last executing test programs: 14.689997094s ago: executing program 4 (id=15472): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000080000085000000060000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 14.669391266s ago: executing program 4 (id=15473): r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x10, &(0x7f0000000580)=ANY=[@ANYRESOCT=r0, @ANYRES32=r1, @ANYBLOB="0000000000000000b70400000800000085000000950002009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x1, 0xe3, 0xaa71, 0xc2, r1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5, 0xd}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{r3}, &(0x7f00000005c0), &(0x7f0000000600)='%pI4 \x00'}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f00000002c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xc3000, 0x2e, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000000fad413e550000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x3, 0x2, 0x85}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x802, r5}, 0x38) bpf$MAP_UPDATE_BATCH(0x1b, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x24, r5}, 0x38) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r6, &(0x7f0000000080), 0x11ffffce1) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x0, 0x4, 0x10005}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r7, 0x58}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000900)={r5, 0x58, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r4, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb2, &(0x7f0000000a00)=[{}, {}], 0x10, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0x74, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x10, 0x1f, &(0x7f0000000700)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xd065, 0x0, 0x0, 0x0, 0xe2ba}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@btf_id={0x18, 0x3, 0x3, 0x0, 0x5}, @exit, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @exit, @btf_id={0x18, 0x8, 0x3, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000800)='syzkaller\x00', 0x8, 0x13, &(0x7f0000000840)=""/19, 0x40f00, 0x26, '\x00', r8, 0x2b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9, 0xffffffffffffffff, 0x4, 0x0, &(0x7f0000000c40)=[{0x5, 0x4, 0xd, 0x1a}, {0x5, 0x1, 0x4, 0x9}, {0x4, 0x2, 0xe, 0x3}, {0x4, 0x3, 0xc}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)={0x2, 0x4, 0x8, 0x1, 0x80, r3, 0xc0, '\x00', r8, 0xffffffffffffffff, 0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0xfffffff6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)) 13.646813859s ago: executing program 4 (id=15486): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{}, &(0x7f0000000800), 0x0}, 0x20) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000280)={'ip6erspan0', 0x32, 0x34}, 0xd) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xd, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) mkdir(&(0x7f0000000200)='./file0\x00', 0x87e4d3c19d9146ee) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x2, 0x5, 0x3, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454da, &(0x7f0000000080)={'batadv0\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000100)={'pimreg0\x00', 0x1}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4}, 0x48) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b80)={r3, 0xe0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x5, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x22, &(0x7f0000000900)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000940), &(0x7f0000000980), 0x8, 0x18, 0x8, 0x8, &(0x7f0000000a40)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@bloom_filter={0x1e, 0x8, 0x1, 0x1, 0x3a00, r1, 0x5, '\x00', r7, r6, 0x1, 0x1, 0x1, 0xc}, 0x48) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x1001) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x40000004, 0x0, 0x60c, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x5, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250}, 0x23) syz_clone(0x4000c0fe, 0x0, 0x0, 0x0, 0x0, 0x0) 9.210344727s ago: executing program 4 (id=15537): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18010000000020000000000000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000840)=ANY=[@ANYRESOCT=r5, @ANYRES32, @ANYRES8=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000880)=ANY=[], 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x420}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r6, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000bc0)='\\\x00') bpf$PROG_LOAD(0x5, &(0x7f0000001cc0)={0x16, 0xa, &(0x7f0000000500)=ANY=[@ANYRES16], &(0x7f0000000280)='GPL\x00', 0x8, 0x99, &(0x7f0000000680)=""/153, 0x41100, 0x19, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, &(0x7f0000000b00)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0xa, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, &(0x7f0000001c40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001c80)=[{0xfffffffc, 0x3, 0x8, 0xa}], 0x10, 0x3}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x17, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000c000000000000000300000018210000", @ANYRES32=r1, @ANYBLOB="00000000040000008510eaa9f11f990000f8ffffff950000000000002b974e0085200000040000001800000006000000050000004fa461990000000000000000", @ANYRES32, @ANYBLOB="000000000400000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000000000000850000008600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000000850000008600000085000000af0000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0x8d, &(0x7f0000000680)=""/141, 0x41100, 0x0, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0x4, 0x1, 0x81}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r2, r2, r0, r2, r0, r4, r4, r2], 0x0, 0x10, 0xd}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xf}, 0x108044}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 8.461679847s ago: executing program 3 (id=15541): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000080000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) 7.594134467s ago: executing program 3 (id=15548): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r0}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r2}, 0x10) socketpair(0xa, 0xf4240, 0x0, &(0x7f0000000000)) 7.592586547s ago: executing program 3 (id=15549): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x10, &(0x7f0000000580)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000009500020095000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x1, 0xe3, 0xaa71, 0xc2, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5, 0xd}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{r2}, &(0x7f00000005c0), &(0x7f0000000600)='%pI4 \x00'}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f00000002c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xc3000, 0x2e, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000000fad413e550000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x3, 0x2, 0x85}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x802, r4}, 0x38) bpf$MAP_UPDATE_BATCH(0x1b, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x24, r4}, 0x38) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r5, &(0x7f0000000080), 0x11ffffce1) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x0, 0x4, 0x10005}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r6, 0x58}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000900)={r4, 