id=8149): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0xd132}) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'hugetlb'}]}, 0x9) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000580)={r0, &(0x7f0000000b40), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x6e8a) 1.848318758s ago: executing program 1 (id=8152): r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x17, 0x9, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = perf_event_open$cgroup(&(0x7f0000000300)={0x1, 0x80, 0x2, 0x47, 0x0, 0x6, 0x0, 0x4, 0x10000, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x6, 0x8}, 0x704, 0x8000000000000001, 0xa, 0x4, 0x8, 0x80000001, 0x40, 0x0, 0x2, 0x0, 0xde}, 0xffffffffffffffff, 0x2, r0, 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x98, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000000, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1e00000018000000030000000700000006840100", @ANYRES32=0x1, @ANYBLOB='r\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0100000005000000050000000800000000000000", @ANYBLOB="495c44d7ce63605f6aa639e3befd0dcfbda418af8cbe02f4979469854926f0c049004f1b0cd8c42b342468aa475402be7f6ac89df897077431275177c2b86491eaa565f3c1a1fcad63ecf3496e20fc0fa75f3fc2c66c1e824baca68e1971dc2039b7453781f6b9aea9c841239849269cd16485ee0dcf67f201239142cc1e15aa5d78d567c4345f534ad1952d345c964208a857947ac9", @ANYRES32, @ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x9, 0x3, 0xf4, 0x7fff, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x180, 0x0, 0x0, @void, @value, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mMm\x00\x10\x01\xe8\xd1\x00\x00\x00I\xa2l') 1.774878206s ago: executing program 3 (id=8153): r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x17, 0x9, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = perf_event_open$cgroup(&(0x7f0000000300)={0x1, 0x80, 0x2, 0x47, 0x0, 0x6, 0x0, 0x4, 0x10000, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x6, 0x8}, 0x704, 0x8000000000000001, 0xa, 0x4, 0x8, 0x80000001, 0x40, 0x0, 0x2, 0x0, 0xde}, 0xffffffffffffffff, 0x2, r0, 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x98, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000000, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1e00000018000000030000000700000006840100", @ANYRES32=0x1, @ANYBLOB='r\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0100000005000000050000000800000000000000", @ANYBLOB="495c44d7ce63605f6aa639e3befd0dcfbda418af8cbe02f4979469854926f0c049004f1b0cd8c42b342468aa475402be7f6ac89df897077431275177c2b86491eaa565f3c1a1fcad63ecf3496e20fc0fa75f3fc2c66c1e824baca68e1971dc2039b7453781f6b9aea9c841239849269cd16485ee0dcf67f201239142cc1e15aa5d78d567c4345f534ad1952d345c964208a857947ac9", @ANYRES32, @ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x9, 0x3, 0xf4, 0x7fff, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x180, 0x0, 0x0, @void, @value, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mMm\x00\x10\x01\xe8\xd1\x00\x00\x00I\xa2l') 1.606486416s ago: executing program 4 (id=8154): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0xaffffffdffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x10, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}], {0x95, 0x0, 0x0, 0x1000000}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x90e44f07d348759c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={@fallback=r2, 0xa, 0x1, 0x8, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xfe4b, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r5, 0x58, &(0x7f00000004c0)}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0xe) r7 = openat$tun(0xffffffffffffff9c, 0x0, 0x20f42, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000140)={'\x00', 0x6132}) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xfe3a) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000340)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x5, 0x0, @void, @value, @void, @value}, 0x50) r9 = gettid() perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xc4, 0x1, 0x0, 0x4, 0x0, 0x19e1, 0x2, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8c, 0x4, @perf_config_ext={0x7ff, 0x2}, 0x10064, 0x400, 0x2, 0x4, 0x7, 0x101, 0x1031, 0x0, 0x3, 0x0, 0x2}, r9, 0xc, r3, 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000300)={@fallback=r8, r2, 0x12, 0x202a, r2, @void, @void, @value, @void, r4}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000580)={0x3}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) socketpair(0xa, 0x2, 0x0, &(0x7f0000000180)={0x0, 0x0}) 1.509554827s ago: executing program 1 (id=8155): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='..\x00') r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000280)='host1x_channel_submit\x00', 0xffffffffffffffff, 0x0, 0x200000000}, 0xfffffffffffffeea) r2 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f0000000380)=r1}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xf, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r4, 0x58, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x9, &(0x7f0000001280)=ANY=[@ANYBLOB="1800005e0e1be73d008f030000000000000800000034873000fcffffff8d830200008510000008000000850100000600000018480000fbffffff00000000000000009500"/77], &(0x7f00000002c0)='GPL\x00', 0xd3f, 0x1c, &(0x7f0000000400)=""/28, 0x40f00, 0x34, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000001100)={0x2, 0x2, 0x518a, 0x5}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001140)=[{0x0, 0x5, 0x3, 0x4}], 0x10, 0xfffffff9, @void, @value}, 0x90) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb7, 0xb7, 0x8, [@const={0x6, 0x0, 0x0, 0xa, 0x5}, @struct={0x10, 0x2, 0x0, 0x4, 0x1, 0x5, [{0x3, 0x1, 0x2}, {0xc, 0x4, 0x1}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x1, 0x8}}, @datasec={0x10, 0x8, 0x0, 0xf, 0x3, [{0x3, 0x3, 0x369}, {0x3, 0x4, 0xcf6}, {0x5, 0x1, 0xfffffffb}, {0x2, 0x40, 0x1}, {0x3, 0x8, 0x9}, {0x3, 0x7, 0x4}, {0x3, 0xa0, 0x1}, {0x1, 0x4, 0x2}], "1ff30a"}]}, {0x0, [0xb57b49697034c838, 0x61, 0x61, 0x30, 0x5f, 0x2e]}}, &(0x7f0000000900)=""/1, 0xd8, 0x1, 0x1, 0x8, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x27, &(0x7f0000000600)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0xdc, 0x3, 0x3, 0xffff, 0x6}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @ldst={0x1, 0x0, 0x2, 0x3, 0x5, 0xfffffffffffffffe, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}, @generic={0x0, 0xd, 0x9, 0x9, 0x40}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000480)='syzkaller\x00', 0x6b4, 0x15, &(0x7f0000000580)=""/21, 0x0, 0x24, '\x00', r5, 0x0, r6, 0x8, &(0x7f0000000980)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x1, 0x6, 0x9, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000a00)=[r0, r0, r2, r0, r0, r0, r0], &(0x7f0000000a40)=[{0x3, 0x2, 0xd, 0x7}, {0x0, 0x3, 0x6, 0x9}, {0x2, 0x3, 0xc, 0xa}, {0x2, 0x3, 0x9, 0x8}, {0x3, 0x4, 0x10, 0xb}, {0x0, 0x5, 0x5, 0x5}, {0x1, 0x2, 0xb, 0x2}], 0x10, 0x5, @void, @value}, 0x94) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2b, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x600000000000000, 0x0, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8912, &(0x7f0000000080)) 1.276784484s ago: executing program 3 (id=8157): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000035bde4e401ed00e1000000000000010000000000165d5e333d69165003a01d83c9e7c665a7802984ae02283802496c233270913ac388698d34c5d8a6f7bdea0668e216be6565869d5e9212f398e0fd93c3427344a3ebf5ce55b7f5f49b9f6b22d2bf3c3c30f189950408d0dcf377f6ff6acc5786dd604b929dbb485924069cd514c109ea9ff2e19d9b39431c5fbd844d69592fcb0f47de9f9d5df588c73f6ba1aa3e90373ad9a89750802c7d05f7"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1b, 0xf, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRESOCT=r0], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9009, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="06000000040000000300000005"], 0x48) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) write$cgroup_subtree(r4, 0x0, 0x9) 1.038577911s ago: executing program 0 (id=8158): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x8, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) 960.12659ms ago: executing program 0 (id=8159): bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x3, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xb, 0x5, 0x2, 0x2, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000014007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x33}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (fail_nth: 4) 387.831776ms ago: executing program 4 (id=8160): r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x8405, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @value=r0, @void, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0b00000005000000000400000d000000010000", @ANYRES32, @ANYBLOB, @ANYBLOB], 0x48) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x1, 0xa, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=@base={0x0, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0x10, 0x0, r3, 0x80000000, '\x00', 0x0, r0, 0x5, 0x2, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_BIND_MAP(0x23, &(0x7f00000004c0)={r2, r5}, 0xc) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000880)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xa, 0x5, &(0x7f0000000580)=ANY=[@ANYBLOB="660a0000341b050000005e0000000000180000000035dba19d7cccdf6e19c07f2e1500e0ebdfffffff940000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000002000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'/28], 0x48) (async) close(0xffffffffffffffff) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000a40)='ns/uts\x00') r6 = perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000200)) syz_clone(0x10181000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)="5100fae3cdbc40a024999d59be91ac3405b910f63958ec4197c8eaa5b384cf147eb6d2f1d29b37435f3e2c8902ebd5d4905c9a700568a08a2ebd77cc") perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @perf_bp={0x0, 0x1}, 0x0, 0xc8, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 380.601737ms ago: executing program 0 (id=8161): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1b41, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0xd132}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2e) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="00090000fffffffedcf3e33bee2bcba100000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0xf6ffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 366.487728ms ago: executing program 4 (id=8162): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x4, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 360.458369ms ago: executing program 4 (id=8163): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0xd132}) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'hugetlb'}]}, 0x9) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000580)={r0, &(0x7f0000000b40), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x6e8a) 307.717325ms ago: executing program 4 (id=8164): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1b41, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0xd132}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xc, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) close(r1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'hugetlb'}]}, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000240)={0x0, 0x1, [@empty]}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x6, 0x8, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r6}, &(0x7f0000000400), &(0x7f0000000340)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kmem_cache_free\x00', r7}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r8, &(0x7f00000000c0)=ANY=[@ANYBLOB="10030300ffff"], 0xffdd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37438e486dd6317ce22080000fffe80000000000000101000007f0c08fcffffff68fad91451273fa7b49301641184a907"], 0xfdef) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r11, &(0x7f0000000000)=ANY=[], 0xfdef) openat$cgroup_procs(r4, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 294.305936ms ago: executing program 3 (id=8165): r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x17, 0x9, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = perf_event_open$cgroup(&(0x7f0000000300)={0x1, 0x80, 0x2, 0x47, 0x0, 0x6, 0x0, 0x4, 0x10000, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x6, 0x8}, 0x704, 0x8000000000000001, 0xa, 0x4, 0x8, 0x80000001, 0x40, 0x0, 0x2, 0x0, 0xde}, 0xffffffffffffffff, 0x2, r0, 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x98, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000000, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1e00000018000000030000000700000006840100", @ANYRES32=0x1, @ANYBLOB='r\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0100000005000000050000000800000000000000", @ANYBLOB="495c44d7ce63605f6aa639e3befd0dcfbda418af8cbe02f4979469854926f0c049004f1b0cd8c42b342468aa475402be7f6ac89df897077431275177c2b86491eaa565f3c1a1fcad63ecf3496e20fc0fa75f3fc2c66c1e824baca68e1971dc2039b7453781f6b9aea9c841239849269cd16485ee0dcf67f201239142cc1e15aa5d78d567c4345f534ad1952d345c964208a857947ac9", @ANYRES32, @ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x9, 0x3, 0xf4, 0x7fff, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x180, 0x0, 0x0, @void, @value, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mMm\x00\x10\x01\xe8\xd1\x00\x00\x00I\xa2l') 289.744677ms ago: executing program 1 (id=8166): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) ioctl$TUNSETOFFLOAD(r2, 0x541b, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='blkio.bfq.io_queued\x00', 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000001c0)='mm_page_alloc\x00', r4}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000008b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r6}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x60, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 257.440811ms ago: executing program 0 (id=8167): perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, r0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0x1, 0xffffffffffffffff}, 0x4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000140)="8fe2dac8b6839d3459419f7c851ed4a92b2443a570a373808b1942b799cc22341a6d2b45a6f4c4e494f7fe056b917a8445e3c54fd40cab7d1b5b7b615185b4a6797879f5f293f6d2a942f2b2025a7faa2c213e3511d4bb8c87303d6b7f8efc844950ffec3345e3c98593f594f809571578cbda66df6ae142fb30104a641fe655323d0910b3036d4913c030f8203878c48da3ceadbcade9b893ab56167a7d631098f9f879efca88b9c71bd5448caa299375fc9b6b55c7d55799c5fae5e1e78c"}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x15, 0x13, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x80}, [@generic={0x8, 0x0, 0xc, 0x3, 0x2}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 248.522192ms ago: executing program 1 (id=8168): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000780)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r0}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000618110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="000000000000000000000000235da5c218215b1f86a3b2b90000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000d80)=ANY=[@ANYRESHEX, @ANYBLOB="1dde99d824d7fb402a1f9b543275c485be1f3f829d3d23f0bd39a8d8657551a3924e2c958a843c5bb6d17e3d33a9e59f112f77c06860ae589bfa03ba19f06cf18b5744cde149ca0b454e4f7f5c29ada80fc3ebdca56d2d14826b", @ANYRESHEX=r2, @ANYRES64=r1, @ANYRES64=r0, @ANYBLOB="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"], 0x0, 0x7ff, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e01f3440cee51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cad32b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337602d3e5a815232f5e16c1b30c3a6abc85018e5ff2c91018afc9ffc2cc788bee1b47683db012469398685211dfbbae3e2ed0a50e7393bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d300006aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7af22e30d46a9d26d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977fb536a9caab37d9ac4cfc1c7b400000000000007ffc826b956ba859ac8e3c177b91bd7d5e41ff83ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d000069a16203a967c1bbe09315c29877a308bcc87dc3addb08142bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8240000e3428d2129369ee1b85af9ffffff0d0df414b315f651c8412392191fa83ee830548f11be359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92000000000f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb74d4ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905de328c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a978ee56c83a3466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342e0eaf6f330e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea95ec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf81700cd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be3827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f969369de47422604e2fc5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293b6c833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b612272d40f522d8c98c879aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbe71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd46dbd61627a2e0a74b5e6aefb7eee403502734137ff47a57f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a125e3af1130d66a7b66837ae7e7123dde7404a067ad0a6a2d6bec9411b61cad4121be3c72ff3a04713042253d438e7becf8120de3895b8ce974958bde39cb8da3427a2e9e2de936431e67fed5ab5684db07de39083d8948cc4c8a2608100000000000000000000aecb8b0b7941088f971ce17427eec32a012295cc0cdd32955176b6ad5a4bb953e58ccfa9428f452cfb5a48a9fda26db3985c8be3c2f99827da074825b01c4a3a71fb59d5798100000000000000c76b05a45d2dd8c20d971e2f3e4369168f5cb83d6ff3a18733fec726034fbfa95624135bee374414b2c8c61f52357a520efd6a10aff244bc8a62ed367981fb4d5d77f7bc093958ff46527499957da4934cd4b370cf76f72dd05fa80cdfb68c836fd81be7a58532e041a87f9222f157610a4bcdc05b2a55308c8e7568b90f7a338557e816a16972aea79dff5becefa6f9c5ce6c58fb38da9e7532dc53cfdc2e789b76f7d32aca1bfea2aa62621b78dded30fc07171866bf3d552900000000a32dda61eeda1750e157c2d569b9d08f583c0ee28daec2e8bb85f3c8e91c4448096ee953def18dc73e55cb30f9cd069d8780b00eaba382f0c3ae391c30a5f1b0f36dd0c2193b791995d2890327a10d7abac76d1202f72e97f0105184d7aaaab8d3e29c9a8d263f076b55cf53c5bb9c0662a3d19a6722d7f83ae4331d3256f90af0857788b380ccc3b266c418e66d1d756d5df6423dd0cea67bc235d3776d22270fc19301ead09f156893e9"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 