0x58, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r3, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb2, &(0x7f0000000a00)=[{}, {}], 0x10, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0x74, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x10, 0x1f, &(0x7f0000000700)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xd065, 0x0, 0x0, 0x0, 0xe2ba}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@btf_id={0x18, 0x3, 0x3, 0x0, 0x5}, @exit, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @exit, @btf_id={0x18, 0x8, 0x3, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000800)='syzkaller\x00', 0x8, 0x13, &(0x7f0000000840)=""/19, 0x40f00, 0x26, '\x00', r7, 0x2b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r8, 0xffffffffffffffff, 0x4, 0x0, &(0x7f0000000c40)=[{0x5, 0x4, 0xd, 0x1a}, {0x5, 0x1, 0x4, 0x9}, {0x4, 0x2, 0xe, 0x3}, {0x4, 0x3, 0xc}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0xc0, '\x00', r7, 0xffffffffffffffff, 0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0xfffffff6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)) 6.129367115s ago: executing program 2 (id=15563): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d00000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00'}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x30000000}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}, {0x95, 0x0, 0x50, 0x6000000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x2, 0x3, 0xa, 0x9, 0xfff0}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x2}, {0x3, 0x3, 0x6, 0xa, 0xa}, {0x7, 0x1, 0x2, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r4}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x3, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r5, &(0x7f0000000180)="bc9ba1f63a84f0565441f833d070542efb6c90278b64d0b1b1dadd04d11486c2e4bf6e3c3a17b8254c91fe269f45808a99331549a9b9f96f632ca5d8811c824f204e7d5ebff87f6d9f58c1dc39525ef41102419bfeb8470a2ad110b82fe9350753ed603a7275f23046451112ba16009c26d13d22acfbba44a3a9866c9477722d18"}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xd132}) 6.122579456s ago: executing program 3 (id=15565): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b708000000005aab7b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000008000000850000009500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00fc0000000000000000000000ac1414aa"], 0xfdef) 6.120273346s ago: executing program 1 (id=15566): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000940)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_ext_remove_space_done\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x2, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000088fe508a8500000004000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r2}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r3}, 0x10) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000002180)={0x2, 0x80, 0x4f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 6.07395438s ago: executing program 0 (id=15567): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x0, 0x5, 0x2, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000008000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000140000fbb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000001"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x2d) ioctl$TUNGETDEVNETNS(r1, 0x8982, 0x20000000) 6.004151125s ago: executing program 2 (id=15568): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 5.930067681s ago: executing program 0 (id=15569): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r1}, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r2}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x800083}, 0x10}, 0x90) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r3, 0x40047451, 0x2000000c) 5.929733311s ago: executing program 3 (id=15570): bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x0, 0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0xfffffffffffffdd2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000600), 0x4) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x0, 0x10, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xa, 0x64, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0xff, 0x0, 0x1}, 0xe) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) 5.929365501s ago: executing program 2 (id=15573): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0xa, 0x5, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000cc0), &(0x7f0000000500)="003e98e702718c60d281040000004fef524a6753d805a101adaaff137641d75565d60000137b4a10175046fe328470614e8e3db0e52f061ce3360c323db88b6bae1e88033bebccb368a32240dc8c54af2a12a84d0d4f8feded6c466a61e88750de242968c4a81daf8d89d887d5d3d110d7e0827205fc398d54695b6aebcd2773b70ccb8b5433d1", 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x1300}, 0x48) 5.830882849s ago: executing program 4 (id=15575): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x10, &(0x7f0000000580)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000009500020095000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x1, 0xe3, 0xaa71, 0xc2, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5, 0xd}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{r2}, &(0x7f00000005c0), &(0x7f0000000600)='%pI4 \x00'}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f00000002c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xc3000, 0x2e, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000000fad413e550000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x3, 0x2, 0x85}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x802, r4}, 0x38) bpf$MAP_UPDATE_BATCH(0x1b, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x24, r4}, 0x38) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r5, &(0x7f0000000080), 0x11ffffce1) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x0, 0x4, 0x10005}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r6, 0x58}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000900)={r4, 0x58, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r3, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb2, &(0x7f0000000a00)=[{}, {}], 0x10, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0x74, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x10, 0x1f, &(0x7f0000000700)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xd065, 0x0, 0x0, 0x0, 0xe2ba}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@btf_id={0x18, 0x3, 0x3, 0x0, 0x5}, @exit, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @exit, @btf_id={0x18, 0x8, 0x3, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000800)='syzkaller\x00', 0x8, 0x13, &(0x7f0000000840)=""/19, 0x40f00, 0x26, '\x00', r7, 0x2b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r8, 0xffffffffffffffff, 0x4, 0x0, &(0x7f0000000c40)=[{0x5, 0x4, 0xd, 0x1a}, {0x5, 0x1, 0x4, 0x9}, {0x4, 0x2, 0xe, 0x3}, {0x4, 0x3, 0xc}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0xc0, '\x00', r7, 0xffffffffffffffff, 0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0xfffffff6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)) 5.722377618s ago: executing program 4 (id=15576): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x0, 0x500}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) r5 = syz_clone(0x4020880, &(0x7f0000000500)="59e1776b8e709c8a34d18ff48af911d77995c1d490b6f26ca20d86ee4033ef04e392cbd3271e04ee907ce21e56c4991e516f3a41becb36144e25292730ea47253ec12bd066ece4643a001d0a711a593be40297ea76e548acea4a637fbfeae7", 0x5f, &(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000580)) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0xba, 0xfd, 0xce, 0x6, 0x0, 0x7, 0x80004, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x99410618, 0x2, @perf_config_ext={0x8f, 0x7f6}, 0x0, 0x4, 0x9, 0x9, 0x5a153293, 0x650, 0x8e4, 0x0, 0x4, 0x0, 0xa074}, r5, 0x5, r4, 0x9) 1.507179058s ago: executing program 0 (id=15572): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x0, 0x3, &(0x7f0000001400)=@framed, 0x0}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000000c0)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff014}, {0x6}]}) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20000014) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001411) close(r1) 1.506363368s ago: executing program 1 (id=15578): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) unlink(0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16}, 0x48) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r0}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r7}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 1.506172008s ago: executing program 2 (id=15574): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00'}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x1ac819, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x80) 1.430024024s ago: executing program 2 (id=15579): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000200000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x1200}) 1.429453854s ago: executing program 1 (id=15580): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x0, 0x5, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x41}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000280)='GPL\x00'}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7ffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) (fail_nth: 2) 1.209548622s ago: executing program 1 (id=15581): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000080000000015000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x400, 0x0, 0x8000, 0x2028, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001f40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r5}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/262, 0x106}], 0x1}, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r8}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='skb_copy_datagram_iovec\x00', r9}, 0x10) sendmsg(r7, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)='N', 0x1}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702", @ANYRES32=r11, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 1.171126095s ago: executing program 2 (id=15582): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18010000000020000000000000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000840)=ANY=[@ANYRESOCT=r5, @ANYRES32, @ANYRES8=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000880)=ANY=[], 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x420}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r6, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000bc0)='\\\x00') bpf$PROG_LOAD(0x5, &(0x7f0000001cc0)={0x16, 0xa, &(0x7f0000000500)=ANY=[@ANYRES16], &(0x7f0000000280)='GPL\x00', 0x8, 0x99, &(0x7f0000000680)=""/153, 0x41100, 0x19, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, &(0x7f0000000b00)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0xa, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, &(0x7f0000001c40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001c80)=[{0xfffffffc, 0x3, 0x8, 0xa}], 0x10, 0x3}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x17, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000c000000000000000300000018210000", @ANYRES32=r1, @ANYBLOB="00000000040000008510eaa9f11f990000f8ffffff950000000000002b974e0085200000040000001800000006000000050000004fa461990000000000000000", @ANYRES32, @ANYBLOB="000000000400000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000000000000850000008600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000000850000008600000085000000af0000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0x8d, &(0x7f0000000680)=""/141, 0x41100, 0x0, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0x4, 0x1, 0x81}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r2, r2, r0, r2, r0, r4, r4, r2], 0x0, 0x10, 0xd}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xf}, 0x108044}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.041837076s ago: executing program 1 (id=15583): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x10, &(0x7f0000000580)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000009500020095000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x1, 0xe3, 0xaa71, 0xc2, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5, 0xd}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{r2}, &(0x7f00000005c0), &(0x7f0000000600)='%pI4 \x00'}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f00000002c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xc3000, 0x2e, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000000fad413e550000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x3, 0x2, 0x85}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x802, r4}, 0x38) bpf$MAP_UPDATE_BATCH(0x1b, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x24, r4}, 0x38) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r5, &(0x7f0000000080), 0x11ffffce1) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x0, 0x4, 0x10005}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r6, 0x58}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000900)={r4, 0x58, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r3, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb2, &(0x7f0000000a00)=[{}, {}], 0x10, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0x74, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x10, 0x1f, &(0x7f0000000700)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xd065, 0x0, 0x0, 0x0, 0xe2ba}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@btf_id={0x18, 0x3, 0x3, 0x0, 0x5}, @exit, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @exit, @btf_id={0x18, 0x8, 0x3, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000800)='syzkaller\x00', 0x8, 0x13, &(0x7f0000000840)=""/19, 0x40f00, 0x26, '\x00', r7, 0x2b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r8, 0xffffffffffffffff, 0x4, 0x0, &(0x7f0000000c40)=[{0x5, 0x4, 0xd, 0x1a}, {0x5, 0x1, 0x4, 0x9}, {0x4, 0x2, 0xe, 0x3}, {0x4, 0x3, 0xc}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0xc0, '\x00', r7, 0xffffffffffffffff, 0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0xfffffff6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)) 938.754304ms ago: executing program 0 (id=15584): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x94}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)=@o_path={0x0}, 0x18) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x11, &(0x7f0000000300)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ldst={0x0, 0x1, 0x1, 0x9, 0x1, 0x80, 0x10}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xf}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x6}]}, 0x0, 0x20, 0x43, &(0x7f0000000400)=""/67, 