194.331338ms ago: executing program 0 (id=8169): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x3}, 0xd41, 0x2000000000c8, 0x10000000, 0x0, 0x0, 0x80002, 0x0, 0x0, 0x800000}, 0x0, 0xc, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8102033300fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) 121.164547ms ago: executing program 0 (id=8170): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'netdevsim0\x00', 0x1}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="0000006a4ae70aa070322b6006396d660f000000000000040000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r3, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup.net/syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_devices(r4, &(0x7f0000000840)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r5, &(0x7f0000000940)=ANY=[@ANYBLOB="6120c618c127328d7694"], 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001400)={{r3}, 0x0, &(0x7f00000013c0)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b80)={{r3, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000b40)=r6}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c40)={{r8}, &(0x7f0000000bc0), &(0x7f0000000c00)=r7}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r9}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000cae2dfb570e695e930bcc9a0c01e0000000000000000000000000000000000ecffffffffffffff00"], 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000c80)=ANY=[@ANYBLOB="1808000000000000000000000300000018120000", @ANYRES32=r11, @ANYBLOB="0000000000000000b703c985f9e323b050b2eab05000000000001a94f50000002f0000000000001e00000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r11, 0x58, &(0x7f0000000040)}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r12, 0x4) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f00000001c0)}, {&(0x7f0000000200)=""/126, 0x7e}, {&(0x7f0000000280)=""/66, 0x42}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000000300)=""/30, 0x1e}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000000440)=""/234, 0xea}, {&(0x7f0000000340)=""/30, 0x1e}, {&(0x7f0000000540)=""/226, 0xe2}, {&(0x7f0000000640)=""/238, 0xee}], 0xa, &(0x7f0000000380)=""/32, 0x20}, 0x2020) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001000000", @ANYRES32, @ANYRES64, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r14}, 0x10) unlink(&(0x7f0000000100)='./file0/file0\x00') sendmsg$inet(r1, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0x0) 114.259337ms ago: executing program 1 (id=8171): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x49, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000440)="e6efa28ebd000000000000009a57280bfa58a30c68d007de5bc32167f2a31e7c7d1913d6505ccbe56ed35e149b49ba362d7113d8a3c1ba48e04afbea5f76fc26", &(0x7f00000000c0)=""/109}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0x12) 50.577484ms ago: executing program 1 (id=8172): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x89, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f0080047e0ffff00124000633a77fbac141416e000000194029f034d2f87e589ca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8", 0x0, 0x6b, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x420100, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000680)={'pimreg1\x00', 0x200}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200), 0x3, r1}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@const={0xb, 0x0, 0x0, 0xa, 0x1}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/33, 0x27, 0x21, 0x1, 0x400000, 0x0, @void, @value}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100032c00fc08000000000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x40004, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xb, &(0x7f00000003c0)=ANY=[@ANYRES8], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x53a2, 0x0, 0xffffffffffffffff, 0x7ff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x2, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c40)={0xffffffffffffffff, 0xe0, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000900)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000980)=[0x0, 0x0, 0x0], 0x0, 0x38, &(0x7f0000000a40), 0x0, 0x10, &(0x7f0000000a80), &(0x7f0000000ac0), 0x8, 0xe6, 0x8, 0x8, &(0x7f0000000b00)}}, 0x10) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000cc0)={0x1b, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0x2f835993, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e40)={0x18, 0x8, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0xb99}, [@call={0x85, 0x0, 0x0, 0x28}, @map_val={0x18, 0x2, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x5}, @map_val={0x18, 0x8}]}, &(0x7f0000000800)='syzkaller\x00', 0x401, 0xbe, &(0x7f0000000840)=""/190, 0x40f00, 0xc, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c80)={0x3, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000d80)=[0xffffffffffffffff, 0xffffffffffffffff, r9, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000dc0)=[{0x3, 0x3, 0x1, 0x3}, {0x5, 0x2, 0x2, 0x6}, {0x2, 0x4, 0xa, 0x7}, {0x1, 0x3, 0x9, 0xa}, {0x0, 0x5, 0x4}, {0x3, 0x5, 0x3, 0x7}, {0x4, 0x5, 0xa}, {0x3, 0x3, 0x5, 0xa}], 0x10, 0x26, @void, @value}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000940)=ANY=[@ANYRES32=r8, @ANYRES32=r5, @ANYBLOB, @ANYRES32=r3, @ANYRES32=r5, @ANYBLOB, @ANYRES64=0x0], 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r12, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r13}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file1\x00', 0x0, 0x10}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x2, 0x1b, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfd000000}}, @map_val={0x18, 0x7, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x6}, @exit], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, r2, 0x0, &(0x7f00000002c0)=[r1, 0x1, r1, r1], 0x0, 0x10, 0x7fffffff, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r14, 0x18000000000002a0, 0x1e6, 0x0, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0x0, 0x90, &(0x7f0000000300), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a537136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc, 0x0, 0xfffffffe}, 0x50) 11.778969ms ago: executing program 3 (id=8173): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x4, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 0s ago: executing program 3 (id=8174): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0xd132}) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'hugetlb'}]}, 0x9) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000580)={r0, &(0x7f0000000b40), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x6e8a) kernel console output (not intermixed with test programs): uous mode [ 835.166891][T22345] bridge0: port 2(bridge_slave_1) entered disabled state [ 835.173909][T22345] bridge0: port 1(bridge_slave_0) entered disabled state [ 839.272483][T22417] FAULT_INJECTION: forcing a failure. [ 839.272483][T22417] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 839.420898][T22417] CPU: 1 PID: 22417 Comm: syz.3.7546 Tainted: G W 5.10.226-syzkaller-00709-ge5e5644ea27f #0 [ 839.432274][T22417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 839.442157][T22417] Call Trace: [ 839.445293][T22417] dump_stack_lvl+0x1e2/0x24b [ 839.449809][T22417] ? bfq_pos_tree_add_move+0x43b/0x43b [ 839.455099][T22417] dump_stack+0x15/0x17 [ 839.459101][T22417] should_fail+0x3c6/0x510 [ 839.463349][T22417] should_fail_usercopy+0x1a/0x20 [ 839.468206][T22417] _copy_to_user+0x20/0x90 [ 839.472457][T22417] simple_read_from_buffer+0xc7/0x150 [ 839.477685][T22417] proc_fail_nth_read+0x1a3/0x210 [ 839.482530][T22417] ? proc_fault_inject_write+0x390/0x390 [ 839.487992][T22417] ? security_file_permission+0x86/0xb0 [ 839.493381][T22417] ? rw_verify_area+0x1c3/0x360 [ 839.498058][T22417] ? proc_fault_inject_write+0x390/0x390 [ 839.503527][T22417] vfs_read+0x200/0xba0 [ 839.507518][T22417] ? kernel_read+0x70/0x70 [ 839.511771][T22417] ? __kasan_check_write+0x14/0x20 [ 839.516716][T22417] ? mutex_lock+0xa5/0x110 [ 839.520969][T22417] ? mutex_trylock+0xa0/0xa0 [ 839.525535][T22417] ? __fdget_pos+0x2e7/0x3a0 [ 839.529947][T22417] ? ksys_read+0x77/0x2c0 [ 839.534112][T22417] ksys_read+0x199/0x2c0 [ 839.538191][T22417] ? vfs_write+0xe70/0xe70 [ 839.542448][T22417] ? debug_smp_processor_id+0x17/0x20 [ 839.547656][T22417] __x64_sys_read+0x7b/0x90 [ 839.551993][T22417] do_syscall_64+0x34/0x70 [ 839.556251][T22417] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 839.561969][T22417] RIP: 0033:0x7f19f2b92a3c [ 839.566223][T22417] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 839.585833][T22417] RSP: 002b:00007f19f180d030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 839.594080][T22417] RAX: ffffffffffffffda RBX: 00007f19f2d4bf80 RCX: 00007f19f2b92a3c [ 839.601886][T22417] RDX: 000000000000000f RSI: 00007f19f180d0a0 RDI: 0000000000000007 [ 839.609701][T22417] RBP: 00007f19f180d090 R08: 0000000000000000 R09: 0000000000000000 [ 839.617510][T22417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 839.625329][T22417] R13: 0000000000000000 R14: 00007f19f2d4bf80 R15: 00007fff84d33768 [ 840.029644][T22434] pim6reg: tun_chr_ioctl cmd 1074025677 [ 840.035192][T22434] pim6reg: linktype set to 823 [ 840.042511][T22440] device pim6reg1 entered promiscuous mode [ 840.194202][T22460] FAULT_INJECTION: forcing a failure. [ 840.194202][T22460] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 840.295044][T22460] CPU: 0 PID: 22460 Comm: syz.2.7563 Tainted: G W 5.10.226-syzkaller-00709-ge5e5644ea27f #0 [ 840.306696][T22460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 840.316580][T22460] Call Trace: [ 840.319718][T22460] dump_stack_lvl+0x1e2/0x24b [ 840.324218][T22460] ? bfq_pos_tree_add_move+0x43b/0x43b [ 840.329510][T22460] ? ktime_get+0x10e/0x140 [ 840.333763][T22460] dump_stack+0x15/0x17 [ 840.337752][T22460] should_fail+0x3c6/0x510 [ 840.342014][T22460] should_fail_usercopy+0x1a/0x20 [ 840.346868][T22460] _copy_to_user+0x20/0x90 [ 840.351122][T22460] bpf_test_finish+0x265/0x5a0 [ 840.355742][T22460] ? convert___skb_to_skb+0x570/0x570 [ 840.360949][T22460] ? convert_skb_to___skb+0x360/0x360 [ 840.366140][T22460] ? convert_skb_to___skb+0x208/0x360 [ 840.371366][T22460] bpf_prog_test_run_skb+0xd7a/0x1410 [ 840.376570][T22460] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 840.382326][T22460] ? __kasan_check_write+0x14/0x20 [ 840.387229][T22460] ? fput_many+0x160/0x1b0 [ 840.391480][T22460] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 840.397206][T22460] __se_sys_bpf+0x5235/0x11cb0 [ 840.401807][T22460] ? stack_trace_save+0x113/0x1c0 [ 840.406665][T22460] ? terminate_walk+0x407/0x4f0 [ 840.411354][T22460] ? stack_trace_snprint+0xf0/0xf0 [ 840.416304][T22460] ? kmem_cache_free+0xa9/0x1e0 [ 840.420992][T22460] ? kmem_cache_free+0xa9/0x1e0 [ 840.425673][T22460] ? kasan_set_track+0x5d/0x70 [ 840.430279][T22460] ? __x64_sys_bpf+0x90/0x90 [ 840.434701][T22460] ? __kasan_slab_free+0x11/0x20 [ 840.439470][T22460] ? slab_free_freelist_hook+0xc0/0x190 [ 840.444853][T22460] ? kmem_cache_free+0xa9/0x1e0 [ 840.449539][T22460] ? putname+0xe7/0x140 [ 840.453584][T22460] ? do_sys_openat2+0x1fc/0x710 [ 840.458219][T22460] ? __x64_sys_openat+0x243/0x290 [ 840.463079][T22460] ? do_syscall_64+0x34/0x70 [ 840.467513][T22460] ? _kstrtoull+0x3a0/0x4a0 [ 840.471845][T22460] ? kstrtouint_from_user+0x20a/0x2a0 [ 840.477054][T22460] ? kstrtol_from_user+0x310/0x310 [ 840.482117][T22460] ? bpf_ringbuf_notify+0x30/0x30 [ 840.487030][T22460] ? memset+0x35/0x40 [ 840.490825][T22460] ? __fsnotify_parent+0x4b9/0x6c0 [ 840.495774][T22460] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 840.502190][T22460] ? proc_fail_nth_write+0x20b/0x290 [ 840.507311][T22460] ? proc_fail_nth_read+0x210/0x210 [ 840.512345][T22460] ? security_file_permission+0x86/0xb0 [ 840.517728][T22460] ? rw_verify_area+0x1c3/0x360 [ 840.522500][T22460] ? preempt_count_add+0x92/0x1a0 [ 840.527364][T22460] ? vfs_write+0x852/0xe70 [ 840.531615][T22460] ? kmem_cache_free+0x1c0/0x1e0 [ 840.536385][T22460] ? kernel_write+0x3d0/0x3d0 [ 840.540906][T22460] ? __kasan_check_write+0x14/0x20 [ 840.545936][T22460] ? mutex_lock+0xa5/0x110 [ 840.550187][T22460] ? mutex_trylock+0xa0/0xa0 [ 840.554618][T22460] ? __kasan_check_write+0x14/0x20 [ 840.559561][T22460] ? fput_many+0x160/0x1b0 [ 840.563820][T22460] ? debug_smp_processor_id+0x17/0x20 [ 840.569022][T22460] __x64_sys_bpf+0x7b/0x90 [ 840.573273][T22460] do_syscall_64+0x34/0x70 [ 840.577526][T22460] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 840.583257][T22460] RIP: 0033:0x7f44ebfe1ff9 [ 840.587508][T22460] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 840.606952][T22460] RSP: 002b:00007f44eac5b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 840.615192][T22460] RAX: ffffffffffffffda RBX: 00007f44ec199f80 RCX: 00007f44ebfe1ff9 [ 840.623124][T22460] RDX: 0000000000000050 RSI: 0000000020000900 RDI: 000000000000000a [ 840.630942][T22460] RBP: 00007f44eac5b090 R08: 0000000000000000 R09: 0000000000000000 [ 840.638747][T22460] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 840.646556][T22460] R13: 0000000000000000 R14: 00007f44ec199f80 R15: 00007fff6ad246f8 [ 841.334957][T22478] device pim6reg1 entered promiscuous mode [ 841.414365][T22483] FAULT_INJECTION: forcing a failure. [ 841.414365][T22483] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 841.435745][T22483] CPU: 0 PID: 22483 Comm: syz.0.7571 Tainted: G W 5.10.226-syzkaller-00709-ge5e5644ea27f #0 [ 841.447021][T22483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 841.456901][T22483] Call Trace: [ 841.460043][T22483] dump_stack_lvl+0x1e2/0x24b [ 841.464550][T22483] ? bfq_pos_tree_add_move+0x43b/0x43b [ 841.469845][T22483] dump_stack+0x15/0x17 [ 841.473831][T22483] should_fail+0x3c6/0x510 [ 841.478171][T22483] should_fail_usercopy+0x1a/0x20 [ 841.483031][T22483] strncpy_from_user+0x24/0x2d0 [ 841.487724][T22483] __se_sys_bpf+0x1389/0x11cb0 [ 841.492323][T22483] ? stack_trace_save+0x113/0x1c0 [ 841.497178][T22483] ? terminate_walk+0x407/0x4f0 [ 841.501867][T22483] ? stack_trace_snprint+0xf0/0xf0 [ 841.506823][T22483] ? kmem_cache_free+0xa9/0x1e0 [ 841.511502][T22483] ? kmem_cache_free+0xa9/0x1e0 [ 841.516187][T22483] ? kasan_set_track+0x5d/0x70 [ 841.520793][T22483] ? __x64_sys_bpf+0x90/0x90 [ 841.525210][T22483] ? __kasan_slab_free+0x11/0x20 [ 841.529984][T22483] ? slab_free_freelist_hook+0xc0/0x190 [ 841.535363][T22483] ? kmem_cache_free+0xa9/0x1e0 [ 841.540051][T22483] ? putname+0xe7/0x140 [ 841.544041][T22483] ? do_sys_openat2+0x1fc/0x710 [ 841.548730][T22483] ? __x64_sys_openat+0x243/0x290 [ 841.553590][T22483] ? do_syscall_64+0x34/0x70 [ 841.558019][T22483] ? _kstrtoull+0x3a0/0x4a0 [ 841.562361][T22483] ? memset+0x35/0x40 [ 841.566175][T22483] ? __fsnotify_parent+0x4b9/0x6c0 [ 841.571125][T22483] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 841.577545][T22483] ? proc_fail_nth_write+0x20b/0x290 [ 841.582667][T22483] ? proc_fail_nth_read+0x210/0x210 [ 841.587703][T22483] ? security_file_permission+0x86/0xb0 [ 841.593083][T22483] ? rw_verify_area+0x1c3/0x360 [ 841.597767][T22483] ? preempt_count_add+0x92/0x1a0 [ 841.602640][T22483] ? vfs_write+0x852/0xe70 [ 841.606888][T22483] ? kmem_cache_free+0x1c0/0x1e0 [ 841.611658][T22483] ? kernel_write+0x3d0/0x3d0 [ 841.616172][T22483] ? __kasan_check_write+0x14/0x20 [ 841.621134][T22483] ? mutex_lock+0xa5/0x110 [ 841.625368][T22483] ? mutex_trylock+0xa0/0xa0 [ 841.629886][T22483] ? __kasan_check_write+0x14/0x20 [ 841.634836][T22483] ? fput_many+0x160/0x1b0 [ 841.639105][T22483] ? debug_smp_processor_id+0x17/0x20 [ 841.644292][T22483] __x64_sys_bpf+0x7b/0x90 [ 841.648545][T22483] do_syscall_64+0x34/0x70 [ 841.652800][T22483] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 841.658525][T22483] RIP: 0033:0x7f6cf8064ff9 [ 841.662777][T22483] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 841.682222][T22483] RSP: 002b:00007f6cf6cde038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 841.690464][T22483] RAX: ffffffffffffffda RBX: 00007f6cf821cf80 RCX: 00007f6cf8064ff9 [ 841.698280][T22483] RDX: 0000000000000080 RSI: 0000000020000140 RDI: 0000000000000005 [ 841.706092][T22483] RBP: 00007f6cf6cde090 R08: 0000000000000000 R09: 0000000000000000 [ 841.713891][T22483] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 841.721710][T22483] R13: 0000000000000000 R14: 00007f6cf821cf80 R15: 00007ffe2cef7ad8 [ 841.869813][T22498] syz.4.7577[22498] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 841.869879][T22498] syz.4.7577[22498] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 843.233364][T22540] device sit0 entered promiscuous mode [ 843.787205][T22560] device pim6reg1 entered promiscuous mode [ 844.159477][ T24] audit: type=1400 audit(1729591272.449:158): avc: denied { read } for pid=22572 comm="syz.1.7601" name="cgroup.subtree_control" dev="cgroup2" ino=282 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 844.782682][T22603] bridge0: port 2(bridge_slave_1) entered disabled state [ 844.789723][T22603] bridge0: port 1(bridge_slave_0) entered disabled state [ 844.940281][T22619] FAULT_INJECTION: forcing a failure. [ 844.940281][T22619] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 844.946627][T22618] device pim6reg1 entered promiscuous mode [ 844.963356][T22619] CPU: 0 PID: 22619 Comm: syz.1.7617 Tainted: G W 5.10.226-syzkaller-00709-ge5e5644ea27f #0 [ 844.974540][T22619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 844.984428][T22619] Call Trace: [ 844.987564][T22619] dump_stack_lvl+0x1e2/0x24b [ 844.992071][T22619] ? bfq_pos_tree_add_move+0x43b/0x43b [ 844.997365][T22619] dump_stack+0x15/0x17 [ 845.001356][T22619] should_fail+0x3c6/0x510 [ 845.005619][T22619] should_fail_usercopy+0x1a/0x20 [ 845.010558][T22619] _copy_from_user+0x20/0xd0 [ 845.014983][T22619] memdup_user+0x5e/0xb0 [ 845.019069][T22619] __se_sys_bpf+0x5b94/0x11cb0 [ 845.023662][T22619] ? stack_trace_save+0x113/0x1c0 [ 845.028523][T22619] ? terminate_walk+0x407/0x4f0 [ 845.033221][T22619] ? stack_trace_snprint+0xf0/0xf0 [ 845.038162][T22619] ? kmem_cache_free+0xa9/0x1e0 [ 845.042842][T22619] ? kmem_cache_free+0xa9/0x1e0 [ 