0x40f00, 0x4, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000480)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x8, 0x0, 0x3f}, 0x10, 0x0, 0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000500)=[{0x4, 0x5, 0x0, 0xa}]}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xa, 0x17, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x15}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x2a}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 115.485701ms ago: executing program 1 (id=15585): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000940)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_ext_remove_space_done\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x2, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000088fe508a8500000004000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r2}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r3}, 0x10) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18.176339ms ago: executing program 0 (id=15586): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) socketpair(0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3c000000}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 4.32914ms ago: executing program 3 (id=15571): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x4, &(0x7f00000003c0)={{}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102036c00fe08000e40000200875a65969ff57b00000000000000000000000100ac1414aa"], 0xfdef) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) close(r7) 0s ago: executing program 0 (id=15587): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d00000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00'}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x30000000}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}, {0x95, 0x0, 0x50, 0x6000000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x2, 0x3, 0xa, 0x9, 0xfff0}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x2}, {0x3, 0x3, 0x6, 0xa, 0xa}, {0x7, 0x1, 0x2, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r4}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x3, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r5, &(0x7f0000000180)="bc9ba1f63a84f0565441f833d070542efb6c90278b64d0b1b1dadd04d11486c2e4bf6e3c3a17b8254c91fe269f45808a99331549a9b9f96f632ca5d8811c824f204e7d5ebff87f6d9f58c1dc39525ef41102419bfeb8470a2ad110b82fe9350753ed603a7275f23046451112ba16009c26d13d22acfbba44a3a9866c9477722d18"}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xd132}) kernel console output (not intermixed with test programs): e7/0x3a0 [ 963.242588][ T4207] ? ksys_read+0x77/0x2c0 [ 963.246751][ T4207] ksys_read+0x199/0x2c0 [ 963.250837][ T4207] ? vfs_write+0xe70/0xe70 [ 963.255529][ T4207] ? debug_smp_processor_id+0x17/0x20 [ 963.260726][ T4207] __x64_sys_read+0x7b/0x90 [ 963.265150][ T4207] do_syscall_64+0x34/0x70 [ 963.269490][ T4207] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 963.275301][ T4207] RIP: 0033:0x7f62c12886bc [ 963.279558][ T4207] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8c 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 1f 8d 02 00 48 [ 963.298994][ T4207] RSP: 002b:00007f62c050b040 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 963.307519][ T4207] RAX: ffffffffffffffda RBX: 00007f62c1417f60 RCX: 00007f62c12886bc [ 963.315330][ T4207] RDX: 000000000000000f RSI: 00007f62c050b0b0 RDI: 0000000000000003 [ 963.323229][ T4207] RBP: 00007f62c050b0a0 R08: 0000000000000000 R09: 0000000000000000 [ 963.331040][ T4207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 963.338851][ T4207] R13: 000000000000000b R14: 00007f62c1417f60 R15: 00007fff951ac2c8 [ 964.244195][ T4244] device syzkaller0 entered promiscuous mode [ 964.959985][ T4254] device syzkaller0 entered promiscuous mode [ 969.377307][ T4324] bridge0: port 1(bridge_slave_0) entered blocking state [ 969.409688][ T4324] bridge0: port 1(bridge_slave_0) entered disabled state [ 969.416910][ T4324] device bridge_slave_0 entered promiscuous mode [ 969.423943][ T4324] bridge0: port 2(bridge_slave_1) entered blocking state [ 969.597251][ T4324] bridge0: port 2(bridge_slave_1) entered disabled state [ 969.604499][ T4324] device bridge_slave_1 entered promiscuous mode [ 970.268289][ T4324] bridge0: port 2(bridge_slave_1) entered blocking state [ 970.275134][ T4324] bridge0: port 2(bridge_slave_1) entered forwarding state [ 970.282257][ T4324] bridge0: port 1(bridge_slave_0) entered blocking state [ 970.289038][ T4324] bridge0: port 1(bridge_slave_0) entered forwarding state [ 970.453575][T28237] bridge0: port 1(bridge_slave_0) entered disabled state [ 970.469659][T28237] bridge0: port 2(bridge_slave_1) entered disabled state [ 970.690062][T23551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 970.697305][T23551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 970.764135][T23551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 970.772483][T23551] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 970.796653][T23551] bridge0: port 1(bridge_slave_0) entered blocking state [ 970.803530][T23551] bridge0: port 1(bridge_slave_0) entered forwarding state [ 970.821632][T23551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 970.831925][T23551] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 970.840129][T23551] bridge0: port 2(bridge_slave_1) entered blocking state [ 970.846968][T23551] bridge0: port 2(bridge_slave_1) entered forwarding state [ 970.864656][T23551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 970.882922][T23551] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 970.894539][T23551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 970.902963][T23551] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 970.918651][T23546] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 970.927064][T23546] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 970.952193][ T4353] syz.3.13382[4353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 970.952247][ T4353] syz.3.13382[4353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 971.001216][ T4324] device veth0_vlan entered promiscuous mode [ 971.020713][T23548] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 971.028959][T23548] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 971.042405][ T4324] device veth1_macvtap entered promiscuous mode [ 971.049302][ T4353] syz.3.13382[4353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 971.049354][ T4353] syz.3.13382[4353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 971.152995][T23546] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 971.173743][ T4353] syz.3.13382[4353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 971.244048][T23546] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 971.299300][T23546] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 971.307323][T23546] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 971.315532][T23546] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 971.323228][T23546] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 971.331340][T23546] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 971.339536][T23546] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 971.347552][T23546] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 972.202856][ T4393] bridge0: port 2(bridge_slave_1) entered disabled state [ 972.209854][ T4393] bridge0: port 1(bridge_slave_0) entered disabled state [ 973.986808][ T4459] tun0: tun_chr_ioctl cmd 2147767517 [ 976.530487][ T4559] device syzkaller0 entered promiscuous mode [ 977.170391][ T4590] device veth0_vlan left promiscuous mode [ 977.178712][ T4590] device veth0_vlan entered promiscuous mode [ 977.196841][T23545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 977.205099][T23545] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 977.212531][T23545] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 978.385062][ T4638] FAULT_INJECTION: forcing a failure. [ 978.385062][ T4638] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 978.481440][ T4638] CPU: 1 PID: 4638 Comm: syz.3.13484 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 978.492616][ T4638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 978.502593][ T4638] Call Trace: [ 978.505729][ T4638] dump_stack_lvl+0x1e2/0x24b [ 978.510240][ T4638] ? bfq_pos_tree_add_move+0x43b/0x43b [ 978.515531][ T4638] ? __alloc_pages_nodemask+0x435/0xaf0 [ 978.520912][ T4638] dump_stack+0x15/0x17 [ 978.524903][ T4638] should_fail+0x3c6/0x510 [ 978.529159][ T4638] should_fail_usercopy+0x1a/0x20 [ 978.534020][ T4638] copy_page_from_iter+0x398/0x6e0 [ 978.538974][ T4638] pipe_write+0x92b/0x18c0 [ 978.543228][ T4638] ? pipe_read+0x1040/0x1040 [ 978.547644][ T4638] ? fsnotify_perm+0x67/0x4e0 [ 978.552158][ T4638] ? security_file_permission+0x7b/0xb0 [ 978.557543][ T4638] ? security_file_permission+0x86/0xb0 [ 978.562925][ T4638] ? iov_iter_init+0x3f/0x120 [ 978.567433][ T4638] vfs_write+0xb55/0xe70 [ 978.571513][ T4638] ? kernel_write+0x3d0/0x3d0 [ 978.576032][ T4638] ? __fdget_pos+0x209/0x3a0 [ 978.580447][ T4638] ? ksys_write+0x77/0x2c0 [ 978.584703][ T4638] ksys_write+0x199/0x2c0 [ 978.588872][ T4638] ? __ia32_sys_read+0x90/0x90 [ 978.593472][ T4638] ? debug_smp_processor_id+0x17/0x20 [ 978.598676][ T4638] __x64_sys_write+0x7b/0x90 [ 978.603103][ T4638] do_syscall_64+0x34/0x70 [ 978.607355][ T4638] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 978.613082][ T4638] RIP: 0033:0x7f932a3bfbd9 [ 978.617338][ T4638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 978.636804][ T4638] RSP: 002b:00007f9329641048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 978.645022][ T4638] RAX: ffffffffffffffda RBX: 00007f932a54df60 RCX: 00007f932a3bfbd9 [ 978.652831][ T4638] RDX: 00000000fffffdef RSI: 00000000200001c0 RDI: 0000000000000000 [ 978.660646][ T4638] RBP: 00007f93296410a0 R08: 0000000000000000 R09: 0000000000000000 [ 978.668454][ T4638] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 978.676264][ T4638] R13: 000000000000000b R14: 00007f932a54df60 R15: 00007ffd5d28adf8 [ 984.072823][ T4831] device syzkaller0 entered promiscuous mode [ 985.277423][ T4894] syz.3.13571[4894] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 985.277475][ T4894] syz.3.13571[4894] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 985.540319][ T4894] ªªªªªª: renamed from vlan0 [ 985.769025][ T4909] device veth1_macvtap left promiscuous mode [ 985.778417][ T4909] device macsec0 entered promiscuous mode [ 987.427257][ T4991] device pim6reg1 entered promiscuous mode [ 989.586448][ T5087] FAULT_INJECTION: forcing a failure. [ 989.586448][ T5087] name failslab, interval 1, probability 0, space 0, times 0 [ 989.790834][ T5087] CPU: 1 PID: 5087 Comm: syz.4.13638 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 989.802013][ T5087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 989.811988][ T5087] Call Trace: [ 989.815128][ T5087] dump_stack_lvl+0x1e2/0x24b [ 989.819630][ T5087] ? bfq_pos_tree_add_move+0x43b/0x43b [ 989.824922][ T5087] dump_stack+0x15/0x17 [ 989.828913][ T5087] should_fail+0x3c6/0x510 [ 989.833167][ T5087] ? selinux_perf_event_alloc+0x51/0x140 [ 989.838636][ T5087] __should_failslab+0xa4/0xe0 [ 989.843242][ T5087] should_failslab+0x9/0x20 [ 989.847577][ T5087] kmem_cache_alloc_trace+0x3a/0x2e0 [ 989.852703][ T5087] selinux_perf_event_alloc+0x51/0x140 [ 989.857990][ T5087] security_perf_event_alloc+0x62/0x90 [ 989.863457][ T5087] perf_event_alloc+0x15b6/0x1970 [ 989.868352][ T5087] __se_sys_perf_event_open+0x7ab/0x3c30 [ 989.873820][ T5087] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 989.879255][ T5087] ? __ia32_sys_read+0x90/0x90 [ 989.883853][ T5087] __x64_sys_perf_event_open+0xbf/0xd0 [ 989.889237][ T5087] do_syscall_64+0x34/0x70 [ 989.893576][ T5087] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 989.899309][ T5087] RIP: 0033:0x7f62c1289bd9 [ 989.903558][ T5087] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 989.922992][ T5087] RSP: 002b:00007f62c050b048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 989.931427][ T5087] RAX: ffffffffffffffda RBX: 00007f62c1417f60 RCX: 00007f62c1289bd9 [ 989.939341][ T5087] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000000 [ 989.947146][ T5087] RBP: 00007f62c050b0a0 R08: 0000000000000000 R09: 0000000000000000 [ 989.954959][ T5087] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 989.962776][ T5087] R13: 000000000000000b R14: 00007f62c1417f60 R15: 00007fff951ac2c8 [ 990.623897][ T5109] device syzkaller0 entered promiscuous mode [ 990.912569][ T5114] bridge0: port 1(bridge_slave_0) entered blocking state [ 990.919529][ T5114] bridge0: port 1(bridge_slave_0) entered disabled state [ 990.926647][ T5114] device bridge_slave_0 entered promiscuous mode [ 990.933675][ T5114] bridge0: port 2(bridge_slave_1) entered blocking state [ 990.941585][ T5114] bridge0: port 2(bridge_slave_1) entered disabled state [ 990.949345][ T5114] device bridge_slave_1 entered promiscuous mode [ 991.165785][ T4867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 991.173039][ T4867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 991.210004][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 991.235785][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 991.323655][ T674] bridge0: port 1(bridge_slave_0) entered blocking state [ 991.330530][ T674] bridge0: port 1(bridge_slave_0) entered forwarding state [ 991.466636][ T5137] tun0: tun_chr_ioctl cmd 1074025692 [ 991.493733][T28223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 991.515665][T28223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 991.591967][T28223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 991.663640][T28223] bridge0: port 2(bridge_slave_1) entered blocking state [ 991.670510][T28223] bridge0: port 2(bridge_slave_1) entered forwarding state [ 991.770481][ T5146] FAULT_INJECTION: forcing a failure. [ 991.770481][ T5146] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 991.783463][ T5146] CPU: 1 PID: 5146 Comm: syz.0.13659 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 991.794830][ T5146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 991.804716][ T5146] Call Trace: [ 991.807852][ T5146] dump_stack_lvl+0x1e2/0x24b [ 991.812362][ T5146] ? bfq_pos_tree_add_move+0x43b/0x43b [ 991.817653][ T5146] ? shmem_getpage_gfp+0x2230/0x2480 [ 991.822778][ T5146] dump_stack+0x15/0x17 [ 991.826768][ T5146] should_fail+0x3c6/0x510 [ 991.831019][ T5146] should_fail_usercopy+0x1a/0x20 [ 991.835878][ T5146] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 991.841781][ T5146] ? shmem_getpage+0xa0/0xa0 [ 991.846207][ T5146] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 