845.047529][T22619] ? kasan_set_track+0x5d/0x70 [ 845.052153][T22619] ? __x64_sys_bpf+0x90/0x90 [ 845.056557][T22619] ? __kasan_slab_free+0x11/0x20 [ 845.061338][T22619] ? _kstrtoull+0x3a0/0x4a0 [ 845.065670][T22619] ? kstrtouint_from_user+0x20a/0x2a0 [ 845.070878][T22619] ? kstrtol_from_user+0x310/0x310 [ 845.075826][T22619] ? memset+0x35/0x40 [ 845.079642][T22619] ? __fsnotify_parent+0x4b9/0x6c0 [ 845.084594][T22619] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 845.091023][T22619] ? proc_fail_nth_write+0x20b/0x290 [ 845.096134][T22619] ? proc_fail_nth_read+0x210/0x210 [ 845.101169][T22619] ? security_file_permission+0x86/0xb0 [ 845.106548][T22619] ? rw_verify_area+0x1c3/0x360 [ 845.111323][T22619] ? preempt_count_add+0x92/0x1a0 [ 845.116181][T22619] ? vfs_write+0x852/0xe70 [ 845.120436][T22619] ? kmem_cache_free+0x1c0/0x1e0 [ 845.125212][T22619] ? kernel_write+0x3d0/0x3d0 [ 845.129722][T22619] ? __kasan_check_write+0x14/0x20 [ 845.134667][T22619] ? mutex_lock+0xa5/0x110 [ 845.138930][T22619] ? mutex_trylock+0xa0/0xa0 [ 845.143345][T22619] ? __kasan_check_write+0x14/0x20 [ 845.148294][T22619] ? fput_many+0x160/0x1b0 [ 845.152554][T22619] ? debug_smp_processor_id+0x17/0x20 [ 845.157756][T22619] __x64_sys_bpf+0x7b/0x90 [ 845.162051][T22619] do_syscall_64+0x34/0x70 [ 845.166381][T22619] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 845.172080][T22619] RIP: 0033:0x7fdbb1b1eff9 [ 845.176350][T22619] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 845.195781][T22619] RSP: 002b:00007fdbb0798038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 845.204022][T22619] RAX: ffffffffffffffda RBX: 00007fdbb1cd6f80 RCX: 00007fdbb1b1eff9 [ 845.211830][T22619] RDX: 0000000000000020 RSI: 0000000020000e80 RDI: 0000000000000001 [ 845.219641][T22619] RBP: 00007fdbb0798090 R08: 0000000000000000 R09: 0000000000000000 [ 845.227626][T22619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 845.235446][T22619] R13: 0000000000000000 R14: 00007fdbb1cd6f80 R15: 00007ffd2d9ea768 [ 845.370584][T22630] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 846.075046][T22662] device pim6reg1 entered promiscuous mode [ 846.254180][ T24] audit: type=1400 audit(1729591274.519:159): avc: denied { create } for pid=22665 comm="syz.1.7635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 846.260157][T22673] FAULT_INJECTION: forcing a failure. [ 846.260157][T22673] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 846.577438][T22673] CPU: 0 PID: 22673 Comm: syz.0.7637 Tainted: G W 5.10.226-syzkaller-00709-ge5e5644ea27f #0 [ 846.588635][T22673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 846.598526][T22673] Call Trace: [ 846.601664][T22673] dump_stack_lvl+0x1e2/0x24b [ 846.606187][T22673] ? bfq_pos_tree_add_move+0x43b/0x43b [ 846.611467][T22673] ? ktime_get+0x10e/0x140 [ 846.615718][T22673] dump_stack+0x15/0x17 [ 846.619707][T22673] should_fail+0x3c6/0x510 [ 846.623963][T22673] should_fail_usercopy+0x1a/0x20 [ 846.628831][T22673] _copy_to_user+0x20/0x90 [ 846.633078][T22673] bpf_test_finish+0x297/0x5a0 [ 846.637677][T22673] ? convert___skb_to_skb+0x570/0x570 [ 846.642893][T22673] ? convert_skb_to___skb+0x360/0x360 [ 846.648103][T22673] ? convert_skb_to___skb+0x208/0x360 [ 846.653298][T22673] bpf_prog_test_run_skb+0xd7a/0x1410 [ 846.658510][T22673] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 846.664243][T22673] ? __kasan_check_write+0x14/0x20 [ 846.669182][T22673] ? fput_many+0x160/0x1b0 [ 846.673431][T22673] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 846.679161][T22673] __se_sys_bpf+0x5235/0x11cb0 [ 846.683758][T22673] ? stack_trace_save+0x113/0x1c0 [ 846.688624][T22673] ? terminate_walk+0x407/0x4f0 [ 846.693313][T22673] ? stack_trace_snprint+0xf0/0xf0 [ 846.698256][T22673] ? kmem_cache_free+0xa9/0x1e0 [ 846.702940][T22673] ? kmem_cache_free+0xa9/0x1e0 [ 846.707627][T22673] ? kasan_set_track+0x5d/0x70 [ 846.712228][T22673] ? __x64_sys_bpf+0x90/0x90 [ 846.716652][T22673] ? __kasan_slab_free+0x11/0x20 [ 846.721426][T22673] ? slab_free_freelist_hook+0xc0/0x190 [ 846.726810][T22673] ? kmem_cache_free+0xa9/0x1e0 [ 846.731494][T22673] ? putname+0xe7/0x140 [ 846.735482][T22673] ? do_sys_openat2+0x1fc/0x710 [ 846.740171][T22673] ? __x64_sys_openat+0x243/0x290 [ 846.745032][T22673] ? do_syscall_64+0x34/0x70 [ 846.749550][T22673] ? _kstrtoull+0x3a0/0x4a0 [ 846.753889][T22673] ? kstrtouint_from_user+0x20a/0x2a0 [ 846.759095][T22673] ? kstrtol_from_user+0x310/0x310 [ 846.764214][T22673] ? putname+0xe7/0x140 [ 846.768213][T22673] ? memset+0x35/0x40 [ 846.772026][T22673] ? __fsnotify_parent+0x4b9/0x6c0 [ 846.776973][T22673] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 846.783398][T22673] ? proc_fail_nth_write+0x20b/0x290 [ 846.788531][T22673] ? proc_fail_nth_read+0x210/0x210 [ 846.793554][T22673] ? security_file_permission+0x86/0xb0 [ 846.798948][T22673] ? rw_verify_area+0x1c3/0x360 [ 846.803620][T22673] ? preempt_count_add+0x92/0x1a0 [ 846.808477][T22673] ? vfs_write+0x852/0xe70 [ 846.812728][T22673] ? putname+0xe7/0x140 [ 846.816724][T22673] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 846.822370][T22673] ? kmem_cache_free+0x1c0/0x1e0 [ 846.827140][T22673] ? kernel_write+0x3d0/0x3d0 [ 846.831659][T22673] ? __kasan_check_write+0x14/0x20 [ 846.836602][T22673] ? mutex_lock+0xa5/0x110 [ 846.840855][T22673] ? mutex_trylock+0xa0/0xa0 [ 846.845286][T22673] ? __kasan_check_write+0x14/0x20 [ 846.850227][T22673] ? fput_many+0x160/0x1b0 [ 846.854485][T22673] ? debug_smp_processor_id+0x17/0x20 [ 846.859687][T22673] __x64_sys_bpf+0x7b/0x90 [ 846.863940][T22673] do_syscall_64+0x34/0x70 [ 846.868192][T22673] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 846.873920][T22673] RIP: 0033:0x7f6cf8064ff9 [ 846.878171][T22673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 846.897616][T22673] RSP: 002b:00007f6cf6cde038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 846.905857][T22673] RAX: ffffffffffffffda RBX: 00007f6cf821cf80 RCX: 00007f6cf8064ff9 [ 846.913664][T22673] RDX: 0000000000000050 RSI: 0000000020000900 RDI: 000000000000000a [ 846.921473][T22673] RBP: 00007f6cf6cde090 R08: 0000000000000000 R09: 0000000000000000 [ 846.929289][T22673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 846.937094][T22673] R13: 0000000000000000 R14: 00007f6cf821cf80 R15: 00007ffe2cef7ad8 [ 847.084697][T22691] cgroup: fork rejected by pids controller in /syz3 [ 847.311340][T22706] tap0: tun_chr_ioctl cmd 21731 [ 847.475663][T22724] FAULT_INJECTION: forcing a failure. [ 847.475663][T22724] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 847.489423][T22724] CPU: 1 PID: 22724 Comm: syz.0.7656 Tainted: G W 5.10.226-syzkaller-00709-ge5e5644ea27f #0 [ 847.500735][T22724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 847.510618][T22724] Call Trace: [ 847.513759][T22724] dump_stack_lvl+0x1e2/0x24b [ 847.518352][T22724] ? bfq_pos_tree_add_move+0x43b/0x43b [ 847.523731][T22724] dump_stack+0x15/0x17 [ 847.527807][T22724] should_fail+0x3c6/0x510 [ 847.532252][T22724] should_fail_alloc_page+0x52/0x60 [ 847.537275][T22724] __alloc_pages_nodemask+0x1b3/0xaf0 [ 847.543027][T22724] ? __kernel_text_address+0x9b/0x110 [ 847.548368][T22724] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 847.553737][T22724] ? stack_trace_save+0x113/0x1c0 [ 847.558705][T22724] ? avc_has_perm_noaudit+0x117/0x240 [ 847.563907][T22724] shmem_alloc_page+0x257/0x420 [ 847.568590][T22724] ? put_page+0xd0/0xd0 [ 847.572584][T22724] ? percpu_counter_add_batch+0x13d/0x160 [ 847.578247][T22724] shmem_alloc_and_acct_page+0x395/0x8e0 [ 847.583725][T22724] ? shmem_swapin_page+0x1950/0x1950 [ 847.588827][T22724] ? find_get_entry+0x44c/0x4c0 [ 847.593512][T22724] ? page_cache_prev_miss+0x410/0x410 [ 847.598852][T22724] ? down_read_trylock+0x179/0x1d0 [ 847.603781][T22724] ? find_lock_entry+0x1df/0x200 [ 847.608560][T22724] shmem_getpage_gfp+0x891/0x2480 [ 847.613416][T22724] ? __kasan_check_write+0x14/0x20 [ 847.618367][T22724] ? shmem_getpage+0xa0/0xa0 [ 847.622780][T22724] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 847.628518][T22724] shmem_write_begin+0xca/0x1b0 [ 847.633433][T22724] generic_perform_write+0x2cd/0x570 [ 847.638547][T22724] ? grab_cache_page_write_begin+0xa0/0xa0 [ 847.644191][T22724] ? file_remove_privs+0x570/0x570 [ 847.649261][T22724] ? __kasan_check_write+0x14/0x20 [ 847.654207][T22724] __generic_file_write_iter+0x23c/0x560 [ 847.659683][T22724] ? generic_write_checks+0x3b9/0x470 [ 847.664904][T22724] generic_file_write_iter+0xaf/0x1c0 [ 847.670130][T22724] vfs_write+0xb4c/0xe70 [ 847.674170][T22724] ? kernel_write+0x3d0/0x3d0 [ 847.678682][T22724] ? mutex_trylock+0xa0/0xa0 [ 847.683128][T22724] ? __fdget_pos+0x2e7/0x3a0 [ 847.687539][T22724] ? ksys_write+0x77/0x2c0 [ 847.691790][T22724] ksys_write+0x199/0x2c0 [ 847.696061][T22724] ? __ia32_sys_read+0x90/0x90 [ 847.700558][T22724] ? debug_smp_processor_id+0x17/0x20 [ 847.705774][T22724] __x64_sys_write+0x7b/0x90 [ 847.710352][T22724] do_syscall_64+0x34/0x70 [ 847.714598][T22724] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 847.720322][T22724] RIP: 0033:0x7f6cf8064ff9 [ 847.724573][T22724] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 847.744024][T22724] RSP: 002b:00007f6cf6cde038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 847.752282][T22724] RAX: ffffffffffffffda RBX: 00007f6cf821cf80 RCX: 00007f6cf8064ff9 [ 847.760080][T22724] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000009 [ 847.767925][T22724] RBP: 00007f6cf6cde090 R08: 0000000000000000 R09: 0000000000000000 [ 847.775815][T22724] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 847.783682][T22724] R13: 0000000000000000 R14: 00007f6cf821cf80 R15: 00007ffe2cef7ad8 [ 847.808706][T22714] bridge0: port 1(bridge_slave_0) entered blocking state [ 847.815615][T22714] bridge0: port 1(bridge_slave_0) entered disabled state [ 847.823218][T22714] device bridge_slave_0 entered promiscuous mode [ 847.830222][T22714] bridge0: port 2(bridge_slave_1) entered blocking state [ 847.837139][T22714] bridge0: port 2(bridge_slave_1) entered disabled state [ 847.844771][T22714] device bridge_slave_1 entered promiscuous mode [ 847.858136][T22733] FAULT_INJECTION: forcing a failure. [ 847.858136][T22733] name failslab, interval 1, probability 0, space 0, times 0 [ 847.870609][T22733] CPU: 1 PID: 22733 Comm: syz.0.7658 Tainted: G W 5.10.226-syzkaller-00709-ge5e5644ea27f #0 [ 847.881748][T22733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 847.890232][T22714] bridge0: port 2(bridge_slave_1) entered blocking state [ 847.891633][T22733] Call Trace: [ 847.891652][T22733] dump_stack_lvl+0x1e2/0x24b [ 847.891669][T22733] ? panic+0x812/0x812 [ 847.898512][T22714] bridge0: port 2(bridge_slave_1) entered forwarding state [ 847.901623][T22733] ? bfq_pos_tree_add_move+0x43b/0x43b [ 847.906205][T22714] bridge0: port 1(bridge_slave_0) entered blocking state [ 847.910134][T22733] dump_stack+0x15/0x17 [ 847.910143][T22733] should_fail+0x3c6/0x510 [ 847.910153][T22733] ? tipc_msg_create+0x49/0x5d0 [ 847.910176][T22733] __should_failslab+0xa4/0xe0 [ 847.917166][T22714] bridge0: port 1(bridge_slave_0) entered forwarding state [ 847.922459][T22733] should_failslab+0x9/0x20 [ 847.922469][T22733] __kmalloc_track_caller+0x5f/0x320 [ 847.922484][T22733] ? kmem_cache_alloc+0x168/0x2e0 [ 847.944774][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 847.946854][T22733] ? __alloc_skb+0x80/0x510 [ 847.946872][T22733] ? tipc_msg_create+0x49/0x5d0 [ 847.984268][T22733] __alloc_skb+0xbc/0x510 [ 847.988424][T22733] ? arch_stack_walk+0xf3/0x140 [ 847.993114][T22733] tipc_msg_create+0x49/0x5d0 [ 847.997627][T22733] tipc_group_proto_xmit+0x14a/0x890 [ 848.002751][T22733] tipc_group_proto_rcv+0x16cb/0x1d40 [ 848.007961][T22733] tipc_sk_proto_rcv+0x851/0x1db0 [ 848.012817][T22733] ? trace_tipc_sk_dump+0x6e0/0x6e0 [ 848.017857][T22733] tipc_sk_filter_rcv+0x3603/0x3e00 [ 848.022883][T22733] ? 0xffffffffa0028000 [ 848.026874][T22733] ? is_bpf_text_address+0x172/0x190 [ 848.031995][T22733] ? stack_trace_save+0x1c0/0x1c0 [ 848.036856][T22733] ? 0xffffffffa0028000 [ 848.040850][T22733] ? is_bpf_text_address+0x172/0x190 [ 848.046052][T22733] ? tipc_sk_dump+0xf50/0xf50 [ 848.050608][T22733] ? __kasan_check_write+0x14/0x20 [ 848.055509][T22733] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 848.060371][T22733] tipc_sk_rcv+0x8a1/0x1e30 [ 848.064719][T22733] ? __skb_queue_purge+0x180/0x180 [ 848.069658][T22733] tipc_node_xmit+0x34b/0xe30 [ 848.074175][T22733] ? slab_post_alloc_hook+0x80/0x2f0 [ 848.079293][T22733] ? tipc_node_get_linkname+0x190/0x190 [ 848.084678][T22733] ? tipc_msg_create+0x49/0x5d0 [ 848.089360][T22733] ? __kmalloc_track_caller+0x184/0x320 [ 848.094746][T22733] tipc_node_distr_xmit+0x36a/0x4d0 [ 848.099775][T22733] ? tipc_node_xmit_skb+0x1b0/0x1b0 [ 848.104810][T22733] ? tipc_group_proto_xmit+0x236/0x890 [ 848.110101][T22733] tipc_group_join+0x569/0x6d0 [ 848.114700][T22733] ? tipc_msg_init+0x105/0x250 [ 848.119301][T22733] ? tipc_group_create+0x660/0x660 [ 848.124246][T22733] ? tipc_nametbl_publish+0x273/0x3a0 [ 848.129457][T22733] tipc_sk_join+0x5d3/0x8c0 [ 848.133798][T22733] tipc_setsockopt+0x794/0xb80 [ 848.138396][T22733] ? tipc_shutdown+0x950/0x950 [ 848.142999][T22733] ? security_socket_setsockopt+0x82/0xb0 [ 848.148635][T22733] ? tipc_shutdown+0x950/0x950 [ 848.153237][T22733] __sys_setsockopt+0x502/0x870 [ 848.158012][T22733] ? __ia32_sys_recv+0xb0/0xb0 [ 848.162787][T22733] __x64_sys_setsockopt+0xbf/0xd0 [ 848.167644][T22733] do_syscall_64+0x34/0x70 [ 848.171899][T22733] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 848.177627][T22733] RIP: 0033:0x7f6cf8064ff9 [ 848.181880][T22733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 848.201405][T22733] RSP: 002b:00007f6cf6cde038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 848.209650][T22733] RAX: ffffffffffffffda RBX: 00007f6cf821cf80 RCX: 00007f6cf8064ff9 [ 848.217458][T22733] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000008 [ 848.225272][T22733] RBP: 00007f6cf6cde090 R08: 00000000000004bd R09: 0000000000000000 [ 848.233085][T22733] R10: 0000000020000180 R11: 0000000000000246 R12: 0000000000000002 [ 848.240893][T22733] R13: 0000000000000000 R14: 00007f6cf821cf80 R15: 00007ffe2cef7ad8 [ 848.267093][T21632] bridge0: port 1(bridge_slave_0) entered disabled state [ 848.279819][T22736] cgroup: fork rejected by pids controller in /syz0 [ 848.287935][T21632] bridge0: port 2(bridge_slave_1) entered disabled state [ 848.353445][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 848.372786][T21632] bridge0: port 1(bridge_slave_0) entered blocking state [ 848.379774][T21632] bridge0: port 1(bridge_slave_0) entered forwarding state [ 848.388409][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 848.396475][T21632] bridge0: port 2(bridge_slave_1) entered blocking state [ 848.403371][T21632] bridge0: port 2(bridge_slave_1) entered forwarding state [ 848.412434][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 848.420539][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 848.471394][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 848.483430][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 848.515965][T22714] device veth0_vlan entered promiscuous mode [ 848.529836][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 848.568790][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 848.595036][T22714] device veth1_macvtap entered promiscuous mode [ 848.653892][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 848.678763][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 848.699078][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 848.713381][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 848.731679][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 848.748958][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 848.766736][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 848.775242][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 848.859203][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 849.449754][T22755] bridge0: port 1(bridge_slave_0) entered blocking state [ 849.511822][T22755] bridge0: port 1(bridge_slave_0) entered disabled state [ 849.519238][T22755] device bridge_slave_0 entered promiscuous mode [ 849.566943][T22755] bridge0: port 2(bridge_slave_1) entered blocking state [ 849.582150][T22755] bridge0: port 2(bridge_slave_1) entered disabled state [ 849.641522][T22755] device bridge_slave_1 entered promiscuous mode [ 850.043047][T22804] FAULT_INJECTION: forcing a failure. [ 850.043047][T22804] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 850.068873][T22804] CPU: 0 PID: 22804 Comm: syz.4.7681 Tainted: G W 5.10.226-syzkaller-00709-ge5e5644ea27f #0 [ 850.080064][T22804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 850.089953][T22804] Call Trace: [ 850.093089][T22804] dump_stack_lvl+0x1e2/0x24b [ 850.097595][T22804] ? bfq_pos_tree_add_move+0x43b/0x43b [ 850.102892][T22804] dump_stack+0x15/0x17 [ 850.106881][T22804] should_fail+0x3c6/0x510 [ 850.111135][T22804] should_fail_usercopy+0x1a/0x20 [ 850.115993][T22804] _copy_from_user+0x20/0xd0 [ 850.120423][T22804] iovec_from_user+0xc7/0x330 [ 850.124935][T22804] __import_iovec+0x6d/0x3b0 [ 850.129362][T22804] import_iovec+0xe5/0x120 [ 850.133618][T22804] ___sys_recvmsg+0x56b/0x690 [ 850.138128][T22804] ? __sys_recvmsg+0x270/0x270 [ 850.142727][T22804] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 850.148375][T22804] ? __fdget+0x1bc/0x240 [ 850.152448][T22804] __x64_sys_recvmsg+0x1ee/0x2c0 [ 850.157221][T22804] ? __kasan_check_write+0x14/0x20 [ 850.162168][T22804] ? ___sys_recvmsg+0x690/0x690 [ 850.166856][T22804] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 850.172760][T22804] ? irqentry_exit_to_user_mode+0x41/0x80 [ 850.178314][T22804] do_syscall_64+0x34/0x70 [ 850.182570][T22804] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 850.188293][T22804] RIP: 0033:0x7eff25afbff9 [ 850.192552][T22804] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 850.212075][T22804] RSP: 002b:00007eff24775038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 850.220318][T22804] RAX: ffffffffffffffda RBX: 00007eff25cb3f80 RCX: 00007eff25afbff9 [ 850.228127][T22804] RDX: 0000000000001f00 RSI: 