991.851934][ T5146] ? memzero_page+0x100/0x100 [ 991.856457][ T5146] generic_perform_write+0x34c/0x570 [ 991.861576][ T5146] ? grab_cache_page_write_begin+0xa0/0xa0 [ 991.867210][ T5146] ? file_remove_privs+0x570/0x570 [ 991.872168][ T5146] ? __kasan_check_write+0x14/0x20 [ 991.877104][ T5146] __generic_file_write_iter+0x23c/0x560 [ 991.882570][ T5146] ? generic_write_checks+0x3b9/0x470 [ 991.887784][ T5146] generic_file_write_iter+0xaf/0x1c0 [ 991.892989][ T5146] vfs_write+0xb55/0xe70 [ 991.897066][ T5146] ? kernel_write+0x3d0/0x3d0 [ 991.901584][ T5146] ? mutex_trylock+0xa0/0xa0 [ 991.906006][ T5146] ? __fdget_pos+0x2e7/0x3a0 [ 991.910431][ T5146] ? ksys_write+0x77/0x2c0 [ 991.914684][ T5146] ksys_write+0x199/0x2c0 [ 991.918852][ T5146] ? __ia32_sys_read+0x90/0x90 [ 991.923469][ T5146] ? debug_smp_processor_id+0x17/0x20 [ 991.928665][ T5146] __x64_sys_write+0x7b/0x90 [ 991.933086][ T5146] do_syscall_64+0x34/0x70 [ 991.937432][ T5146] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 991.943155][ T5146] RIP: 0033:0x7f2f4eab4bd9 [ 991.947408][ T5146] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 991.966852][ T5146] RSP: 002b:00007f2f4dd36048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 991.975089][ T5146] RAX: ffffffffffffffda RBX: 00007f2f4ec42f60 RCX: 00007f2f4eab4bd9 [ 991.982907][ T5146] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000009 [ 991.990713][ T5146] RBP: 00007f2f4dd360a0 R08: 0000000000000000 R09: 0000000000000000 [ 991.998520][ T5146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 992.006342][ T5146] R13: 000000000000000b R14: 00007f2f4ec42f60 R15: 00007fffe6f81788 [ 992.028704][T28237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 992.077074][T28237] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 992.085098][T28237] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 992.098461][ T5114] device veth0_vlan entered promiscuous mode [ 992.267814][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 992.283136][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 992.309204][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 992.331790][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 992.361574][ T5114] device veth1_macvtap entered promiscuous mode [ 992.488192][T28237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 992.500649][T28237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 992.525921][T28237] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 992.668645][T28220] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 992.678908][T28220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 992.687058][T28220] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 992.695537][T28220] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 994.683526][ T1786] device bridge_slave_1 left promiscuous mode [ 994.707569][ T1786] bridge0: port 2(bridge_slave_1) entered disabled state [ 994.805998][ T1786] device bridge_slave_0 left promiscuous mode [ 994.819434][ T1786] bridge0: port 1(bridge_slave_0) entered disabled state [ 994.873406][ T1786] device veth1_macvtap left promiscuous mode [ 994.882543][ T1786] device veth0_vlan left promiscuous mode [ 995.905373][ T5351] syz.1.13714[5351] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 995.905425][ T5351] syz.1.13714[5351] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 996.897709][ T5393] device veth0_vlan left promiscuous mode [ 996.999419][ T5393] device veth0_vlan entered promiscuous mode [ 998.185474][ T5453] device syzkaller0 entered promiscuous mode [ 1000.989480][ T5563] device syzkaller0 entered promiscuous mode [ 1001.374173][ T5608] FAULT_INJECTION: forcing a failure. [ 1001.374173][ T5608] name failslab, interval 1, probability 0, space 0, times 0 [ 1001.386882][ T5608] CPU: 1 PID: 5608 Comm: syz.2.13815 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 1001.398045][ T5608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1001.408033][ T5608] Call Trace: [ 1001.411164][ T5608] dump_stack_lvl+0x1e2/0x24b [ 1001.415857][ T5608] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1001.421135][ T5608] dump_stack+0x15/0x17 [ 1001.425123][ T5608] should_fail+0x3c6/0x510 [ 1001.429396][ T5608] ? __d_alloc+0x2d/0x6c0 [ 1001.433550][ T5608] __should_failslab+0xa4/0xe0 [ 1001.438179][ T5608] should_failslab+0x9/0x20 [ 1001.442479][ T5608] kmem_cache_alloc+0x3d/0x2e0 [ 1001.447079][ T5608] __d_alloc+0x2d/0x6c0 [ 1001.451071][ T5608] ? _raw_spin_lock+0x1b0/0x1b0 [ 1001.455845][ T5608] d_alloc_pseudo+0x1d/0x70 [ 1001.460271][ T5608] alloc_file_pseudo+0x131/0x2f0 [ 1001.465129][ T5608] ? alloc_empty_file_noaccount+0x80/0x80 [ 1001.470686][ T5608] ? perf_event_alloc+0x15f8/0x1970 [ 1001.475729][ T5608] anon_inode_getfile+0xa7/0x180 [ 1001.480495][ T5608] __se_sys_perf_event_open+0xfe4/0x3c30 [ 1001.485986][ T5608] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 1001.491433][ T5608] ? __ia32_sys_read+0x90/0x90 [ 1001.496033][ T5608] __x64_sys_perf_event_open+0xbf/0xd0 [ 1001.501323][ T5608] do_syscall_64+0x34/0x70 [ 1001.505575][ T5608] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1001.511301][ T5608] RIP: 0033:0x7fb73de84bd9 [ 1001.515557][ T5608] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1001.534996][ T5608] RSP: 002b:00007fb73d106048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1001.543240][ T5608] RAX: ffffffffffffffda RBX: 00007fb73e012f60 RCX: 00007fb73de84bd9 [ 1001.551138][ T5608] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000000 [ 1001.559036][ T5608] RBP: 00007fb73d1060a0 R08: 0000000000000000 R09: 0000000000000000 [ 1001.566848][ T5608] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1001.574659][ T5608] R13: 000000000000000b R14: 00007fb73e012f60 R15: 00007ffc4db7c6e8 [ 1002.878326][ T5658] FAULT_INJECTION: forcing a failure. [ 1002.878326][ T5658] name failslab, interval 1, probability 0, space 0, times 0 [ 1002.896672][ T5658] CPU: 1 PID: 5658 Comm: syz.2.13836 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 1002.907937][ T5658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1002.917831][ T5658] Call Trace: [ 1002.920960][ T5658] dump_stack_lvl+0x1e2/0x24b [ 1002.925466][ T5658] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1002.930908][ T5658] ? kstrtouint_from_user+0x20a/0x2a0 [ 1002.936107][ T5658] ? avc_has_perm+0x14d/0x400 [ 1002.940624][ T5658] dump_stack+0x15/0x17 [ 1002.944605][ T5658] should_fail+0x3c6/0x510 [ 1002.948859][ T5658] ? tipc_group_create+0x9c/0x660 [ 1002.953720][ T5658] __should_failslab+0xa4/0xe0 [ 1002.958321][ T5658] should_failslab+0x9/0x20 [ 1002.962659][ T5658] kmem_cache_alloc_trace+0x3a/0x2e0 [ 1002.967779][ T5658] tipc_group_create+0x9c/0x660 [ 1002.972465][ T5658] tipc_sk_join+0x163/0x8c0 [ 1002.976805][ T5658] ? _copy_from_user+0x96/0xd0 [ 1002.981411][ T5658] tipc_setsockopt+0x794/0xb80 [ 1002.986003][ T5658] ? tipc_shutdown+0x950/0x950 [ 1002.990606][ T5658] ? security_socket_setsockopt+0x82/0xb0 [ 1002.996154][ T5658] ? tipc_shutdown+0x950/0x950 [ 1003.000757][ T5658] __sys_setsockopt+0x502/0x870 [ 1003.005464][ T5658] ? __ia32_sys_recv+0xb0/0xb0 [ 1003.010052][ T5658] __x64_sys_setsockopt+0xbf/0xd0 [ 1003.014910][ T5658] do_syscall_64+0x34/0x70 [ 1003.019162][ T5658] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1003.024889][ T5658] RIP: 0033:0x7fb73de84bd9 [ 1003.029149][ T5658] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1003.048667][ T5658] RSP: 002b:00007fb73d106048 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1003.056914][ T5658] RAX: ffffffffffffffda RBX: 00007fb73e012f60 RCX: 00007fb73de84bd9 [ 1003.064719][ T5658] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000007 [ 1003.072629][ T5658] RBP: 00007fb73d1060a0 R08: 0000000000000127 R09: 0000000000000000 [ 1003.080430][ T5658] R10: 0000000020000180 R11: 0000000000000246 R12: 0000000000000001 [ 1003.088247][ T5658] R13: 000000000000000b R14: 00007fb73e012f60 R15: 00007ffc4db7c6e8 [ 1003.143765][ T5664] device syzkaller0 entered promiscuous mode [ 1003.156036][ T5668] syz.0.13841[5668] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1003.156083][ T5668] syz.0.13841[5668] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1004.271257][ T5722] device pim6reg1 entered promiscuous mode [ 1010.208082][ T5875] device pim6reg1 entered promiscuous mode [ 1010.942937][ T5914] device pim6reg1 entered promiscuous mode [ 1011.451180][ T5935] syz.0.13928[5935] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1011.451230][ T5935] syz.0.13928[5935] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1011.733444][ T5951] device pim6reg1 entered promiscuous mode [ 1011.920352][ T5962] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1012.218368][ T5973] syz.0.13943[5973] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1012.218458][ T5973] syz.0.13943[5973] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1013.783791][ T6047] device pim6reg1 entered promiscuous mode [ 1014.196830][ T6060] syz.2.13976[6060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1014.196882][ T6060] syz.2.13976[6060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1014.500949][ T6067] FAULT_INJECTION: forcing a failure. [ 1014.500949][ T6067] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1014.677630][ T6067] CPU: 0 PID: 6067 Comm: syz.2.13977 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 1014.688808][ T6067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1014.698695][ T6067] Call Trace: [ 1014.701830][ T6067] dump_stack_lvl+0x1e2/0x24b [ 1014.706445][ T6067] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1014.711723][ T6067] dump_stack+0x15/0x17 [ 1014.715714][ T6067] should_fail+0x3c6/0x510 [ 1014.719967][ T6067] should_fail_alloc_page+0x52/0x60 [ 1014.725015][ T6067] __alloc_pages_nodemask+0x1b3/0xaf0 [ 1014.730211][ T6067] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 1014.735590][ T6067] ? find_next_bit+0x7f/0x100 [ 1014.740131][ T6067] probe_event_enable+0x6eb/0xbe0 [ 1014.744958][ T6067] ? __uprobe_trace_func+0x750/0x750 [ 1014.750080][ T6067] trace_uprobe_register+0x90/0x590 [ 1014.755112][ T6067] perf_trace_event_init+0x4a0/0x950 [ 1014.760235][ T6067] perf_uprobe_init+0x132/0x1a0 [ 1014.764921][ T6067] perf_uprobe_event_init+0x106/0x190 [ 1014.770229][ T6067] perf_try_init_event+0x143/0x410 [ 1014.775168][ T6067] perf_event_alloc+0xcf5/0x1970 [ 1014.779946][ T6067] __se_sys_perf_event_open+0x7ab/0x3c30 [ 1014.785412][ T6067] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 1014.790876][ T6067] ? __ia32_sys_read+0x90/0x90 [ 1014.795472][ T6067] __x64_sys_perf_event_open+0xbf/0xd0 [ 1014.800765][ T6067] do_syscall_64+0x34/0x70 [ 1014.805015][ T6067] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1014.810752][ T6067] RIP: 0033:0x7fb73de84bd9 [ 1014.814997][ T6067] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1014.834623][ T6067] RSP: 002b:00007fb73d106048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1014.842944][ T6067] RAX: ffffffffffffffda RBX: 00007fb73e012f60 RCX: 00007fb73de84bd9 [ 1014.850758][ T6067] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000000 [ 1014.858750][ T6067] RBP: 00007fb73d1060a0 R08: 0000000000000000 R09: 0000000000000000 [ 1014.866549][ T6067] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1014.874370][ T6067] R13: 000000000000000b R14: 00007fb73e012f60 R15: 00007ffc4db7c6e8 [ 1016.756753][ T6173] FAULT_INJECTION: forcing a failure. [ 1016.756753][ T6173] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1016.770180][ T6173] CPU: 0 PID: 6173 Comm: syz.0.14016 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 1016.781572][ T6173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1016.791461][ T6173] Call Trace: [ 1016.794598][ T6173] dump_stack_lvl+0x1e2/0x24b [ 1016.799112][ T6173] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1016.804402][ T6173] ? shmem_getpage_gfp+0x2230/0x2480 [ 1016.809528][ T6173] dump_stack+0x15/0x17 [ 1016.813514][ T6173] should_fail+0x3c6/0x510 [ 1016.817765][ T6173] should_fail_usercopy+0x1a/0x20 [ 1016.822633][ T6173] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 1016.828706][ T6173] ? shmem_getpage+0xa0/0xa0 [ 1016.833128][ T6173] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 1016.838857][ T6173] ? memzero_page+0x100/0x100 [ 1016.843379][ T6173] generic_perform_write+0x34c/0x570 [ 1016.848497][ T6173] ? grab_cache_page_write_begin+0xa0/0xa0 [ 1016.854131][ T6173] ? file_remove_privs+0x570/0x570 [ 1016.859085][ T6173] ? __kasan_check_write+0x14/0x20 [ 1016.864028][ T6173] __generic_file_write_iter+0x23c/0x560 [ 1016.869581][ T6173] ? generic_write_checks+0x3b9/0x470 [ 1016.874796][ T6173] generic_file_write_iter+0xaf/0x1c0 [ 1016.880080][ T6173] vfs_write+0xb55/0xe70 [ 1016.884345][ T6173] ? kernel_write+0x3d0/0x3d0 [ 1016.888857][ T6173] ? mutex_trylock+0xa0/0xa0 [ 1016.893285][ T6173] ? __fdget_pos+0x2e7/0x3a0 [ 1016.897710][ T6173] ? ksys_write+0x77/0x2c0 [ 1016.901994][ T6173] ksys_write+0x199/0x2c0 [ 1016.906134][ T6173] ? __ia32_sys_read+0x90/0x90 [ 1016.910731][ T6173] ? debug_smp_processor_id+0x17/0x20 [ 1016.915942][ T6173] __x64_sys_write+0x7b/0x90 [ 1016.920365][ T6173] do_syscall_64+0x34/0x70 [ 1016.924619][ T6173] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1016.930343][ T6173] RIP: 0033:0x7f2f4eab4bd9 [ 1016.934594][ T6173] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1016.954465][ T6173] RSP: 002b:00007f2f4dd36048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1016.962715][ T6173] RAX: ffffffffffffffda RBX: 00007f2f4ec42f60 RCX: 00007f2f4eab4bd9 [ 1016.970517][ T6173] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000009 [ 1016.978326][ T6173] RBP: 00007f2f4dd360a0 R08: 0000000000000000 R09: 0000000000000000 [ 1016.986222][ T6173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1016.994127][ T6173] R13: 000000000000000b R14: 00007f2f4ec42f60 R15: 00007fffe6f81788 [ 1017.724835][ T6212] FAULT_INJECTION: forcing a failure. [ 1017.724835][ T6212] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1017.744978][ T6212] CPU: 1 PID: 6212 Comm: syz.0.14029 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 1017.756243][ T6212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1017.766131][ T6212] Call Trace: [ 1017.769272][ T6212] dump_stack_lvl+0x1e2/0x24b [ 1017.773771][ T6212] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1017.779066][ T6212] ? __irq_exit_rcu+0x40/0x150 [ 1017.783746][ T6212] dump_stack+0x15/0x17 [ 1017.787741][ T6212] should_fail+0x3c6/0x510 [ 1017.791997][ T6212] should_fail_usercopy+0x1a/0x20 [ 1017.796853][ T6212] strncpy_from_user+0x24/0x2d0 [ 1017.801547][ T6212] __se_sys_bpf+0x1389/0x11cb0 [ 