0000000020000500 RDI: 0000000000000008 [ 850.235937][T22804] RBP: 00007eff24775090 R08: 0000000000000000 R09: 0000000000000000 [ 850.243750][T22804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 850.251562][T22804] R13: 0000000000000000 R14: 00007eff25cb3f80 R15: 00007ffea7d985b8 [ 850.341516][T22755] bridge0: port 2(bridge_slave_1) entered blocking state [ 850.348386][T22755] bridge0: port 2(bridge_slave_1) entered forwarding state [ 850.361886][ T49] device erspan0 left promiscuous mode [ 850.367238][ T49] GPL: port 1(erspan0) entered disabled state [ 850.480448][T21632] bridge0: port 2(bridge_slave_1) entered disabled state [ 850.489223][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 850.497164][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 850.504886][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 850.518035][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 850.529896][T21632] bridge0: port 1(bridge_slave_0) entered blocking state [ 850.536855][T21632] bridge0: port 1(bridge_slave_0) entered forwarding state [ 851.232134][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 851.248731][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 851.298514][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 851.305401][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 851.491909][ T49] device bridge_slave_1 left promiscuous mode [ 851.497957][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 851.539605][ T49] device bridge_slave_0 left promiscuous mode [ 851.545649][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 851.599661][ T49] device bridge_slave_1 left promiscuous mode [ 851.605613][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 851.648764][ T49] device bridge_slave_0 left promiscuous mode [ 851.654725][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 851.708536][ T49] device veth0_vlan left promiscuous mode [ 851.718521][ T49] device veth1_macvtap left promiscuous mode [ 851.724338][ T49] device veth0_vlan left promiscuous mode [ 862.403482][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 862.420066][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 862.519759][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 862.539348][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 862.555718][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 862.563921][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 862.614367][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 862.622331][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 862.630552][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 862.637819][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 862.654579][T22755] device veth0_vlan entered promiscuous mode [ 862.696258][T22856] bridge0: port 1(bridge_slave_0) entered blocking state [ 862.703244][T22856] bridge0: port 1(bridge_slave_0) entered disabled state [ 862.710804][T22856] device bridge_slave_0 entered promiscuous mode [ 862.726182][T22856] bridge0: port 2(bridge_slave_1) entered blocking state [ 862.733072][T22856] bridge0: port 2(bridge_slave_1) entered disabled state [ 862.740563][T22856] device bridge_slave_1 entered promiscuous mode [ 862.774164][T22858] bridge0: port 1(bridge_slave_0) entered blocking state [ 862.781079][T22858] bridge0: port 1(bridge_slave_0) entered disabled state [ 862.788278][T22858] device bridge_slave_0 entered promiscuous mode [ 862.797078][T22858] bridge0: port 2(bridge_slave_1) entered blocking state [ 862.803937][T22858] bridge0: port 2(bridge_slave_1) entered disabled state [ 862.811183][T22858] device bridge_slave_1 entered promiscuous mode [ 862.829514][T22855] bridge0: port 1(bridge_slave_0) entered blocking state [ 862.836352][T22855] bridge0: port 1(bridge_slave_0) entered disabled state [ 862.843615][T22855] device bridge_slave_0 entered promiscuous mode [ 862.871324][T22855] bridge0: port 2(bridge_slave_1) entered blocking state [ 862.878183][T22855] bridge0: port 2(bridge_slave_1) entered disabled state [ 862.885475][T22855] device bridge_slave_1 entered promiscuous mode [ 862.894782][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 862.902752][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 862.923937][T22755] device veth1_macvtap entered promiscuous mode [ 862.965039][T22854] bridge0: port 1(bridge_slave_0) entered blocking state [ 862.971923][T22854] bridge0: port 1(bridge_slave_0) entered disabled state [ 862.979372][T22854] device bridge_slave_0 entered promiscuous mode [ 862.986550][T22854] bridge0: port 2(bridge_slave_1) entered blocking state [ 862.993687][T22854] bridge0: port 2(bridge_slave_1) entered disabled state [ 863.001049][T22854] device bridge_slave_1 entered promiscuous mode [ 863.014375][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 863.022219][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 863.030342][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 863.061734][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 863.069809][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 863.140253][ T306] device bridge_slave_1 left promiscuous mode [ 863.146198][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 863.154015][ T306] device bridge_slave_0 left promiscuous mode [ 863.160875][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 863.173637][ T306] device veth1_macvtap left promiscuous mode [ 863.179619][ T306] device veth0_vlan left promiscuous mode [ 863.315983][T22854] bridge0: port 2(bridge_slave_1) entered blocking state [ 863.322878][T22854] bridge0: port 2(bridge_slave_1) entered forwarding state [ 863.329977][T22854] bridge0: port 1(bridge_slave_0) entered blocking state [ 863.336723][T22854] bridge0: port 1(bridge_slave_0) entered forwarding state [ 863.365766][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 863.379619][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 863.387067][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 863.394930][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 863.403152][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 863.410019][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 863.418344][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 863.426470][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 863.433327][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 863.440518][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 863.448244][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 863.456400][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 863.488817][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 863.496725][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 863.505277][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 863.514623][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 863.522177][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 863.530354][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 863.538271][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 863.545145][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 863.552473][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 863.561031][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 863.569093][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 863.575912][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 863.583213][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 863.591512][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 863.599727][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 863.616092][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 863.628306][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 863.636567][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 863.643446][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 863.651795][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 863.660205][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 863.668195][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 863.675076][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 863.683368][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 863.691081][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 863.698867][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 863.707109][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 863.716119][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 863.723026][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 863.730872][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 863.763139][T22858] device veth0_vlan entered promiscuous mode [ 863.781054][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 863.789324][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 863.797170][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 863.809294][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 863.817066][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 863.825127][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 863.833209][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 863.841655][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 863.850034][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 863.856867][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 863.864450][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 863.872863][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 863.881222][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 863.888924][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 863.896652][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 863.904189][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 863.911710][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 863.919267][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 863.930273][T22858] device veth1_macvtap entered promiscuous mode [ 863.938302][T22856] device veth0_vlan entered promiscuous mode [ 863.968869][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 863.978207][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 863.986451][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 863.994141][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 864.003235][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 864.011239][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 864.019396][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 864.057668][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 864.070682][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 864.078881][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 864.086872][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 864.097646][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 864.106104][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 864.117079][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 864.125352][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 864.141651][T22856] device veth1_macvtap entered promiscuous mode [ 864.155207][T22854] device veth0_vlan entered promiscuous mode [ 864.164920][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 864.173101][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 864.181339][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 864.188932][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 864.197052][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 864.205513][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 864.213970][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 864.222263][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 864.230136][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 864.237878][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 864.245201][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 864.260767][T22855] device veth0_vlan entered promiscuous mode [ 864.273302][T22855] device veth1_macvtap entered promiscuous mode [ 864.284168][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 864.292666][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 864.300942][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 864.309773][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 864.317713][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 864.326159][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 864.334284][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 864.341894][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 864.350110][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 864.361215][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 864.368583][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 864.375866][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 864.391045][T22854] device veth1_macvtap entered promiscuous mode [ 864.405134][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 864.414080][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 864.423223][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 864.431445][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 864.471529][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 864.492105][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 864.501063][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 864.509791][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 864.945133][T22918] syz.4.7704[22918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 864.945214][T22918] syz.4.7704[22918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 864.957007][ T24] audit: type=1400 audit(1729591293.229:160): avc: denied { create } for pid=22919 comm="syz.3.7705" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 865.784904][T22930] device syzkaller0 entered promiscuous mode [ 866.477006][ T306] device bridge_slave_1 left promiscuous mode [ 866.487966][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 866.523896][ T306] device bridge_slave_0 left promiscuous mode [ 866.597976][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 866.666591][ T306] device bridge_slave_1 left promiscuous mode [ 866.680175][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 866.810493][ T306] device bridge_slave_0 left promiscuous mode [ 866.816472][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 866.829240][ T306] device bridge_slave_1 left promiscuous mode [ 866.838208][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 866.913525][ T306] device bridge_slave_0 left promiscuous mode [ 866.928613][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 866.938146][ T306] device veth1_macvtap left promiscuous mode [ 866.948607][ T306] device veth0_vlan left promiscuous mode [ 866.970611][ T306] device veth0_vlan left promiscuous mode [ 867.387890][T22957] syz.0.7715[22957] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 867.387948][T22957] syz.0.7715[22957] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 867.475602][T22944] device veth0_vlan left promiscuous mode [ 867.494356][T22944] device veth0_vlan entered promiscuous mode [ 867.515208][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 867.552779][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 867.560687][T21632] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 869.110892][T22989] device syzkaller0 entered promiscuous mode [ 869.497155][T23003] syz.1.7727[23003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 869.497247][T23003] syz.1.7727[23003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 870.338422][T23031] bridge0: port 2(bridge_slave_1) entered disabled state [ 870.356621][T23031] bridge0: port 1(bridge_slave_0) entered disabled state [ 871.627869][T23074] bridge0: port 2(bridge_slave_1) entered disabled state [ 871.634932][T23074] bridge0: port 1(bridge_slave_0) entered disabled state [ 872.228497][T23085] device pim6reg1 entered promiscuous mode [ 872.289289][T23082] syz.1.7753[23082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 872.289345][T23082] syz.1.7753[23082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 873.811680][T23127] syz.4.7764[23127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 873.859879][T23129] FAULT_INJECTION: forcing a failure. [ 873.859879][T23129] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 873.990932][T23127] syz.4.7764[23127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 874.029018][T23129] CPU: 1 PID: 23129 Comm: syz.2.7767 Tainted: G W 5.10.226-syzkaller-00709-ge5e5644ea27f #0 [ 874.051503][T23129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 874.061387][T23129] Call Trace: [ 874.064558][T23129] dump_stack_lvl+0x1e2/0x24b [ 874.069032][T23129] ? bfq_pos_tree_add_move+0x43b/0x43b [ 874.074346][T23129] dump_stack+0x15/0x17 [ 874.078319][T23129] should_fail+0x3c6/0x510 [ 874.082575][T23129] should_fail_usercopy+0x1a/0x20 [ 874.087445][T23129] strncpy_from_user+0x24/0x2d0 [ 874.092124][T23129] __se_sys_bpf+0x1389/0x11cb0 [ 874.096721][T23129] ? stack_trace_save+0x113/0x1c0 [ 874.101580][T23129] ? terminate_walk+0x407/0x4f0 [ 874.106263][T23129] ? stack_trace_snprint+0xf0/0xf0 [ 874.111211][T23129] ? kmem_cache_free+0xa9/0x1e0 [ 874.115899][T23129] ? kmem_cache_free+0xa9/0x1e0 [ 874.120585][T23129] ? kasan_set_track+0x5d/0x70 [ 874.125180][T23129] ? __x64_sys_bpf+0x90/0x90 [ 874.129609][T23129] ? __kasan_slab_free+0x11/0x20 [ 874.134385][T23129] ? slab_free_freelist_hook+0xc0/0x190 [ 874.139764][T23129] ? kmem_cache_free+0xa9/0x1e0 [ 874.144537][T23129] ? putname+0xe7/0x140 [ 874.148532][T23129] ? do_sys_openat2+0x1fc/0x710 [ 874.153216][T23129] ? __x64_sys_openat+0x243/0x290 [ 874.158075][T23129] ? do_syscall_64+0x34/0x70 [ 874.162513][T23129] ? _kstrtoull+0x3a0/0x4a0 [ 874.166850][T23129] ? memset+0x35/0x40 [ 874.170666][T23129] ? __fsnotify_parent+0x4b9/0x6c0 [ 874.175645][T23129] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 874.182039][T23129] ? proc_fail_nth_write+0x20b/0x290 [ 874.187157][T23129] ? proc_fail_nth_read+0x210/0x210 [ 874.192196][T23129] ? security_file_permission+0x86/0xb0 [ 874.197571][T23129] ? rw_verify_area+0x1c3/0x360 [ 874.202256][T23129] ? preempt_count_add+0x92/0x1a0 [ 874.207117][T23129] ? vfs_write+0x852/0xe70 [ 874.211371][T23129] ? kmem_cache_free+0xa9/0x1e0 [ 874.216055][T23129] ? kernel_write+0x3d0/0x3d0 [ 874.220572][T23129] ? __kasan_check_write+0x14/0x20 [ 874.225518][T23129] ? mutex_lock+0xa5/0x110 [ 874.229771][T23129] ? mutex_trylock+0xa0/0xa0 [ 874.234200][T23129] ? __kasan_check_write+0x14/0x20 [ 874.239141][T23129] ? fput_many+0x160/0x1b0 [ 874.243401][T23129] ? debug_smp_processor_id+0x17/0x20 [ 874.248602][T23129] __x64_sys_bpf+0x7b/0x90 [ 874.252855][T23129] do_syscall_64+0x34/0x70 [ 874.257108][T23129] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 874.262834][T23129] RIP: 0033:0x7fec178b5ff9 [ 874.267089][T23129] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 874.286557][T23129] RSP: 002b:00007fec1652f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 874.294782][T23129] RAX: ffffffffffffffda RBX: 00007fec17a6df80 RCX: 00007fec178b5ff9 [ 874.302584][T23129] RDX: 0000000000000080 RSI: 0000000020000140 RDI: 0000000000000005 [ 874.310393][T23129] RBP: 00007fec1652f090 R08: 0000000000000000 R09: 0000000000000000 [ 874.318218][T23129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 874.326019][T23129] R13: 0000000000000000 R14: 00007fec17a6df80 R15: 00007ffef5a2c8e8 [ 874.431772][T23138] bridge0: port 2(bridge_slave_1) entered disabled state [ 874.438770][T23138] bridge0: port 1(bridge_slave_0) entered disabled state [ 875.823781][T23183] syz.3.7784[23183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 875.823840][T23183] syz.3.7784[23183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 876.019883][T23191] syz.1.7787[23191] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 876.144022][T23191] syz.1.7787[23191] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 876.374064][T23201] FAULT_INJECTION: forcing a failure. [ 876.374064][T23201] name failslab, interval 1, probability 0, space 0, times 0 [ 876.397863][T23201] CPU: 0 PID: 23201 Comm: syz.0.7790 Tainted: G W 5.10.226-syzkaller-00709-ge5e5644ea27f #0 [ 876.408956][T23201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 876.418843][T23201] Call Trace: [ 876.421989][T23201] dump_stack_lvl+0x1e2/0x24b [ 876.426582][T23201] ? panic+0x812/0x812 [ 876.430485][T23201] ? slab_post_alloc_hook+0x80/0x2f0 [ 876.435606][T23201] ? bfq_pos_tree_add_move+0x43b/0x43b [ 876.440900][T23201] ? __kasan_check_write+0x14/0x20 [ 876.445846][T23201] dump_stack+0x15/0x17 [ 876.449843][T23201] should_fail+0x3c6/0x510 [ 876.454098][T23201] ? skb_clone+0x1de/0x370 [ 876.458342][T23201] __should_failslab+0xa4/0xe0 [ 876.462943][T23201] should_failslab+0x9/0x20 [ 876.467277][T23201] kmem_cache_alloc+0x3d/0x2e0 [ 876.471878][T23201] ? __bpf_redirect+0x673/0xde0 [ 876.476574][T23201] skb_clone+0x1de/0x370 [ 876.480644][T23201] bpf_clone_redirect+0xa6/0x390 [ 876.485429][T23201] bpf_prog_6893982b85ceadf7+0x56/0xd10 [ 876.490803][T23201] ? __kasan_slab_alloc+0xc3/0xe0 [ 876.495669][T23201] ? __kasan_slab_alloc+0xb1/0xe0 [ 876.500520][T23201] ? slab_post_alloc_hook+0x61/0x2f0 [ 876.505640][T23201] ? kmem_cache_alloc+0x168/0x2e0 [ 876.510512][T23201] ? __build_skb+0x2a/0x300 [ 876.514834][T23201] ? build_skb+0x25/0x1e0 [ 876.519004][T23201] ? bpf_prog_test_run_skb+0x388/0x1410 [ 876.524385][T23201] ? __se_sys_bpf+0x5235/0x11cb0 [ 876.529159][T23201] ? __x64_sys_bpf+0x7b/0x90 [ 876.533582][T23201] ? do_syscall_64+0x34/0x70 [ 876.538013][T23201] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 876.543925][T23201] ? __kasan_check_read+0x11/0x20 [ 876.548776][T23201] ? bpf_test_timer_continue+0x140/0x440 [ 876.554247][T23201] bpf_test_run+0x40b/0xc20 [ 876.558586][T23201] ? convert___skb_to_skb+0x570/0x570 [ 876.563788][T23201] ? eth_type_trans+0x2e4/0x620 [ 876.568478][T23201] ? eth_get_headlen+0x240/0x240 [ 876.573248][T23201] ? convert___skb_to_skb+0x44/0x570 [ 876.578370][T23201] bpf_prog_test_run_skb+0xb6e/0x1410 [ 876.583606][T23201] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 876.589310][T23201] ? __kasan_check_write+0x14/0x20 [ 876.594259][T23201] ? fput_many+0x160/0x1b0 [ 876.598506][T23201] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 876.604236][T23201] __se_sys_bpf+0x5235/0x11cb0 [ 876.608835][T23201] ? stack_trace_save+0x113/0x1c0 [ 876.613696][T23201] ? terminate_walk+0x407/0x4f0 [ 876.618381][T23201] ? stack_trace_snprint+0xf0/0xf0 [ 876.623330][T23201] ? kmem_cache_free+0xa9/0x1e0 [ 876.628012][T23201] ? kmem_cache_free+0xa9/0x1e0 [ 876.632699][T23201] ? kasan_set_track+0x5d/0x70 [ 876.637300][T23201] ? __x64_sys_bpf+0x90/0x90 [ 876.641733][T23201] ? __kasan_slab_free+0x11/0x20 [ 876.646503][T23201] ? slab_free_freelist_hook+0xc0/0x190 [ 876.651918][T23201] ? kmem_cache_free+0xa9/0x1e0 [ 876.656567][T23201] ? putname+0xe7/0x140 [ 876.660563][T23201] ? do_sys_openat2+0x1fc/0x710 [ 876.665247][T23201] ? __x64_sys_openat+0x243/0x290 [ 876.670108][T23201] ? do_syscall_64+0x34/0x70 [ 876.674540][T23201] ? _kstrtoull+0x3a0/0x4a0 [ 876.678965][T23201] ? kstrtouint_from_user+0x20a/0x2a0 [ 876.684172][T23201] ? kstrtol_from_user+0x310/0x310 [ 876.689125][T23201] ? memset+0x35/0x40 [ 876.692936][T23201] ? __fsnotify_parent+0x4b9/0x6c0 [ 876.697974][T23201] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 876.704402][T23201] ? proc_fail_nth_write+0x20b/0x290 [ 876.709515][T23201] ? proc_fail_nth_read+0x210/0x210 [ 876.714548][T23201] ? security_file_permission+0x86/0xb0 [ 876.719931][T23201] ? rw_verify_area+0x1c3/0x360 [ 876.724614][T23201] ? preempt_count_add+0x92/0x1a0 [ 876.729472][T23201] ? vfs_write+0x852/0xe70 [ 876.733728][T23201] ? kmem_cache_free+0xa9/0x1e0 [ 876.738414][T23201] ? kernel_write+0x3d0/0x3d0 [ 876.742931][T23201] ? __kasan_check_write+0x14/0x20 [ 876.747959][T23201] ? mutex_lock+0xa5/0x110 [ 876.752220][T23201] ? mutex_trylock+0xa0/0xa0 [ 876.756645][T23201] ? __kasan_check_write+0x14/0x20 [ 876.761587][T23201] ? fput_many+0x160/0x1b0 [ 876.765862][T23201] ? debug_smp_processor_id+0x17/0x20 [ 876.771054][T23201] __x64_sys_bpf+0x7b/0x90 [ 876.775307][T23201] do_syscall_64+0x34/0x70 [ 876.779560][T23201] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 876.785292][T23201] RIP: 0033:0x7fbbbc983ff9 [ 876.789536][T23201] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 876.809121][T23201] RSP: 002b:00007fbbbb5fd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 876.817382][T23201] RAX: ffffffffffffffda RBX: 00007fbbbcb3bf80 RCX: 00007fbbbc983ff9 [ 876.825171][T23201] RDX: 000000000000002c RSI: 0000000020000080 RDI: 000000000000000a [ 876.832987][T23201] RBP: 00007fbbbb5fd090 R08: 0000000000000000 R09: 0000000000000000 [ 876.840795][T23201] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 876.848606][T23201] R13: 0000000000000000 R14: 00007fbbbcb3bf80 R15: 00007ffcd6e0dee8 [ 878.154287][T23252] syz.3.7807[23252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 878.154343][T23252] syz.3.7807[23252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 878.691806][T23269] bridge0: port 3(vlan1) entered blocking state [ 878.710673][T23269] bridge0: port 3(vlan1) entered disabled state [ 878.718202][T23269] device vlan1 entered promiscuous mode [ 879.421809][ T24] audit: type=1400 audit(1729591307.699:161): avc: denied { create } for pid=23289 comm="syz.0.7824" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 880.110504][T23312] bridge0: port 2(bridge_slave_1) entered disabled state [ 880.117526][T23312] bridge0: port 1(bridge_slave_0) entered disabled state [ 880.516952][T23325] device veth1_macvtap left promiscuous mode [ 881.097019][T23341] device syzkaller0 entered promiscuous mode [ 882.225654][T23379] device sit0 entered promiscuous mode [ 883.020391][T23387] syz.4.7856[23387] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 883.624913][T23404] FAULT_INJECTION: forcing a failure. [ 883.624913][T23404] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 883.808488][T23404] CPU: 1 PID: 23404 Comm: syz.1.7860 Tainted: G W 5.10.226-syzkaller-00709-ge5e5644ea27f #0 [ 883.819675][T23404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 883.829565][T23404] Call Trace: [ 883.832700][T23404] dump_stack_lvl+0x1e2/0x24b [ 883.837205][T23404] ? bfq_pos_tree_add_move+0x43b/0x43b [ 883.842499][T23404] ? 0xffffffffa0028000 [ 883.846502][T23404] ? is_bpf_text_address+0x172/0x190 [ 883.851654][T23404] dump_stack+0x15/0x17 [ 883.855603][T23404] should_fail+0x3c6/0x510 [ 883.859859][T23404] should_fail_usercopy+0x1a/0x20 [ 883.864714][T23404] _copy_from_user+0x20/0xd0 [ 883.869144][T23404] __se_sys_bpf+0x232/0x11cb0 [ 883.873659][T23404] ? stack_trace_save+0x113/0x1c0 [ 883.878518][T23404] ? terminate_walk+0x407/0x4f0 [ 883.883208][T23404] ? stack_trace_snprint+0xf0/0xf0 [ 883.888157][T23404] ? kmem_cache_free+0xa9/0x1e0 [ 883.892840][T23404] ? kmem_cache_free+0xa9/0x1e0 [ 883.897522][T23404] ? kasan_set_track+0x5d/0x70 [ 883.902125][T23404] ? __x64_sys_bpf+0x90/0x90 [ 883.906549][T23404] ? __kasan_slab_free+0x11/0x20 [ 883.911324][T23404] ? slab_free_freelist_hook+0xc0/0x190 [ 883.916705][T23404] ? kmem_cache_free+0xa9/0x1e0 [ 883.921394][T23404] ? putname+0xe7/0x140 [ 883.925385][T23404] ? do_sys_openat2+0x1fc/0x710 [ 883.930069][T23404] ? __x64_sys_openat+0x243/0x290 [ 883.934931][T23404] ? do_syscall_64+0x34/0x70 [ 883.939367][T23404] ? _kstrtoull+0x3a0/0x4a0 [ 883.943702][T23404] ? kstrtouint_from_user+0x20a/0x2a0 [ 883.948906][T23404] ? kstrtol_from_user+0x310/0x310 [ 883.953856][T23404] ? memset+0x35/0x40 [ 883.957671][T23404] ? __fsnotify_parent+0x4b9/0x6c0 [ 883.962622][T23404] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 883.969045][T23404] ? proc_fail_nth_write+0x20b/0x290 [ 883.974160][T23404] ? proc_fail_nth_read+0x210/0x210 [ 883.979216][T23404] ? security_file_permission+0x86/0xb0 [ 883.984584][T23404] ? rw_verify_area+0x1c3/0x360 [ 883.989264][T23404] ? preempt_count_add+0x92/0x1a0 [ 883.994121][T23404] ? vfs_write+0x852/0xe70 [ 883.998402][T23404] ? kmem_cache_free+0xa9/0x1e0 [ 884.003064][T23404] ? kernel_write+0x3d0/0x3d0 [ 884.007576][T23404] ? __kasan_check_write+0x14/0x20 [ 884.012522][T23404] ? mutex_lock+0xa5/0x110 [ 884.016775][T23404] ? mutex_trylock+0xa0/0xa0 [ 884.021207][T23404] ? __kasan_check_write+0x14/0x20 [ 884.026150][T23404] ? fput_many+0x160/0x1b0 [ 884.030418][T23404] ? debug_smp_processor_id+0x17/0x20 [ 884.035611][T23404] __x64_sys_bpf+0x7b/0x90 [ 884.039863][T23404] do_syscall_64+0x34/0x70 [ 884.044118][T23404] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 884.049842][T23404] RIP: 0033:0x7f9e54903ff9 [ 884.054100][T23404] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 884.073543][T23404] RSP: 002b:00007f9e5355c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 884.081780][T23404] RAX: ffffffffffffffda RBX: 00007f9e54abc058 RCX: 00007f9e54903ff9 [ 884.089592][T23404] RDX: 0000000000000048 RSI: 00000000200005c0 RDI: 0000000000000000 [ 884.097403][T23404] RBP: 00007f9e5355c090 R08: 0000000000000000 R09: 0000000000000000 [ 884.105270][T23404] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 884.113029][T23404] R13: 0000000000000001 R14: 00007f9e54abc058 R15: 00007ffc7e0e5b58 [ 889.914825][T23507] device syzkaller0 entered promiscuous mode [ 890.279119][T23553] FAULT_INJECTION: forcing a failure. [ 890.279119][T23553] name failslab, interval 1, probability 0, space 0, times 0 [ 890.442331][T23553] CPU: 1 PID: 23553 Comm: syz.0.7913 Tainted: G W 5.10.226-syzkaller-00709-ge5e5644ea27f #0 [ 890.453521][T23553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 890.463422][T23553] Call Trace: [ 890.466549][T23553] dump_stack_lvl+0x1e2/0x24b [ 890.471053][T23553] ? bfq_pos_tree_add_move+0x43b/0x43b [ 890.476351][T23553] ? htab_map_alloc+0x98/0x950 [ 890.480947][T23553] ? ____kasan_kmalloc+0xed/0x110 [ 890.485805][T23553] ? __kasan_kmalloc+0x9/0x10 [ 890.490326][T23553] dump_stack+0x15/0x17 [ 890.494314][T23553] should_fail+0x3c6/0x510 [ 890.498566][T23553] ? __get_vm_area_node+0x116/0x470 [ 890.503598][T23553] __should_failslab+0xa4/0xe0 [ 890.508198][T23553] should_failslab+0x9/0x20 [ 890.512539][T23553] kmem_cache_alloc_trace+0x3a/0x2e0 [ 890.517659][T23553] __get_vm_area_node+0x116/0x470 [ 890.522522][T23553] __vmalloc_node_range+0xdc/0x7c0 [ 890.527530][T23553] ? htab_map_alloc+0x4c2/0x950 [ 890.532155][T23553] bpf_map_area_alloc+0xd9/0xf0 [ 890.536835][T23553] ? htab_map_alloc+0x4c2/0x950 [ 890.541526][T23553] htab_map_alloc+0x4c2/0x950 [ 890.546040][T23553] __se_sys_bpf+0x620f/0x11cb0 [ 890.550640][T23553] ? stack_trace_save+0x113/0x1c0 [ 890.555498][T23553] ? terminate_walk+0x407/0x4f0 [ 890.560184][T23553] ? stack_trace_snprint+0xf0/0xf0 [ 890.565135][T23553] ? kmem_cache_free+0xa9/0x1e0 [ 890.569818][T23553] ? kmem_cache_free+0xa9/0x1e0 [ 890.574503][T23553] ? kasan_set_track+0x5d/0x70 [ 890.579103][T23553] ? __x64_sys_bpf+0x90/0x90 [ 890.583531][T23553] ? __kasan_slab_free+0x11/0x20 [ 890.588302][T23553] ? slab_free_freelist_hook+0xc0/0x190 [ 890.593687][T23553] ? kmem_cache_free+0xa9/0x1e0 [ 890.598378][T23553] ? putname+0xe7/0x140 [ 890.602364][T23553] ? do_sys_openat2+0x1fc/0x710 [ 890.607050][T23553] ? __x64_sys_openat+0x243/0x290 [ 890.611912][T23553] ? do_syscall_64+0x34/0x70 [ 890.616338][T23553] ? _kstrtoull+0x3a0/0x4a0 [ 890.620679][T23553] ? kstrtouint_from_user+0x20a/0x2a0 [ 890.625888][T23553] ? kstrtol_from_user+0x310/0x310 [ 890.630832][T23553] ? htab_map_hash+0x3c2/0x7e0 [ 890.635434][T23553] ? memset+0x35/0x40 [ 890.639257][T23553] ? __fsnotify_parent+0x4b9/0x6c0 [ 890.644218][T23553] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 890.650623][T23553] ? proc_fail_nth_write+0x20b/0x290 [ 890.655746][T23553] ? proc_fail_nth_read+0x210/0x210 [ 890.660777][T23553] ? security_file_permission+0x86/0xb0 [ 890.666161][T23553] ? rw_verify_area+0x1c3/0x360 [ 890.670843][T23553] ? preempt_count_add+0x92/0x1a0 [ 890.675705][T23553] ? vfs_write+0x852/0xe70 [ 890.679958][T23553] ? kmem_cache_free+0x1c0/0x1e0 [ 890.684732][T23553] ? kernel_write+0x3d0/0x3d0 [ 890.689244][T23553] ? __kasan_check_write+0x14/0x20 [ 890.694191][T23553] ? mutex_lock+0xa5/0x110 [ 890.698442][T23553] ? mutex_trylock+0xa0/0xa0 [ 890.702888][T23553] ? __kasan_check_write+0x14/0x20 [ 890.707820][T23553] ? fput_many+0x160/0x1b0 [ 890.712076][T23553] ? debug_smp_processor_id+0x17/0x20 [ 890.717280][T23553] __x64_sys_bpf+0x7b/0x90 [ 890.721533][T23553] do_syscall_64+0x34/0x70 [ 890.725873][T23553] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 890.731597][T23553] RIP: 0033:0x7fbbbc983ff9 [ 890.735852][T23553] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 890.755293][T23553] RSP: 002b:00007fbbbb5dc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 890.763534][T23553] RAX: ffffffffffffffda RBX: 00007fbbbcb3c058 RCX: 00007fbbbc983ff9 [ 890.771348][T23553] RDX: 0000000000000048 RSI: 00000000200005c0 RDI: 0000000000000000 [ 890.779158][T23553] RBP: 00007fbbbb5dc090 R08: 0000000000000000 R09: 0000000000000000 [ 890.786970][T23553] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 890.794867][T23553] R13: 0000000000000001 R14: 00007fbbbcb3c058 R15: 00007ffcd6e0dee8 [ 890.817388][T23556] gretap0: refused to change device tx_queue_len [ 891.099925][T23570] FAULT_INJECTION: forcing a failure. [ 891.099925][T23570] name failslab, interval 1, probability 0, space 0, times 0 [ 891.112389][T23570] CPU: 0 PID: 23570 Comm: syz.0.7920 Tainted: G W 5.10.226-syzkaller-00709-ge5e5644ea27f #0 [ 891.123527][T23570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 891.133423][T23570] Call Trace: [ 891.136572][T23570] dump_stack_lvl+0x1e2/0x24b [ 891.141058][T23570] ? panic+0x812/0x812 [ 891.144972][T23570] ? bfq_pos_tree_add_move+0x43b/0x43b [ 891.150259][T23570] dump_stack+0x15/0x17 [ 891.154251][T23570] should_fail+0x3c6/0x510 [ 891.158509][T23570] ? alloc_skb_with_frags+0xa1/0x570 [ 891.163626][T23570] __should_failslab+0xa4/0xe0 [ 891.168229][T23570] should_failslab+0x9/0x20 [ 891.172566][T23570] __kmalloc_track_caller+0x5f/0x320 [ 891.177686][T23570] ? kmem_cache_alloc+0x168/0x2e0 [ 891.182556][T23570] ? __alloc_skb+0x80/0x510 [ 891.186885][T23570] ? alloc_skb_with_frags+0xa1/0x570 [ 891.192003][T23570] __alloc_skb+0xbc/0x510 [ 891.196170][T23570] ? neigh_connected_output+0x427/0x450 [ 891.201558][T23570] alloc_skb_with_frags+0xa1/0x570 [ 891.206500][T23570] ? ip6_pol_route_output+0x50/0x80 [ 891.211540][T23570] sock_alloc_send_pskb+0x915/0xa50 [ 891.216569][T23570] ? memcpy+0x56/0x70 [ 891.220390][T23570] ? sock_kzfree_s+0x60/0x60 [ 891.224814][T23570] ? ip6_route_output_flags_noref+0x252/0x2f0 [ 891.230714][T23570] ? ip6_route_output_flags+0xfd/0x220 [ 891.236007][T23570] sock_alloc_send_skb+0x32/0x40 [ 891.240786][T23570] __ip6_append_data+0x2841/0x3e40 [ 891.245745][T23570] ? xfrm_lookup+0x38/0x50 [ 891.249990][T23570] ? ip6_setup_cork+0x1220/0x1220 [ 891.254853][T23570] ? __kasan_check_read+0x11/0x20 [ 891.259711][T23570] ? ip6_setup_cork+0xce4/0x1220 [ 891.264479][T23570] ip6_append_data+0x1ad/0x2d0 [ 891.269076][T23570] ? icmpv6_route_lookup+0x5a0/0x5a0 [ 891.274201][T23570] ? icmpv6_route_lookup+0x5a0/0x5a0 [ 891.279326][T23570] icmp6_send+0x1464/0x1e00 [ 891.283662][T23570] ? icmpv6_push_pending_frames+0x450/0x450 [ 891.289401][T23570] ? ipgre_xmit+0x87a/0xc30 [ 891.293771][T23570] ? fib_table_lookup+0xd89/0x1950 [ 891.298690][T23570] icmpv6_ndo_send+0x131/0x4e0 [ 891.303277][T23570] ? ip_route_output_key_hash_rcu+0x17ec/0x20b0 [ 891.309348][T23570] ? udp6_set_csum+0x5e0/0x5e0 [ 891.313946][T23570] ? ip_route_output_flow+0x1ef/0x310 [ 891.319154][T23570] ? ipv4_sk_update_pmtu+0x1e40/0x1e40 [ 891.324450][T23570] tnl_update_pmtu+0x926/0xba0 [ 891.329050][T23570] ip_tunnel_xmit+0xcca/0x2760 [ 891.333649][T23570] ? ip_tunnel_xmit+0x191/0x2760 [ 891.338426][T23570] ? tnl_update_pmtu+0xba0/0xba0 [ 891.343195][T23570] ? skb_network_protocol+0x564/0x7a0 [ 891.348404][T23570] ? skb_push+0x90/0x120 [ 891.352481][T23570] ? arch_stack_walk+0xf3/0x140 [ 891.357174][T23570] ? gre_build_header+0x233/0x6f0 [ 891.362033][T23570] ipgre_xmit+0x87a/0xc30 [ 891.366199][T23570] dev_hard_start_xmit+0x228/0x620 [ 891.371145][T23570] __dev_queue_xmit+0x16f1/0x28e0 [ 891.376096][T23570] ? dev_queue_xmit+0x20/0x20 [ 891.380603][T23570] ? slab_post_alloc_hook+0x80/0x2f0 [ 891.385727][T23570] ? __kasan_check_write+0x14/0x20 [ 891.390670][T23570] ? skb_release_data+0x406/0x6f0 [ 891.395532][T23570] ? __kasan_check_write+0x14/0x20 [ 891.400478][T23570] ? pskb_expand_head+0xbcf/0x1180 [ 891.405428][T23570] dev_queue_xmit+0x17/0x20 [ 891.409764][T23570] __bpf_redirect+0x665/0xde0 [ 891.414282][T23570] bpf_clone_redirect+0x24d/0x390 [ 891.419145][T23570] bpf_prog_e2f29814702bf05a+0x56/0x95c [ 891.424542][T23570] ? __kasan_slab_alloc+0xc3/0xe0 [ 891.429381][T23570] ? __kasan_slab_alloc+0xb1/0xe0 [ 891.434241][T23570] ? slab_post_alloc_hook+0x61/0x2f0 [ 891.439621][T23570] ? kmem_cache_alloc+0x168/0x2e0 [ 891.444482][T23570] ? __build_skb+0x2a/0x300 [ 891.448817][T23570] ? build_skb+0x25/0x1e0 [ 891.452986][T23570] ? bpf_prog_test_run_skb+0x388/0x1410 [ 891.458367][T23570] ? __se_sys_bpf+0x5235/0x11cb0 [ 891.463148][T23570] ? __x64_sys_bpf+0x7b/0x90 [ 891.467571][T23570] ? do_syscall_64+0x34/0x70 [ 891.471996][T23570] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 891.478013][T23570] ? __kasan_check_read+0x11/0x20 [ 891.482861][T23570] ? bpf_test_timer_continue+0x140/0x440 [ 891.488343][T23570] bpf_test_run+0x40b/0xc20 [ 891.492681][T23570] ? convert___skb_to_skb+0x570/0x570 [ 891.497942][T23570] ? eth_type_trans+0x2e4/0x620 [ 891.502573][T23570] ? eth_get_headlen+0x240/0x240 [ 891.507334][T23570] ? bpf_prog_test_run_skb+0x7c5/0x1410 [ 891.512715][T23570] ? convert___skb_to_skb+0x44/0x570 [ 891.517837][T23570] ? memcpy+0x56/0x70 [ 891.521657][T23570] bpf_prog_test_run_skb+0xb6e/0x1410 [ 891.526869][T23570] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 891.532587][T23570] ? __kasan_check_write+0x14/0x20 [ 891.537532][T23570] ? fput_many+0x160/0x1b0 [ 891.541787][T23570] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 891.547514][T23570] __se_sys_bpf+0x5235/0x11cb0 [ 891.552133][T23570] ? perf_trace_buf_update+0xd4/0x110 [ 891.557330][T23570] ? terminate_walk+0x407/0x4f0 [ 891.562017][T23570] ? perf_trace_buf_alloc+0x310/0x310 [ 891.567218][T23570] ? perf_swevent_event+0xcd/0x560 [ 891.572166][T23570] ? debug_smp_processor_id+0x17/0x20 [ 891.577371][T23570] ? perf_tp_event+0x88c/0x990 [ 891.581974][T23570] ? __x64_sys_bpf+0x90/0x90 [ 891.586402][T23570] ? perf_trace_run_bpf_submit+0x210/0x210 [ 891.592037][T23570] ? do_sys_openat2+0x1fc/0x710 [ 891.596723][T23570] ? __x64_sys_openat+0x243/0x290 [ 891.601585][T23570] ? do_syscall_64+0x34/0x70 [ 891.606013][T23570] ? _kstrtoull+0x3a0/0x4a0 [ 891.610351][T23570] ? kstrtouint_from_user+0x20a/0x2a0 [ 891.615573][T23570] ? kstrtol_from_user+0x310/0x310 [ 891.620528][T23570] ? memset+0x35/0x40 [ 891.624332][T23570] ? __fsnotify_parent+0x4b9/0x6c0 [ 891.629282][T23570] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 891.635693][T23570] ? proc_fail_nth_write+0x20b/0x290 [ 891.640831][T23570] ? proc_fail_nth_read+0x210/0x210 [ 891.645849][T23570] ? security_file_permission+0x86/0xb0 [ 891.651231][T23570] ? rw_verify_area+0x1c3/0x360 [ 891.655915][T23570] ? preempt_count_add+0x92/0x1a0 [ 891.660798][T23570] ? vfs_write+0x852/0xe70 [ 891.665031][T23570] ? kmem_cache_free+0x1c0/0x1e0 [ 891.669803][T23570] ? kernel_write+0x3d0/0x3d0 [ 891.674319][T23570] ? __kasan_check_write+0x14/0x20 [ 891.679264][T23570] ? mutex_lock+0xa5/0x110 [ 891.683515][T23570] ? mutex_trylock+0xa0/0xa0 [ 891.687944][T23570] ? __kasan_check_write+0x14/0x20 [ 891.692891][T23570] ? fput_many+0x160/0x1b0 [ 891.697163][T23570] ? debug_smp_processor_id+0x17/0x20 [ 891.702364][T23570] __x64_sys_bpf+0x7b/0x90 [ 891.706608][T23570] do_syscall_64+0x34/0x70 [ 891.710970][T23570] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 891.716701][T23570] RIP: 0033:0x7fbbbc983ff9 [ 891.720946][T23570] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 891.740386][T23570] RSP: 002b:00007fbbbb5fd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 891.748629][T23570] RAX: ffffffffffffffda RBX: 00007fbbbcb3bf80 RCX: 00007fbbbc983ff9 [ 891.756443][T23570] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 891.764256][T23570] RBP: 00007fbbbb5fd090 R08: 0000000000000000 R09: 0000000000000000 [ 891.772061][T23570] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 891.779881][T23570] R13: 0000000000000000 R14: 00007fbbbcb3bf80 R15: 00007ffcd6e0dee8 [ 893.190337][T23611] device syzkaller0 entered promiscuous mode [ 893.222894][T23627] FAULT_INJECTION: forcing a failure. [ 893.222894][T23627] name failslab, interval 1, probability 0, space 0, times 0 [ 893.235374][T23627] CPU: 1 PID: 23627 Comm: syz.3.7940 Tainted: G W 5.10.226-syzkaller-00709-ge5e5644ea27f #0 [ 893.246494][T23627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 893.256388][T23627] Call Trace: [ 893.259523][T23627] dump_stack_lvl+0x1e2/0x24b [ 893.264028][T23627] ? panic+0x812/0x812 [ 893.267934][T23627] ? slab_post_alloc_hook+0x80/0x2f0 [ 893.273054][T23627] ? bfq_pos_tree_add_move+0x43b/0x43b [ 893.278361][T23627] ? __kasan_check_write+0x14/0x20 [ 893.283303][T23627] dump_stack+0x15/0x17 [ 893.287302][T23627] should_fail+0x3c6/0x510 [ 893.291554][T23627] ? skb_clone+0x1de/0x370 [ 893.295801][T23627] __should_failslab+0xa4/0xe0 [ 893.300397][T23627] should_failslab+0x9/0x20 [ 893.304736][T23627] kmem_cache_alloc+0x3d/0x2e0 [ 893.309336][T23627] ? __bpf_redirect+0x673/0xde0 [ 893.314024][T23627] skb_clone+0x1de/0x370 [ 893.318100][T23627] bpf_clone_redirect+0xa6/0x390 [ 893.322879][T23627] bpf_prog_133af649c686b0d6+0x56/0x448 [ 893.328255][T23627] ? __kasan_slab_alloc+0xc3/0xe0 [ 893.333114][T23627] ? __kasan_slab_alloc+0xb1/0xe0 [ 893.337974][T23627] ? slab_post_alloc_hook+0x61/0x2f0 [ 893.343105][T23627] ? kmem_cache_alloc+0x168/0x2e0 [ 893.347955][T23627] ? __build_skb+0x2a/0x300 [ 893.352299][T23627] ? build_skb+0x25/0x1e0 [ 893.356464][T23627] ? bpf_prog_test_run_skb+0x388/0x1410 [ 893.361845][T23627] ? __se_sys_bpf+0x5235/0x11cb0 [ 893.366615][T23627] ? __x64_sys_bpf+0x7b/0x90 [ 893.371043][T23627] ? do_syscall_64+0x34/0x70 [ 893.375469][T23627] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 893.381383][T23627] ? __kasan_check_read+0x11/0x20 [ 893.386234][T23627] ? bpf_test_timer_continue+0x140/0x440 [ 893.391703][T23627] bpf_test_run+0x40b/0xc20 [ 893.396040][T23627] ? convert___skb_to_skb+0x570/0x570 [ 893.401245][T23627] ? eth_type_trans+0x2e4/0x620 [ 893.405944][T23627] ? eth_get_headlen+0x240/0x240 [ 893.410708][T23627] ? convert___skb_to_skb+0x44/0x570 [ 893.415829][T23627] bpf_prog_test_run_skb+0xb6e/0x1410 [ 893.421040][T23627] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 893.426859][T23627] ? __kasan_check_write+0x14/0x20 [ 893.431797][T23627] ? fput_many+0x160/0x1b0 [ 893.436051][T23627] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 893.441783][T23627] __se_sys_bpf+0x5235/0x11cb0 [ 893.446382][T23627] ? stack_trace_save+0x113/0x1c0 [ 893.451239][T23627] ? terminate_walk+0x407/0x4f0 [ 893.455929][T23627] ? stack_trace_snprint+0xf0/0xf0 [ 893.460877][T23627] ? kmem_cache_free+0xa9/0x1e0 [ 893.465558][T23627] ? kmem_cache_free+0xa9/0x1e0 [ 893.470398][T23627] ? kasan_set_track+0x5d/0x70 [ 893.474995][T23627] ? __x64_sys_bpf+0x90/0x90 [ 893.479422][T23627] ? __kasan_slab_free+0x11/0x20 [ 893.484194][T23627] ? slab_free_freelist_hook+0xc0/0x190 [ 893.489579][T23627] ? kmem_cache_free+0xa9/0x1e0 [ 893.494261][T23627] ? putname+0xe7/0x140 [ 893.498271][T23627] ? do_sys_openat2+0x1fc/0x710 [ 893.502939][T23627] ? __x64_sys_openat+0x243/0x290 [ 893.507803][T23627] ? do_syscall_64+0x34/0x70 [ 893.512230][T23627] ? _kstrtoull+0x3a0/0x4a0 [ 893.516656][T23627] ? kstrtouint_from_user+0x20a/0x2a0 [ 893.521871][T23627] ? kstrtol_from_user+0x310/0x310 [ 893.526907][T23627] ? memset+0x35/0x40 [ 893.530730][T23627] ? __fsnotify_parent+0x4b9/0x6c0 [ 893.535676][T23627] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 893.542094][T23627] ? proc_fail_nth_write+0x20b/0x290 [ 893.547214][T23627] ? proc_fail_nth_read+0x210/0x210 [ 893.552247][T23627] ? security_file_permission+0x86/0xb0 [ 893.557633][T23627] ? rw_verify_area+0x1c3/0x360 [ 893.562316][T23627] ? preempt_count_add+0x92/0x1a0 [ 893.567175][T23627] ? vfs_write+0x852/0xe70 [ 893.571435][T23627] ? kmem_cache_free+0x1c0/0x1e0 [ 893.576203][T23627] ? kernel_write+0x3d0/0x3d0 [ 893.580726][T23627] ? __kasan_check_write+0x14/0x20 [ 893.585662][T23627] ? mutex_lock+0xa5/0x110 [ 893.590537][T23627] ? mutex_trylock+0xa0/0xa0 [ 893.594950][T23627] ? __kasan_check_write+0x14/0x20 [ 893.599897][T23627] ? fput_many+0x160/0x1b0 [ 893.604157][T23627] ? debug_smp_processor_id+0x17/0x20 [ 893.609358][T23627] __x64_sys_bpf+0x7b/0x90 [ 893.613613][T23627] do_syscall_64+0x34/0x70 [ 893.617863][T23627] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 893.623589][T23627] RIP: 0033:0x7f28d42caff9 [ 893.627844][T23627] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 893.647290][T23627] RSP: 002b:00007f28d2f44038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 893.655531][T23627] RAX: ffffffffffffffda RBX: 00007f28d4482f80 RCX: 00007f28d42caff9 [ 893.663340][T23627] RDX: 000000000000002c RSI: 0000000020000080 RDI: 000000000000000a [ 893.671153][T23627] RBP: 00007f28d2f44090 R08: 0000000000000000 R09: 0000000000000000 [ 893.678961][T23627] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 893.686773][T23627] R13: 0000000000000000 R14: 00007f28d4482f80 R15: 00007fffc96feb28 [ 896.578724][T23722] FAULT_INJECTION: forcing a failure. [ 896.578724][T23722] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 896.596039][T23722] CPU: 1 PID: 23722 Comm: syz.4.7973 Tainted: G W 5.10.226-syzkaller-00709-ge5e5644ea27f #0 [ 896.607233][T23722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 896.617124][T23722] Call Trace: [ 896.620258][T23722] dump_stack_lvl+0x1e2/0x24b [ 896.624764][T23722] ? bfq_pos_tree_add_move+0x43b/0x43b [ 896.630059][T23722] dump_stack+0x15/0x17 [ 896.634051][T23722] should_fail+0x3c6/0x510 [ 896.638303][T23722] should_fail_usercopy+0x1a/0x20 [ 896.643166][T23722] strncpy_from_user+0x24/0x2d0 [ 896.647856][T23722] __se_sys_bpf+0x1389/0x11cb0 [ 896.652454][T23722] ? stack_trace_save+0x113/0x1c0 [ 896.657315][T23722] ? terminate_walk+0x407/0x4f0 [ 896.662003][T23722] ? stack_trace_snprint+0xf0/0xf0 [ 896.666948][T23722] ? kmem_cache_free+0xa9/0x1e0 [ 896.671633][T23722] ? kmem_cache_free+0xa9/0x1e0 [ 896.676316][T23722] ? kasan_set_track+0x5d/0x70 [ 896.680921][T23722] ? __x64_sys_bpf+0x90/0x90 [ 896.685341][T23722] ? __kasan_slab_free+0x11/0x20 [ 896.690116][T23722] ? slab_free_freelist_hook+0xc0/0x190 [ 896.695587][T23722] ? kmem_cache_free+0xa9/0x1e0 [ 896.700271][T23722] ? putname+0xe7/0x140 [ 896.704262][T23722] ? do_sys_openat2+0x1fc/0x710 [ 896.708949][T23722] ? __x64_sys_openat+0x243/0x290 [ 896.713812][T23722] ? do_syscall_64+0x34/0x70 [ 896.718239][T23722] ? _kstrtoull+0x3a0/0x4a0 [ 896.722593][T23722] ? trie_delete_elem+0x7a/0x760 [ 896.727354][T23722] ? memset+0x35/0x40 [ 896.731172][T23722] ? __fsnotify_parent+0x4b9/0x6c0 [ 896.736118][T23722] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 896.742539][T23722] ? proc_fail_nth_write+0x20b/0x290 [ 896.747660][T23722] ? proc_fail_nth_read+0x210/0x210 [ 896.752693][T23722] ? security_file_permission+0x86/0xb0 [ 896.758080][T23722] ? rw_verify_area+0x1c3/0x360 [ 896.762761][T23722] ? preempt_count_add+0x92/0x1a0 [ 896.767622][T23722] ? vfs_write+0x852/0xe70 [ 896.771874][T23722] ? putname+0xe7/0x140 [ 896.775867][T23722] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 896.781523][T23722] ? kmem_cache_free+0x1c0/0x1e0 [ 896.786292][T23722] ? kernel_write+0x3d0/0x3d0 [ 896.790804][T23722] ? __kasan_check_write+0x14/0x20 [ 896.795746][T23722] ? mutex_lock+0xa5/0x110 [ 896.799995][T23722] ? mutex_trylock+0xa0/0xa0 [ 896.804425][T23722] ? __kasan_check_write+0x14/0x20 [ 896.809369][T23722] ? fput_many+0x160/0x1b0 [ 896.813630][T23722] ? debug_smp_processor_id+0x17/0x20 [ 896.818829][T23722] __x64_sys_bpf+0x7b/0x90 [ 896.823081][T23722] do_syscall_64+0x34/0x70 [ 896.827337][T23722] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 896.833061][T23722] RIP: 0033:0x7fe8cdc54ff9 [ 896.837317][T23722] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 896.856757][T23722] RSP: 002b:00007fe8cc8ce038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 896.865001][T23722] RAX: ffffffffffffffda RBX: 00007fe8cde0cf80 RCX: 00007fe8cdc54ff9 [ 896.872810][T23722] RDX: 0000000000000080 RSI: 0000000020000140 RDI: 0000000000000005 [ 896.880620][T23722] RBP: 00007fe8cc8ce090 R08: 0000000000000000 R09: 0000000000000000 [ 896.888432][T23722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 896.896245][T23722] R13: 0000000000000000 R14: 00007fe8cde0cf80 R15: 00007fff49b0def8 [ 897.566537][T23732] device pim6reg1 entered promiscuous mode [ 897.810419][T23749] FAULT_INJECTION: forcing a failure. [ 897.810419][T23749] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 897.852251][T23749] CPU: 0 PID: 23749 Comm: syz.1.7982 Tainted: G W 5.10.226-syzkaller-00709-ge5e5644ea27f #0 [ 897.863446][T23749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 897.873339][T23749] Call Trace: [ 897.876472][T23749] dump_stack_lvl+0x1e2/0x24b [ 897.880978][T23749] ? bfq_pos_tree_add_move+0x43b/0x43b [ 897.886363][T23749] ? sched_clock+0x3a/0x40 [ 897.890610][T23749] ? sched_clock_cpu+0x1b/0x3b0 [ 897.895308][T23749] ? sched_clock+0x3a/0x40 [ 897.899990][T23749] dump_stack+0x15/0x17 [ 897.903942][T23749] should_fail+0x3c6/0x510 [ 897.908204][T23749] should_fail_usercopy+0x1a/0x20 [ 897.913065][T23749] _copy_to_iter+0x230/0xda0 [ 897.917477][T23749] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 897.923479][T23749] ? __check_object_size+0x73/0x3c0 [ 897.928499][T23749] ? __virt_addr_valid+0x27/0x2e0 [ 897.933361][T23749] ? iov_iter_init+0x120/0x120 [ 897.937959][T23749] ? __sanitizer_cov_trace_const_cmp8+0x34/0x80 [ 897.944039][T23749] ? __kasan_check_read+0x11/0x20 [ 897.948897][T23749] ? __check_object_size+0x2e6/0x3c0 [ 897.954018][T23749] simple_copy_to_iter+0x50/0x70 [ 897.958789][T23749] __skb_datagram_iter+0xcd/0x780 [ 897.963649][T23749] ? tipc_sk_anc_data_recv+0xbd/0x980 [ 897.968856][T23749] ? skb_copy_datagram_iter+0x180/0x180 [ 897.974238][T23749] skb_copy_datagram_iter+0x46/0x180 [ 897.979358][T23749] tipc_recvstream+0x7a4/0xf70 [ 897.983961][T23749] ? tipc_sendstream+0x70/0x70 [ 897.988559][T23749] ? security_socket_recvmsg+0x87/0xb0 [ 897.993850][T23749] ? tipc_sendstream+0x70/0x70 [ 897.998455][T23749] ____sys_recvmsg+0x286/0x530 [ 898.003054][T23749] ? __sys_recvmsg_sock+0x50/0x50 [ 898.007913][T23749] ? import_iovec+0xe5/0x120 [ 898.012340][T23749] ___sys_recvmsg+0x1ec/0x690 [ 898.016854][T23749] ? __sys_recvmsg+0x270/0x270 [ 898.021452][T23749] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 898.027100][T23749] ? __fdget+0x1bc/0x240 [ 898.031170][T23749] __x64_sys_recvmsg+0x1ee/0x2c0 [ 898.035947][T23749] ? kvm_sched_clock_read+0x18/0x40 [ 898.040993][T23749] ? ___sys_recvmsg+0x690/0x690 [ 898.045671][T23749] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 898.051568][T23749] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 898.057472][T23749] ? irqentry_exit_to_user_mode+0x41/0x80 [ 898.063112][T23749] do_syscall_64+0x34/0x70 [ 898.067365][T23749] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 898.073092][T23749] RIP: 0033:0x7f9e54903ff9 [ 898.077348][T23749] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 898.096786][T23749] RSP: 002b:00007f9e5357d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 898.105029][T23749] RAX: ffffffffffffffda RBX: 00007f9e54abbf80 RCX: 00007f9e54903ff9 [ 898.112841][T23749] RDX: 0000000000001f00 RSI: 0000000020000500 RDI: 0000000000000008 [ 898.120652][T23749] RBP: 00007f9e5357d090 R08: 0000000000000000 R09: 0000000000000000 [ 898.128464][T23749] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 898.136275][T23749] R13: 0000000000000000 R14: 00007f9e54abbf80 R15: 00007ffc7e0e5b58 [ 899.340609][ T24] audit: type=1400 audit(1729591327.629:162): avc: denied { create } for pid=23784 comm="syz.3.7994" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 899.629399][T23812] FAULT_INJECTION: forcing a failure. [ 899.629399][T23812] name failslab, interval 1, probability 0, space 0, times 0 [ 899.641984][T23812] CPU: 1 PID: 23812 Comm: syz.3.8005 Tainted: G W 5.10.226-syzkaller-00709-ge5e5644ea27f #0 [ 899.653151][T23812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 899.663050][T23812] Call Trace: [ 899.666177][T23812] dump_stack_lvl+0x1e2/0x24b [ 899.670686][T23812] ? panic+0x812/0x812 [ 899.674584][T23812] ? slab_post_alloc_hook+0x80/0x2f0 [ 899.679706][T23812] ? bfq_pos_tree_add_move+0x43b/0x43b [ 899.685002][T23812] ? __kasan_check_write+0x14/0x20 [ 899.689949][T23812] dump_stack+0x15/0x17 [ 899.693938][T23812] should_fail+0x3c6/0x510 [ 899.698190][T23812] ? skb_clone+0x1de/0x370 [ 899.702447][T23812] __should_failslab+0xa4/0xe0 [ 899.707057][T23812] should_failslab+0x9/0x20 [ 899.711388][T23812] kmem_cache_alloc+0x3d/0x2e0 [ 899.715986][T23812] ? __bpf_redirect+0x673/0xde0 [ 899.720694][T23812] skb_clone+0x1de/0x370 [ 899.724752][T23812] bpf_clone_redirect+0xa6/0x390 [ 899.729526][T23812] bpf_prog_b36a1f39e2fdd4f4+0x56/0xc0 [ 899.734820][T23812] ? __kasan_slab_alloc+0xc3/0xe0 [ 899.739675][T23812] ? __kasan_slab_alloc+0xb1/0xe0 [ 899.744539][T23812] ? slab_post_alloc_hook+0x61/0x2f0 [ 899.749660][T23812] ? kmem_cache_alloc+0x168/0x2e0 [ 899.754515][T23812] ? __build_skb+0x2a/0x300 [ 899.758858][T23812] ? build_skb+0x25/0x1e0 [ 899.763022][T23812] ? bpf_prog_test_run_skb+0x388/0x1410 [ 899.768402][T23812] ? __se_sys_bpf+0x5235/0x11cb0 [ 899.773304][T23812] ? __x64_sys_bpf+0x7b/0x90 [ 899.777722][T23812] ? do_syscall_64+0x34/0x70 [ 899.782149][T23812] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 899.788187][T23812] ? __kasan_check_read+0x11/0x20 [ 899.793035][T23812] ? bpf_test_timer_continue+0x140/0x440 [ 899.798498][T23812] bpf_test_run+0x40b/0xc20 [ 899.802855][T23812] ? convert___skb_to_skb+0x570/0x570 [ 899.808044][T23812] ? eth_type_trans+0x2e4/0x620 [ 899.812730][T23812] ? eth_get_headlen+0x240/0x240 [ 899.817667][T23812] ? bpf_prog_test_run_skb+0x7c5/0x1410 [ 899.823032][T23812] ? convert___skb_to_skb+0x44/0x570 [ 899.828156][T23812] ? memcpy+0x56/0x70 [ 899.831984][T23812] bpf_prog_test_run_skb+0xb6e/0x1410 [ 899.837181][T23812] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 899.842905][T23812] ? __kasan_check_write+0x14/0x20 [ 899.847853][T23812] ? fput_many+0x160/0x1b0 [ 899.852112][T23812] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 899.857859][T23812] __se_sys_bpf+0x5235/0x11cb0 [ 899.862435][T23812] ? stack_trace_save+0x113/0x1c0 [ 899.867294][T23812] ? terminate_walk+0x407/0x4f0 [ 899.871982][T23812] ? stack_trace_snprint+0xf0/0xf0 [ 899.876929][T23812] ? kmem_cache_free+0xa9/0x1e0 [ 899.881616][T23812] ? kmem_cache_free+0xa9/0x1e0 [ 899.886305][T23812] ? kasan_set_track+0x5d/0x70 [ 899.890911][T23812] ? __x64_sys_bpf+0x90/0x90 [ 899.895325][T23812] ? __kasan_slab_free+0x11/0x20 [ 899.900106][T23812] ? slab_free_freelist_hook+0xc0/0x190 [ 899.905491][T23812] ? kmem_cache_free+0xa9/0x1e0 [ 899.910176][T23812] ? putname+0xe7/0x140 [ 899.914158][T23812] ? do_sys_openat2+0x1fc/0x710 [ 899.918851][T23812] ? __x64_sys_openat+0x243/0x290 [ 899.923708][T23812] ? do_syscall_64+0x34/0x70 [ 899.928135][T23812] ? _kstrtoull+0x3a0/0x4a0 [ 899.932472][T23812] ? kstrtouint_from_user+0x20a/0x2a0 [ 899.937690][T23812] ? kstrtol_from_user+0x310/0x310 [ 899.942635][T23812] ? memset+0x35/0x40 [ 899.946453][T23812] ? __fsnotify_parent+0x4b9/0x6c0 [ 899.951398][T23812] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 899.957823][T23812] ? proc_fail_nth_write+0x20b/0x290 [ 899.962941][T23812] ? proc_fail_nth_read+0x210/0x210 [ 899.967976][T23812] ? security_file_permission+0x86/0xb0 [ 899.973352][T23812] ? rw_verify_area+0x1c3/0x360 [ 899.978129][T23812] ? preempt_count_add+0x92/0x1a0 [ 899.982994][T23812] ? vfs_write+0x852/0xe70 [ 899.987243][T23812] ? kmem_cache_free+0x1c0/0x1e0 [ 899.992017][T23812] ? kernel_write+0x3d0/0x3d0 [ 899.996528][T23812] ? __kasan_check_write+0x14/0x20 [ 900.001683][T23812] ? mutex_lock+0xa5/0x110 [ 900.005934][T23812] ? mutex_trylock+0xa0/0xa0 [ 900.010363][T23812] ? __kasan_check_write+0x14/0x20 [ 900.015629][T23812] ? fput_many+0x160/0x1b0 [ 900.019878][T23812] ? debug_smp_processor_id+0x17/0x20 [ 900.025081][T23812] __x64_sys_bpf+0x7b/0x90 [ 900.029333][T23812] do_syscall_64+0x34/0x70 [ 900.033582][T23812] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 900.039308][T23812] RIP: 0033:0x7f28d42caff9 [ 900.043559][T23812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 900.063003][T23812] RSP: 002b:00007f28d2f44038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 900.071244][T23812] RAX: ffffffffffffffda RBX: 00007f28d4482f80 RCX: 00007f28d42caff9 [ 900.079059][T23812] RDX: 0000000000000048 RSI: 0000000020000040 RDI: 000000000000000a [ 900.086876][T23812] RBP: 00007f28d2f44090 R08: 0000000000000000 R09: 0000000000000000 [ 900.094679][T23812] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 900.102491][T23812] R13: 0000000000000000 R14: 00007f28d4482f80 R15: 00007fffc96feb28 [ 900.118568][ T24] audit: type=1400 audit(1729591328.399:163): avc: denied { append } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 900.244123][ T24] audit: type=1400 audit(1729591328.399:164): avc: denied { open } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 900.421193][ T24] audit: type=1400 audit(1729591328.399:165): avc: denied { getattr } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 903.369528][T23955] device veth0_vlan left promiscuous mode [ 903.590133][T23955] device veth0_vlan entered promiscuous mode [ 903.949662][T23989] syz.2.8070[23989] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 903.949718][T23989] syz.2.8070[23989] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 904.061215][T23976] device syzkaller0 entered promiscuous mode [ 904.900893][T24005] FAULT_INJECTION: forcing a failure. [ 904.900893][T24005] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 905.012847][T24005] CPU: 1 PID: 24005 Comm: syz.0.8075 Tainted: G W 5.10.226-syzkaller-00709-ge5e5644ea27f #0 [ 905.024133][T24005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 905.034017][T24005] Call Trace: [ 905.037153][T24005] dump_stack_lvl+0x1e2/0x24b [ 905.041664][T24005] ? bfq_pos_tree_add_move+0x43b/0x43b [ 905.046957][T24005] ? ktime_get+0x10e/0x140 [ 905.051211][T24005] dump_stack+0x15/0x17 [ 905.055200][T24005] should_fail+0x3c6/0x510 [ 905.059452][T24005] should_fail_usercopy+0x1a/0x20 [ 905.064307][T24005] _copy_to_user+0x20/0x90 [ 905.068571][T24005] bpf_test_finish+0x297/0x5a0 [ 905.073164][T24005] ? convert___skb_to_skb+0x570/0x570 [ 905.078373][T24005] ? convert_skb_to___skb+0x360/0x360 [ 905.083582][T24005] ? convert_skb_to___skb+0x208/0x360 [ 905.088789][T24005] bpf_prog_test_run_skb+0xd7a/0x1410 [ 905.094000][T24005] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 905.099725][T24005] ? __kasan_check_write+0x14/0x20 [ 905.104673][T24005] ? fput_many+0x160/0x1b0 [ 905.108924][T24005] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 905.115350][T24005] __se_sys_bpf+0x5235/0x11cb0 [ 905.119957][T24005] ? stack_trace_save+0x113/0x1c0 [ 905.124815][T24005] ? terminate_walk+0x407/0x4f0 [ 905.129496][T24005] ? stack_trace_snprint+0xf0/0xf0 [ 905.134437][T24005] ? kmem_cache_free+0xa9/0x1e0 [ 905.139123][T24005] ? kmem_cache_free+0xa9/0x1e0 [ 905.143819][T24005] ? kasan_set_track+0x5d/0x70 [ 905.148410][T24005] ? __x64_sys_bpf+0x90/0x90 [ 905.152835][T24005] ? __kasan_slab_free+0x11/0x20 [ 905.157608][T24005] ? slab_free_freelist_hook+0xc0/0x190 [ 905.162989][T24005] ? kmem_cache_free+0xa9/0x1e0 [ 905.167676][T24005] ? putname+0xe7/0x140 [ 905.171670][T24005] ? do_sys_openat2+0x1fc/0x710 [ 905.176357][T24005] ? __x64_sys_openat+0x243/0x290 [ 905.181217][T24005] ? do_syscall_64+0x34/0x70 [ 905.185646][T24005] ? _kstrtoull+0x3a0/0x4a0 [ 905.189985][T24005] ? kstrtouint_from_user+0x20a/0x2a0 [ 905.195214][T24005] ? kstrtol_from_user+0x310/0x310 [ 905.200140][T24005] ? memset+0x35/0x40 [ 905.203956][T24005] ? __fsnotify_parent+0x4b9/0x6c0 [ 905.208906][T24005] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 905.215326][T24005] ? proc_fail_nth_write+0x20b/0x290 [ 905.220446][T24005] ? proc_fail_nth_read+0x210/0x210 [ 905.225487][T24005] ? security_file_permission+0x86/0xb0 [ 905.230860][T24005] ? rw_verify_area+0x1c3/0x360 [ 905.235547][T24005] ? preempt_count_add+0x92/0x1a0 [ 905.240407][T24005] ? vfs_write+0x852/0xe70 [ 905.244661][T24005] ? kmem_cache_free+0xa9/0x1e0 [ 905.249349][T24005] ? kernel_write+0x3d0/0x3d0 [ 905.253863][T24005] ? __kasan_check_write+0x14/0x20 [ 905.258806][T24005] ? mutex_lock+0xa5/0x110 [ 905.263058][T24005] ? mutex_trylock+0xa0/0xa0 [ 905.267492][T24005] ? __kasan_check_write+0x14/0x20 [ 905.272435][T24005] ? fput_many+0x160/0x1b0 [ 905.276820][T24005] ? debug_smp_processor_id+0x17/0x20 [ 905.281981][T24005] __x64_sys_bpf+0x7b/0x90 [ 905.286233][T24005] do_syscall_64+0x34/0x70 [ 905.290493][T24005] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 905.296216][T24005] RIP: 0033:0x7fbbbc983ff9 [ 905.300478][T24005] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 905.319995][T24005] RSP: 002b:00007fbbbb5fd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 905.328239][T24005] RAX: ffffffffffffffda RBX: 00007fbbbcb3bf80 RCX: 00007fbbbc983ff9 [ 905.336052][T24005] RDX: 0000000000000050 RSI: 0000000020001200 RDI: 000000000000000a [ 905.343860][T24005] RBP: 00007fbbbb5fd090 R08: 0000000000000000 R09: 0000000000000000 [ 905.351756][T24005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 905.359567][T24005] R13: 0000000000000000 R14: 00007fbbbcb3bf80 R15: 00007ffcd6e0dee8 [ 906.320275][T24049] syz.4.8088[24049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 906.320329][T24049] syz.4.8088[24049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 906.343589][T24055] FAULT_INJECTION: forcing a failure. [ 906.343589][T24055] name failslab, interval 1, probability 0, space 0, times 0 [ 906.350470][T24051] pim6reg0: tun_chr_ioctl cmd 1074025698 [ 906.355022][T24055] CPU: 0 PID: 24055 Comm: syz.0.8090 Tainted: G W 5.10.226-syzkaller-00709-ge5e5644ea27f #0 [ 906.384025][T24055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 906.393917][T24055] Call Trace: [ 906.397051][T24055] dump_stack_lvl+0x1e2/0x24b [ 906.401554][T24055] ? panic+0x812/0x812 [ 906.405461][T24055] ? slab_post_alloc_hook+0x80/0x2f0 [ 906.410585][T24055] ? bfq_pos_tree_add_move+0x43b/0x43b [ 906.415877][T24055] ? __kasan_check_write+0x14/0x20 [ 906.420822][T24055] dump_stack+0x15/0x17 [ 906.424815][T24055] should_fail+0x3c6/0x510 [ 906.429070][T24055] ? skb_clone+0x1de/0x370 [ 906.433321][T24055] __should_failslab+0xa4/0xe0 [ 906.437922][T24055] should_failslab+0x9/0x20 [ 906.442262][T24055] kmem_cache_alloc+0x3d/0x2e0 [ 906.446859][T24055] ? __bpf_redirect+0x673/0xde0 [ 906.451547][T24055] skb_clone+0x1de/0x370 [ 906.455625][T24055] bpf_clone_redirect+0xa6/0x390 [ 906.460422][T24055] bpf_prog_b36a1f39e2fdd4f4+0x56/0xb30 [ 906.465790][T24055] ? __kasan_slab_alloc+0xc3/0xe0 [ 906.470647][T24055] ? __kasan_slab_alloc+0xb1/0xe0 [ 906.475505][T24055] ? slab_post_alloc_hook+0x61/0x2f0 [ 906.480622][T24055] ? kmem_cache_alloc+0x168/0x2e0 [ 906.485480][T24055] ? __build_skb+0x2a/0x300 [ 906.489819][T24055] ? build_skb+0x25/0x1e0 [ 906.493991][T24055] ? bpf_prog_test_run_skb+0x388/0x1410 [ 906.499369][T24055] ? __se_sys_bpf+0x5235/0x11cb0 [ 906.504228][T24055] ? __x64_sys_bpf+0x7b/0x90 [ 906.508656][T24055] ? do_syscall_64+0x34/0x70 [ 906.513081][T24055] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 906.518994][T24055] ? __kasan_check_read+0x11/0x20 [ 906.523881][T24055] ? bpf_test_timer_continue+0x140/0x440 [ 906.529343][T24055] bpf_test_run+0x40b/0xc20 [ 906.533656][T24055] ? convert___skb_to_skb+0x570/0x570 [ 906.538858][T24055] ? eth_type_trans+0x2e4/0x620 [ 906.543544][T24055] ? eth_get_headlen+0x240/0x240 [ 906.548319][T24055] ? bpf_prog_test_run_skb+0x7c5/0x1410 [ 906.553789][T24055] ? convert___skb_to_skb+0x44/0x570 [ 906.558909][T24055] ? memcpy+0x56/0x70 [ 906.562750][T24055] bpf_prog_test_run_skb+0xb6e/0x1410 [ 906.567950][T24055] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 906.573687][T24055] ? __kasan_check_write+0x14/0x20 [ 906.578610][T24055] ? fput_many+0x160/0x1b0 [ 906.582863][T24055] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 906.588766][T24055] __se_sys_bpf+0x5235/0x11cb0 [ 906.593366][T24055] ? stack_trace_save+0x113/0x1c0 [ 906.598227][T24055] ? terminate_walk+0x407/0x4f0 [ 906.602911][T24055] ? stack_trace_snprint+0xf0/0xf0 [ 906.607860][T24055] ? kmem_cache_free+0xa9/0x1e0 [ 906.612549][T24055] ? kmem_cache_free+0xa9/0x1e0 [ 906.617232][T24055] ? kasan_set_track+0x5d/0x70 [ 906.621834][T24055] ? __x64_sys_bpf+0x90/0x90 [ 906.626268][T24055] ? __kasan_slab_free+0x11/0x20 [ 906.631031][T24055] ? slab_free_freelist_hook+0xc0/0x190 [ 906.636412][T24055] ? kmem_cache_free+0xa9/0x1e0 [ 906.641102][T24055] ? putname+0xe7/0x140 [ 906.645091][T24055] ? do_sys_openat2+0x1fc/0x710 [ 906.649781][T24055] ? __x64_sys_openat+0x243/0x290 [ 906.654639][T24055] ? do_syscall_64+0x34/0x70 [ 906.659081][T24055] ? _kstrtoull+0x3a0/0x4a0 [ 906.663435][T24055] ? kstrtouint_from_user+0x20a/0x2a0 [ 906.668620][T24055] ? kstrtol_from_user+0x310/0x310 [ 906.673565][T24055] ? memset+0x35/0x40 [ 906.677380][T24055] ? __fsnotify_parent+0x4b9/0x6c0 [ 906.682332][T24055] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 906.688749][T24055] ? proc_fail_nth_write+0x20b/0x290 [ 906.693871][T24055] ? proc_fail_nth_read+0x210/0x210 [ 906.698905][T24055] ? security_file_permission+0x86/0xb0 [ 906.704286][T24055] ? rw_verify_area+0x1c3/0x360 [ 906.708986][T24055] ? preempt_count_add+0x92/0x1a0 [ 906.713833][T24055] ? vfs_write+0x852/0xe70 [ 906.718087][T24055] ? kmem_cache_free+0xa9/0x1e0 [ 906.722772][T24055] ? kernel_write+0x3d0/0x3d0 [ 906.727457][T24055] ? __kasan_check_write+0x14/0x20 [ 906.732410][T24055] ? mutex_lock+0xa5/0x110 [ 906.736655][T24055] ? mutex_trylock+0xa0/0xa0 [ 906.741090][T24055] ? __kasan_check_write+0x14/0x20 [ 906.746032][T24055] ? fput_many+0x160/0x1b0 [ 906.750289][T24055] ? debug_smp_processor_id+0x17/0x20 [ 906.755495][T24055] __x64_sys_bpf+0x7b/0x90 [ 906.759744][T24055] do_syscall_64+0x34/0x70 [ 906.763998][T24055] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 906.769725][T24055] RIP: 0033:0x7fbbbc983ff9 [ 906.773978][T24055] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 906.793680][T24055] RSP: 002b:00007fbbbb5fd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 906.801923][T24055] RAX: ffffffffffffffda RBX: 00007fbbbcb3bf80 RCX: 00007fbbbc983ff9 [ 906.809731][T24055] RDX: 0000000000000048 RSI: 0000000020000040 RDI: 000000000000000a [ 906.817542][T24055] RBP: 00007fbbbb5fd090 R08: 0000000000000000 R09: 0000000000000000 [ 906.825369][T24055] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 906.833166][T24055] R13: 0000000000000000 R14: 00007fbbbcb3bf80 R15: 00007ffcd6e0dee8 [ 908.150699][T24080] FAULT_INJECTION: forcing a failure. [ 908.150699][T24080] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 908.189030][T24080] CPU: 0 PID: 24080 Comm: syz.3.8098 Tainted: G W 5.10.226-syzkaller-00709-ge5e5644ea27f #0 [ 908.200309][T24080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 908.210200][T24080] Call Trace: [ 908.213335][T24080] dump_stack_lvl+0x1e2/0x24b [ 908.217839][T24080] ? bfq_pos_tree_add_move+0x43b/0x43b [ 908.223133][T24080] ? ktime_get+0x10e/0x140 [ 908.227386][T24080] dump_stack+0x15/0x17 [ 908.231379][T24080] should_fail+0x3c6/0x510 [ 908.235628][T24080] should_fail_usercopy+0x1a/0x20 [ 908.240489][T24080] _copy_to_user+0x20/0x90 [ 908.244744][T24080] bpf_test_finish+0x265/0x5a0 [ 908.249370][T24080] ? convert___skb_to_skb+0x570/0x570 [ 908.254642][T24080] ? convert_skb_to___skb+0x360/0x360 [ 908.259849][T24080] ? convert_skb_to___skb+0x208/0x360 [ 908.265154][T24080] bpf_prog_test_run_skb+0xd7a/0x1410 [ 908.270365][T24080] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 908.276092][T24080] ? __kasan_check_write+0x14/0x20 [ 908.281042][T24080] ? fput_many+0x160/0x1b0 [ 908.285376][T24080] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 908.291102][T24080] __se_sys_bpf+0x5235/0x11cb0 [ 908.295705][T24080] ? debug_smp_processor_id+0x17/0x20 [ 908.300911][T24080] ? get_perf_callchain+0x5cb/0x810 [ 908.305948][T24080] ? put_callchain_entry+0xb0/0xb0 [ 908.310892][T24080] ? kmem_cache_free+0xa9/0x1e0 [ 908.315665][T24080] ? kasan_set_track+0x5d/0x70 [ 908.320419][T24080] ? __x64_sys_bpf+0x90/0x90 [ 908.324922][T24080] ? memset+0x35/0x40 [ 908.328829][T24080] ? _kstrtoull+0x3a0/0x4a0 [ 908.333167][T24080] ? kstrtouint_from_user+0x20a/0x2a0 [ 908.338374][T24080] ? kstrtol_from_user+0x310/0x310 [ 908.343321][T24080] ? memset+0x35/0x40 [ 908.347140][T24080] ? __fsnotify_parent+0x4b9/0x6c0 [ 908.352090][T24080] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 908.358507][T24080] ? proc_fail_nth_write+0x20b/0x290 [ 908.363628][T24080] ? proc_fail_nth_read+0x210/0x210 [ 908.368661][T24080] ? security_file_permission+0x86/0xb0 [ 908.374039][T24080] ? rw_verify_area+0x1c3/0x360 [ 908.378724][T24080] ? preempt_count_add+0x92/0x1a0 [ 908.383586][T24080] ? vfs_write+0x852/0xe70 [ 908.387837][T24080] ? kmem_cache_free+0x1c0/0x1e0 [ 908.392613][T24080] ? kernel_write+0x3d0/0x3d0 [ 908.397124][T24080] ? __kasan_check_write+0x14/0x20 [ 908.402079][T24080] ? mutex_lock+0xa5/0x110 [ 908.406322][T24080] ? mutex_trylock+0xa0/0xa0 [ 908.410752][T24080] ? __kasan_check_write+0x14/0x20 [ 908.415696][T24080] ? fput_many+0x160/0x1b0 [ 908.419957][T24080] ? debug_smp_processor_id+0x17/0x20 [ 908.425160][T24080] __x64_sys_bpf+0x7b/0x90 [ 908.429411][T24080] do_syscall_64+0x34/0x70 [ 908.433666][T24080] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 908.439390][T24080] RIP: 0033:0x7f28d42caff9 [ 908.443744][T24080] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 908.463180][T24080] RSP: 002b:00007f28d2f44038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 908.471415][T24080] RAX: ffffffffffffffda RBX: 00007f28d4482f80 RCX: 00007f28d42caff9 [ 908.479484][T24080] RDX: 0000000000000050 RSI: 0000000020000900 RDI: 000000000000000a [ 908.487296][T24080] RBP: 00007f28d2f44090 R08: 0000000000000000 R09: 0000000000000000 [ 908.495109][T24080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 908.503006][T24080] R13: 0000000000000000 R14: 00007f28d4482f80 R15: 00007fffc96feb28 [ 908.878807][T24092] bridge0: port 2(bridge_slave_1) entered disabled state [ 908.885819][T24092] bridge0: port 1(bridge_slave_0) entered disabled state [ 912.165053][T24195] device syzkaller0 entered promiscuous mode [ 912.258987][T24200] FAULT_INJECTION: forcing a failure. [ 912.258987][T24200] name failslab, interval 1, probability 0, space 0, times 0 [ 912.271565][T24200] CPU: 1 PID: 24200 Comm: syz.1.8143 Tainted: G W 5.10.226-syzkaller-00709-ge5e5644ea27f #0 [ 912.282770][T24200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 912.292645][T24200] Call Trace: [ 912.295759][T24200] dump_stack_lvl+0x1e2/0x24b [ 912.300255][T24200] ? panic+0x812/0x812 [ 912.304246][T24200] ? bfq_pos_tree_add_move+0x43b/0x43b [ 912.309545][T24200] ? avc_has_perm_noaudit+0x117/0x240 [ 912.314749][T24200] dump_stack+0x15/0x17 [ 912.318915][T24200] should_fail+0x3c6/0x510 [ 912.323173][T24200] ? __get_vm_area_node+0x116/0x470 [ 912.328205][T24200] __should_failslab+0xa4/0xe0 [ 912.332811][T24200] should_failslab+0x9/0x20 [ 912.337146][T24200] kmem_cache_alloc_trace+0x3a/0x2e0 [ 912.342268][T24200] __get_vm_area_node+0x116/0x470 [ 912.347129][T24200] __vmalloc_node_range+0xdc/0x7c0 [ 912.352071][T24200] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 912.357454][T24200] ? 0xffffffffa0028000 [ 912.361446][T24200] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 912.366827][T24200] __vmalloc+0x7a/0x90 [ 912.370736][T24200] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 912.376115][T24200] bpf_prog_alloc_no_stats+0x39/0x2a0 [ 912.381324][T24200] bpf_prog_alloc+0x21/0x1e0 [ 912.385747][T24200] __se_sys_bpf+0x9856/0x11cb0 [ 912.390350][T24200] ? kmem_cache_free+0xa9/0x1e0 [ 912.395034][T24200] ? kmem_cache_free+0xa9/0x1e0 [ 912.399721][T24200] ? kasan_set_track+0x5d/0x70 [ 912.404318][T24200] ? __x64_sys_bpf+0x90/0x90 [ 912.408746][T24200] ? __kasan_slab_free+0x11/0x20 [ 912.413515][T24200] ? slab_free_freelist_hook+0xc0/0x190 [ 912.419086][T24200] ? kmem_cache_free+0xa9/0x1e0 [ 912.423735][T24200] ? putname+0xe7/0x140 [ 912.427728][T24200] ? do_sys_openat2+0x1fc/0x710 [ 912.432417][T24200] ? __x64_sys_openat+0x243/0x290 [ 912.437272][T24200] ? do_syscall_64+0x34/0x70 [ 912.441703][T24200] ? _kstrtoull+0x3a0/0x4a0 [ 912.446063][T24200] ? memset+0x35/0x40 [ 912.449878][T24200] ? __fsnotify_parent+0x4b9/0x6c0 [ 912.454822][T24200] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 912.461228][T24200] ? proc_fail_nth_write+0x20b/0x290 [ 912.466349][T24200] ? proc_fail_nth_read+0x210/0x210 [ 912.471480][T24200] ? security_file_permission+0x86/0xb0 [ 912.476878][T24200] ? rw_verify_area+0x1c3/0x360 [ 912.481555][T24200] ? preempt_count_add+0x92/0x1a0 [ 912.486412][T24200] ? vfs_write+0x852/0xe70 [ 912.490664][T24200] ? kmem_cache_free+0xa9/0x1e0 [ 912.495348][T24200] ? kernel_write+0x3d0/0x3d0 [ 912.499860][T24200] ? __kasan_check_write+0x14/0x20 [ 912.504807][T24200] ? mutex_lock+0xa5/0x110 [ 912.509057][T24200] ? mutex_trylock+0xa0/0xa0 [ 912.513485][T24200] ? __kasan_check_write+0x14/0x20 [ 912.518431][T24200] ? fput_many+0x160/0x1b0 [ 912.522690][T24200] ? debug_smp_processor_id+0x17/0x20 [ 912.527896][T24200] __x64_sys_bpf+0x7b/0x90 [ 912.532147][T24200] do_syscall_64+0x34/0x70 [ 912.536400][T24200] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 912.542127][T24200] RIP: 0033:0x7f9e54903ff9 [ 912.546380][T24200] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 912.565822][T24200] RSP: 002b:00007f9e5357d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 912.574065][T24200] RAX: ffffffffffffffda RBX: 00007f9e54abbf80 RCX: 00007f9e54903ff9 [ 912.581876][T24200] RDX: 0000000000000080 RSI: 0000000020000140 RDI: 0000000000000005 [ 912.589687][T24200] RBP: 00007f9e5357d090 R08: 0000000000000000 R09: 0000000000000000 [ 912.597586][T24200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 912.605398][T24200] R13: 0000000000000000 R14: 00007f9e54abbf80 R15: 00007ffc7e0e5b58 [ 912.613843][T24200] syz.1.8143: vmalloc: allocation failure: 4096 bytes, mode:0x100dc0(GFP_USER|__GFP_ZERO), nodemask=(null),cpuset=syz1,mems_allowed=0 [ 912.627574][T24200] CPU: 0 PID: 24200 Comm: syz.1.8143 Tainted: G W 5.10.226-syzkaller-00709-ge5e5644ea27f #0 [ 912.638735][T24200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 912.648621][T24200] Call Trace: [ 912.651761][T24200] dump_stack_lvl+0x1e2/0x24b [ 912.656266][T24200] ? wake_up_klogd+0xb8/0xf0 [ 912.660692][T24200] ? bfq_pos_tree_add_move+0x43b/0x43b [ 912.665988][T24200] ? pr_cont_kernfs_name+0xf0/0x100 [ 912.671019][T24200] dump_stack+0x15/0x17 [ 912.675012][T24200] warn_alloc+0x21a/0x390 [ 912.679180][T24200] ? __get_vm_area_node+0x116/0x470 [ 912.684214][T24200] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 912.689596][T24200] ? __kasan_kmalloc+0x9/0x10 [ 912.694111][T24200] ? __get_vm_area_node+0x34b/0x470 [ 912.699143][T24200] __vmalloc_node_range+0x287/0x7c0 [ 912.704172][T24200] ? 0xffffffffa0028000 [ 912.708167][T24200] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 912.713548][T24200] __vmalloc+0x7a/0x90 [ 912.717458][T24200] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 912.722838][T24200] bpf_prog_alloc_no_stats+0x39/0x2a0 [ 912.728046][T24200] bpf_prog_alloc+0x21/0x1e0 [ 912.732475][T24200] __se_sys_bpf+0x9856/0x11cb0 [ 912.737075][T24200] ? kmem_cache_free+0xa9/0x1e0 [ 912.741760][T24200] ? kmem_cache_free+0xa9/0x1e0 [ 912.746441][T24200] ? kasan_set_track+0x5d/0x70 [ 912.751042][T24200] ? __x64_sys_bpf+0x90/0x90 [ 912.755467][T24200] ? __kasan_slab_free+0x11/0x20 [ 912.760243][T24200] ? slab_free_freelist_hook+0xc0/0x190 [ 912.765622][T24200] ? kmem_cache_free+0xa9/0x1e0 [ 912.770309][T24200] ? putname+0xe7/0x140 [ 912.774300][T24200] ? do_sys_openat2+0x1fc/0x710 [ 912.778989][T24200] ? __x64_sys_openat+0x243/0x290 [ 912.783850][T24200] ? do_syscall_64+0x34/0x70 [ 912.788276][T24200] ? _kstrtoull+0x3a0/0x4a0 [ 912.792620][T24200] ? memset+0x35/0x40 [ 912.796434][T24200] ? __fsnotify_parent+0x4b9/0x6c0 [ 912.801383][T24200] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 912.807804][T24200] ? proc_fail_nth_write+0x20b/0x290 [ 912.812926][T24200] ? proc_fail_nth_read+0x210/0x210 [ 912.817960][T24200] ? security_file_permission+0x86/0xb0 [ 912.823344][T24200] ? rw_verify_area+0x1c3/0x360 [ 912.828026][T24200] ? preempt_count_add+0x92/0x1a0 [ 912.832885][T24200] ? vfs_write+0x852/0xe70 [ 912.837140][T24200] ? kmem_cache_free+0xa9/0x1e0 [ 912.841826][T24200] ? kernel_write+0x3d0/0x3d0 [ 912.846340][T24200] ? __kasan_check_write+0x14/0x20 [ 912.851285][T24200] ? mutex_lock+0xa5/0x110 [ 912.855542][T24200] ? mutex_trylock+0xa0/0xa0 [ 912.859988][T24200] ? __kasan_check_write+0x14/0x20 [ 912.864926][T24200] ? fput_many+0x160/0x1b0 [ 912.869183][T24200] ? debug_smp_processor_id+0x17/0x20 [ 912.874418][T24200] __x64_sys_bpf+0x7b/0x90 [ 912.878628][T24200] do_syscall_64+0x34/0x70 [ 912.882881][T24200] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 912.888605][T24200] RIP: 0033:0x7f9e54903ff9 [ 912.892871][T24200] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 912.912308][T24200] RSP: 002b:00007f9e5357d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 912.920545][T24200] RAX: ffffffffffffffda RBX: 00007f9e54abbf80 RCX: 00007f9e54903ff9 [ 912.928356][T24200] RDX: 0000000000000080 RSI: 0000000020000140 RDI: 0000000000000005 [ 912.936168][T24200] RBP: 00007f9e5357d090 R08: 0000000000000000 R09: 0000000000000000 [ 912.943977][T24200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 912.951790][T24200] R13: 0000000000000000 R14: 00007f9e54abbf80 R15: 00007ffc7e0e5b58 [ 912.963997][T24200] Mem-Info: [ 912.970512][T24200] active_anon:118 inactive_anon:19108 isolated_anon:0 [ 912.970512][T24200] active_file:25373 inactive_file:4272 isolated_file:0 [ 912.970512][T24200] unevictable:0 dirty:203 writeback:0 [ 912.970512][T24200] slab_reclaimable:6659 slab_unreclaimable:83179 [ 912.970512][T24200] mapped:21600 shmem:177 pagetables:600 bounce:0 [ 912.970512][T24200] free:1552893 free_pcp:1261 free_cma:0 [ 913.017255][T24200] Node 0 active_anon:472kB inactive_anon:76332kB active_file:101492kB inactive_file:17088kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:86400kB dirty:812kB writeback:0kB shmem:708kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4928kB all_unreclaimable? no [ 913.063733][T24200] DMA32 free:2981840kB min:62624kB low:78280kB high:93936kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2984764kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:2924kB local_pcp:1444kB free_cma:0kB [ 913.099510][T24200] lowmem_reserve[]: 0 3941 3941 [ 913.104292][T24200] Normal free:3250644kB min:84828kB low:106032kB high:127236kB reserved_highatomic:0KB active_anon:488kB inactive_anon:76368kB active_file:101492kB inactive_file:17088kB unevictable:0kB writepending:824kB present:5242880kB managed:4035856kB mlocked:0kB pagetables:2176kB bounce:0kB free_pcp:2492kB local_pcp:1144kB free_cma:0kB [ 913.160518][T24200] lowmem_reserve[]: 0 0 0 [ 913.164692][T24200] DMA32: 6*4kB (UM) 3*8kB (M) 4*16kB (M) 7*32kB (UM) 8*64kB (UM) 7*128kB (UM) 7*256kB (UM) 5*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2981840kB [ 913.184330][T24211] FAULT_INJECTION: forcing a failure. [ 913.184330][T24211] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 913.197549][T24211] CPU: 1 PID: 24211 Comm: syz.0.8148 Tainted: G W 5.10.226-syzkaller-00709-ge5e5644ea27f #0 [ 913.208723][T24211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 913.218789][T24211] Call Trace: [ 913.221917][T24211] dump_stack_lvl+0x1e2/0x24b [ 913.226438][T24211] ? bfq_pos_tree_add_move+0x43b/0x43b [ 913.231719][T24211] ? ktime_get+0x10e/0x140 [ 913.235973][T24211] dump_stack+0x15/0x17 [ 913.239970][T24211] should_fail+0x3c6/0x510 [ 913.244238][T24211] should_fail_usercopy+0x1a/0x20 [ 913.249162][T24211] _copy_to_user+0x20/0x90 [ 913.253420][T24211] bpf_test_finish+0x265/0x5a0 [ 913.258017][T24211] ? convert___skb_to_skb+0x570/0x570 [ 913.263226][T24211] ? convert_skb_to___skb+0x360/0x360 [ 913.268443][T24211] ? convert_skb_to___skb+0x208/0x360 [ 913.273641][T24211] bpf_prog_test_run_skb+0xd7a/0x1410 [ 913.278851][T24211] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 913.284577][T24211] ? __kasan_check_write+0x14/0x20 [ 913.289522][T24211] ? fput_many+0x160/0x1b0 [ 913.293776][T24211] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 913.299507][T24211] __se_sys_bpf+0x5235/0x11cb0 [ 913.304105][T24211] ? stack_trace_save+0x113/0x1c0 [ 913.308962][T24211] ? terminate_walk+0x407/0x4f0 [ 913.313652][T24211] ? stack_trace_snprint+0xf0/0xf0 [ 913.318602][T24211] ? kmem_cache_free+0xa9/0x1e0 [ 913.323284][T24211] ? kmem_cache_free+0xa9/0x1e0 [ 913.327970][T24211] ? kasan_set_track+0x5d/0x70 [ 913.332568][T24211] ? __x64_sys_bpf+0x90/0x90 [ 913.336995][T24211] ? __kasan_slab_free+0x11/0x20 [ 913.341771][T24211] ? slab_free_freelist_hook+0xc0/0x190 [ 913.347152][T24211] ? kmem_cache_free+0xa9/0x1e0 [ 913.351840][T24211] ? putname+0xe7/0x140 [ 913.355829][T24211] ? do_sys_openat2+0x1fc/0x710 [ 913.360518][T24211] ? __x64_sys_openat+0x243/0x290 [ 913.365379][T24211] ? do_syscall_64+0x34/0x70 [ 913.369806][T24211] ? _kstrtoull+0x3a0/0x4a0 [ 913.374163][T24211] ? kstrtouint_from_user+0x20a/0x2a0 [ 913.379359][T24211] ? kstrtol_from_user+0x310/0x310 [ 913.384301][T24211] ? bpf_ringbuf_notify+0x30/0x30 [ 913.389166][T24211] ? memset+0x35/0x40 [ 913.392980][T24211] ? __fsnotify_parent+0x4b9/0x6c0 [ 913.397928][T24211] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 913.404351][T24211] ? proc_fail_nth_write+0x20b/0x290 [ 913.409471][T24211] ? proc_fail_nth_read+0x210/0x210 [ 913.414502][T24211] ? security_file_permission+0x86/0xb0 [ 913.419884][T24211] ? rw_verify_area+0x1c3/0x360 [ 913.424569][T24211] ? preempt_count_add+0x92/0x1a0 [ 913.429434][T24211] ? vfs_write+0x852/0xe70 [ 913.433683][T24211] ? kmem_cache_free+0x1c0/0x1e0 [ 913.438631][T24211] ? kernel_write+0x3d0/0x3d0 [ 913.443143][T24211] ? __kasan_check_write+0x14/0x20 [ 913.448089][T24211] ? mutex_lock+0xa5/0x110 [ 913.452347][T24211] ? mutex_trylock+0xa0/0xa0 [ 913.456787][T24211] ? __kasan_check_write+0x14/0x20 [ 913.461718][T24211] ? fput_many+0x160/0x1b0 [ 913.465977][T24211] ? debug_smp_processor_id+0x17/0x20 [ 913.471178][T24211] __x64_sys_bpf+0x7b/0x90 [ 913.475437][T24211] do_syscall_64+0x34/0x70 [ 913.479684][T24211] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 913.485415][T24211] RIP: 0033:0x7fbbbc983ff9 [ 913.489665][T24211] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 913.509114][T24211] RSP: 002b:00007fbbbb5fd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 913.517347][T24211] RAX: ffffffffffffffda RBX: 00007fbbbcb3bf80 RCX: 00007fbbbc983ff9 [ 913.525155][T24211] RDX: 0000000000000050 RSI: 0000000020000900 RDI: 000000000000000a [ 913.532964][T24211] RBP: 00007fbbbb5fd090 R08: 0000000000000000 R09: 0000000000000000 [ 913.540776][T24211] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 913.548588][T24211] R13: 0000000000000000 R14: 00007fbbbcb3bf80 R15: 00007ffcd6e0dee8 [ 913.560754][T24200] Normal: 798*4kB (UME) 1596*8kB (UME) 1551*16kB (UME) 963*32kB (UME) 434*64kB (UME) 138*128kB (UME) 55*256kB (ME) 33*512kB (M) 11*1024kB (UME) 6*2048kB (ME) 752*4096kB (M) = 3251752kB [ 913.588946][T24200] 29826 total pagecache pages [ 913.593459][T24200] 0 pages in swap cache [ 913.597436][T24200] Swap cache stats: add 0, delete 0, find 0/0 [ 913.607546][T24212] device syzkaller0 entered promiscuous mode [ 913.614141][T24200] Free swap = 124996kB [ 913.618113][T24200] Total swap = 124996kB [ 913.633468][T24200] 2097051 pages RAM [ 913.637362][T24200] 0 pages HighMem/MovableOnly [ 913.642111][T24200] 341896 pages reserved [ 913.646104][T24200] 0 pages cma reserved [ 914.021135][T24228] syz.4.8154[24228] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 914.021229][T24228] syz.4.8154[24228] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 914.620979][T24245] FAULT_INJECTION: forcing a failure. [ 914.620979][T24245] name failslab, interval 1, probability 0, space 0, times 0 [ 914.758673][T24245] CPU: 1 PID: 24245 Comm: syz.0.8159 Tainted: G W 5.10.226-syzkaller-00709-ge5e5644ea27f #0 [ 914.769855][T24245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 914.779748][T24245] Call Trace: [ 914.782881][T24245] dump_stack_lvl+0x1e2/0x24b [ 914.787522][T24245] ? bfq_pos_tree_add_move+0x43b/0x43b [ 914.792811][T24245] ? __get_vm_area_node+0x116/0x470 [ 914.797840][T24245] ? ____kasan_kmalloc+0xed/0x110 [ 914.802707][T24245] ? __kasan_kmalloc+0x9/0x10 [ 914.807215][T24245] dump_stack+0x15/0x17 [ 914.811210][T24245] should_fail+0x3c6/0x510 [ 914.815464][T24245] ? alloc_vmap_area+0x16f/0x1a90 [ 914.820326][T24245] __should_failslab+0xa4/0xe0 [ 914.824927][T24245] should_failslab+0x9/0x20 [ 914.829258][T24245] kmem_cache_alloc+0x3d/0x2e0 [ 914.833855][T24245] alloc_vmap_area+0x16f/0x1a90 [ 914.838548][T24245] ? vm_map_ram+0x9d0/0x9d0 [ 914.842881][T24245] ? __kasan_kmalloc+0x9/0x10 [ 914.847393][T24245] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 914.852774][T24245] ? __get_vm_area_node+0x116/0x470 [ 914.857809][T24245] __get_vm_area_node+0x156/0x470 [ 914.862673][T24245] __vmalloc_node_range+0xdc/0x7c0 [ 914.867617][T24245] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 914.873004][T24245] ? 0xffffffffa000228c [ 914.876990][T24245] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 914.882372][T24245] __vmalloc+0x7a/0x90 [ 914.886278][T24245] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 914.891657][T24245] bpf_prog_alloc_no_stats+0x39/0x2a0 [ 914.896865][T24245] bpf_prog_alloc+0x21/0x1e0 [ 914.901292][T24245] __se_sys_bpf+0x9856/0x11cb0 [ 914.905894][T24245] ? kmem_cache_free+0xa9/0x1e0 [ 914.910596][T24245] ? kmem_cache_free+0xa9/0x1e0 [ 914.915267][T24245] ? kasan_set_track+0x5d/0x70 [ 914.919870][T24245] ? __x64_sys_bpf+0x90/0x90 [ 914.924292][T24245] ? __kasan_slab_free+0x11/0x20 [ 914.929062][T24245] ? slab_free_freelist_hook+0xc0/0x190 [ 914.934445][T24245] ? kmem_cache_free+0xa9/0x1e0 [ 914.939129][T24245] ? putname+0xe7/0x140 [ 914.943121][T24245] ? do_sys_openat2+0x1fc/0x710 [ 914.947807][T24245] ? __x64_sys_openat+0x243/0x290 [ 914.952670][T24245] ? do_syscall_64+0x34/0x70 [ 914.957099][T24245] ? _kstrtoull+0x3a0/0x4a0 [ 914.961443][T24245] ? memset+0x35/0x40 [ 914.965258][T24245] ? __fsnotify_parent+0x4b9/0x6c0 [ 914.970208][T24245] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 914.976625][T24245] ? proc_fail_nth_write+0x20b/0x290 [ 914.981747][T24245] ? proc_fail_nth_read+0x210/0x210 [ 914.986781][T24245] ? security_file_permission+0x86/0xb0 [ 914.992161][T24245] ? rw_verify_area+0x1c3/0x360 [ 914.996848][T24245] ? preempt_count_add+0x92/0x1a0 [ 915.001708][T24245] ? vfs_write+0x852/0xe70 [ 915.005961][T24245] ? kmem_cache_free+0x1c0/0x1e0 [ 915.010735][T24245] ? kernel_write+0x3d0/0x3d0 [ 915.015248][T24245] ? __kasan_check_write+0x14/0x20 [ 915.020195][T24245] ? mutex_lock+0xa5/0x110 [ 915.024446][T24245] ? mutex_trylock+0xa0/0xa0 [ 915.028875][T24245] ? __kasan_check_write+0x14/0x20 [ 915.033819][T24245] ? fput_many+0x160/0x1b0 [ 915.038080][T24245] ? debug_smp_processor_id+0x17/0x20 [ 915.043281][T24245] __x64_sys_bpf+0x7b/0x90 [ 915.047535][T24245] do_syscall_64+0x34/0x70 [ 915.051788][T24245] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 915.057514][T24245] RIP: 0033:0x7fbbbc983ff9 [ 915.061769][T24245] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 915.081295][T24245] RSP: 002b:00007fbbbb5fd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 915.089540][T24245] RAX: ffffffffffffffda RBX: 00007fbbbcb3bf80 RCX: 00007fbbbc983ff9 [ 915.097351][T24245] RDX: 0000000000000080 RSI: 0000000020000140 RDI: 0000000000000005 [ 915.105162][T24245] RBP: 00007fbbbb5fd090 R08: 0000000000000000 R09: 0000000000000000 [ 915.112973][T24245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 915.120784][T24245] R13: 0000000000000000 R14: 00007fbbbcb3bf80 R15: 00007ffcd6e0dee8 SYZFAIL: failed to send rpc fd=3 want=58304 sent=0 n=-1 (errno 32: Broken pipe) [ 926.742662][T24300] bridge0: port 1(bridge_slave_0) entered blocking state [ 926.749561][T24300] bridge0: port 1(bridge_slave_0) entered disabled state [ 926.763640][T24300] device bridge_slave_0 entered promiscuous mode [ 927.419106][ T49] device bridge_slave_1 left promiscuous mode [ 927.425034][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 927.432306][ T49] device bridge_slave_0 left promiscuous mode [ 927.438223][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 927.445680][ T49] device veth1_macvtap left promiscuous mode [ 927.451565][ T49] device veth0_vlan left promiscuous mode [ 928.988949][ T49] device bridge_slave_0 left promiscuous mode [ 928.995108][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 929.002802][ T49] device bridge_slave_1 left promiscuous mode [ 929.008871][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 929.015983][ T49] device bridge_slave_0 left promiscuous mode [ 929.021931][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 929.029326][ T49] device bridge_slave_1 left promiscuous mode [ 929.035219][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 929.042389][ T49] device bridge_slave_0 left promiscuous mode [ 929.048298][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 929.055824][ T49] device bridge_slave_1 left promiscuous mode [ 929.061788][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 929.068941][ T49] device bridge_slave_0 left promiscuous mode [ 929.074844][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 929.082334][ T49] device vlan1 left promiscuous mode [ 929.087486][ T49] bridge0: port 3(vlan1) entered disabled state [ 929.093891][ T49] device bridge_slave_1 left promiscuous mode [ 929.099860][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 929.106844][ T49] device bridge_slave_0 left promiscuous mode [ 929.112857][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 929.120665][ T49] device veth0_vlan left promiscuous mode [ 929.126270][ T49] device veth1_macvtap left promiscuous mode [ 929.132514][ T49] device veth1_macvtap left promiscuous mode [ 929.138311][ T49] device veth0_vlan left promiscuous mode [ 929.144068][ T49] device veth1_macvtap left promiscuous mode [ 929.149939][ T49] device veth0_vlan left promiscuous mode