1017.806141][ T6212] ? kvm_sched_clock_read+0x18/0x40 [ 1017.811178][ T6212] ? perf_event_output_forward+0x14e/0x1b0 [ 1017.816816][ T6212] ? perf_prepare_sample+0x1af0/0x1af0 [ 1017.822117][ T6212] ? sched_clock+0x3a/0x40 [ 1017.826364][ T6212] ? sched_clock_cpu+0x1b/0x3b0 [ 1017.831050][ T6212] ? __x64_sys_bpf+0x90/0x90 [ 1017.835475][ T6212] ? __this_cpu_preempt_check+0x13/0x20 [ 1017.840859][ T6212] ? __perf_event_account_interrupt+0x18f/0x2c0 [ 1017.847047][ T6212] ? hrtimer_forward+0x1a6/0x2c0 [ 1017.851800][ T6212] ? cpu_clock_event_read+0x50/0x50 [ 1017.856830][ T6212] ? timerqueue_add+0x24c/0x270 [ 1017.861517][ T6212] ? enqueue_hrtimer+0xad/0x200 [ 1017.866199][ T6212] ? __hrtimer_run_queues+0x438/0xa50 [ 1017.871407][ T6212] ? __hrtimer_run_queues+0x9ea/0xa50 [ 1017.876617][ T6212] ? ktime_get+0x10e/0x140 [ 1017.880870][ T6212] ? lapic_next_event+0x5f/0x70 [ 1017.885555][ T6212] ? clockevents_program_event+0x214/0x2c0 [ 1017.891198][ T6212] ? hrtimer_interrupt+0x6a8/0x8b0 [ 1017.896149][ T6212] ? debug_smp_processor_id+0x17/0x20 [ 1017.901354][ T6212] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1017.907286][ T6212] __x64_sys_bpf+0x7b/0x90 [ 1017.911508][ T6212] do_syscall_64+0x34/0x70 [ 1017.915762][ T6212] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1017.921489][ T6212] RIP: 0033:0x7f2f4eab4bd9 [ 1017.925832][ T6212] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1017.945354][ T6212] RSP: 002b:00007f2f4dd36048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1017.953601][ T6212] RAX: ffffffffffffffda RBX: 00007f2f4ec42f60 RCX: 00007f2f4eab4bd9 [ 1017.961406][ T6212] RDX: 0000000000000048 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1017.969228][ T6212] RBP: 00007f2f4dd360a0 R08: 0000000000000000 R09: 0000000000000000 [ 1017.977045][ T6212] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1017.984854][ T6212] R13: 000000000000000b R14: 00007f2f4ec42f60 R15: 00007fffe6f81788 [ 1019.302589][ T6245] device pim6reg1 entered promiscuous mode [ 1020.580256][ T6265] device pim6reg1 entered promiscuous mode [ 1020.880645][ T6274] €Â: renamed from veth0_vlan [ 1021.599668][ T6295] device pim6reg1 entered promiscuous mode [ 1023.158268][ T6339] device pim6reg1 entered promiscuous mode [ 1024.002222][ T6377] device pim6reg1 entered promiscuous mode [ 1027.568280][ T6565] FAULT_INJECTION: forcing a failure. [ 1027.568280][ T6565] name failslab, interval 1, probability 0, space 0, times 0 [ 1027.603807][ T6565] CPU: 1 PID: 6565 Comm: syz.2.14160 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 1027.615004][ T6565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1027.624881][ T6565] Call Trace: [ 1027.628021][ T6565] dump_stack_lvl+0x1e2/0x24b [ 1027.632528][ T6565] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1027.637821][ T6565] dump_stack+0x15/0x17 [ 1027.641812][ T6565] should_fail+0x3c6/0x510 [ 1027.646154][ T6565] ? security_file_alloc+0x29/0x120 [ 1027.651188][ T6565] __should_failslab+0xa4/0xe0 [ 1027.655788][ T6565] should_failslab+0x9/0x20 [ 1027.660123][ T6565] kmem_cache_alloc+0x3d/0x2e0 [ 1027.664735][ T6565] ? __alloc_file+0x29/0x330 [ 1027.669152][ T6565] security_file_alloc+0x29/0x120 [ 1027.674015][ T6565] __alloc_file+0xbf/0x330 [ 1027.678263][ T6565] alloc_empty_file+0x95/0x180 [ 1027.682864][ T6565] alloc_file+0x5a/0x4e0 [ 1027.686938][ T6565] alloc_file_pseudo+0x259/0x2f0 [ 1027.691712][ T6565] ? alloc_empty_file_noaccount+0x80/0x80 [ 1027.697393][ T6565] ? perf_event_alloc+0x15f8/0x1970 [ 1027.702422][ T6565] anon_inode_getfile+0xa7/0x180 [ 1027.707191][ T6565] __se_sys_perf_event_open+0xfe4/0x3c30 [ 1027.712659][ T6565] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 1027.718122][ T6565] ? __ia32_sys_read+0x90/0x90 [ 1027.722723][ T6565] __x64_sys_perf_event_open+0xbf/0xd0 [ 1027.728016][ T6565] do_syscall_64+0x34/0x70 [ 1027.732271][ T6565] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1027.737994][ T6565] RIP: 0033:0x7fb73de84bd9 [ 1027.742247][ T6565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1027.761790][ T6565] RSP: 002b:00007fb73d106048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1027.770193][ T6565] RAX: ffffffffffffffda RBX: 00007fb73e012f60 RCX: 00007fb73de84bd9 [ 1027.778090][ T6565] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000000 [ 1027.785924][ T6565] RBP: 00007fb73d1060a0 R08: 0000000000000000 R09: 0000000000000000 [ 1027.794162][ T6565] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1027.805127][ T6565] R13: 000000000000000b R14: 00007fb73e012f60 R15: 00007ffc4db7c6e8 [ 1029.663255][ T6665] FAULT_INJECTION: forcing a failure. [ 1029.663255][ T6665] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1029.726933][ T6665] CPU: 1 PID: 6665 Comm: syz.4.14197 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 1029.738117][ T6665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1029.748010][ T6665] Call Trace: [ 1029.751141][ T6665] dump_stack_lvl+0x1e2/0x24b [ 1029.755740][ T6665] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1029.761031][ T6665] dump_stack+0x15/0x17 [ 1029.765021][ T6665] should_fail+0x3c6/0x510 [ 1029.769282][ T6665] should_fail_alloc_page+0x52/0x60 [ 1029.774311][ T6665] __alloc_pages_nodemask+0x1b3/0xaf0 [ 1029.779527][ T6665] ? do_syscall_64+0x34/0x70 [ 1029.783943][ T6665] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1029.789849][ T6665] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 1029.795229][ T6665] ? avc_has_perm_noaudit+0x117/0x240 [ 1029.800436][ T6665] shmem_alloc_page+0x257/0x420 [ 1029.805853][ T6665] ? put_page+0xd0/0xd0 [ 1029.809831][ T6665] ? slab_post_alloc_hook+0x61/0x2f0 [ 1029.814958][ T6665] ? percpu_counter_add_batch+0x13d/0x160 [ 1029.820522][ T6665] shmem_alloc_and_acct_page+0x395/0x8e0 [ 1029.825983][ T6665] ? shmem_swapin_page+0x1950/0x1950 [ 1029.831100][ T6665] ? find_get_entry+0x44c/0x4c0 [ 1029.835782][ T6665] ? page_cache_prev_miss+0x410/0x410 [ 1029.841005][ T6665] ? down_read_trylock+0x179/0x1d0 [ 1029.845941][ T6665] ? find_lock_entry+0x1df/0x200 [ 1029.850712][ T6665] shmem_getpage_gfp+0x891/0x2480 [ 1029.855580][ T6665] ? __kasan_check_write+0x14/0x20 [ 1029.860616][ T6665] ? shmem_getpage+0xa0/0xa0 [ 1029.865035][ T6665] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 1029.870775][ T6665] shmem_write_begin+0xca/0x1b0 [ 1029.875459][ T6665] generic_perform_write+0x2cd/0x570 [ 1029.880749][ T6665] ? grab_cache_page_write_begin+0xa0/0xa0 [ 1029.886470][ T6665] ? file_remove_privs+0x570/0x570 [ 1029.891414][ T6665] ? __kasan_check_write+0x14/0x20 [ 1029.896374][ T6665] __generic_file_write_iter+0x23c/0x560 [ 1029.901920][ T6665] ? generic_write_checks+0x3b9/0x470 [ 1029.907127][ T6665] generic_file_write_iter+0xaf/0x1c0 [ 1029.912332][ T6665] vfs_write+0xb55/0xe70 [ 1029.916410][ T6665] ? kernel_write+0x3d0/0x3d0 [ 1029.920923][ T6665] ? mutex_trylock+0xa0/0xa0 [ 1029.925350][ T6665] ? __fdget_pos+0x2e7/0x3a0 [ 1029.929867][ T6665] ? ksys_write+0x77/0x2c0 [ 1029.934126][ T6665] ksys_write+0x199/0x2c0 [ 1029.938289][ T6665] ? __ia32_sys_read+0x90/0x90 [ 1029.942886][ T6665] ? debug_smp_processor_id+0x17/0x20 [ 1029.948179][ T6665] __x64_sys_write+0x7b/0x90 [ 1029.952777][ T6665] do_syscall_64+0x34/0x70 [ 1029.957027][ T6665] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1029.962752][ T6665] RIP: 0033:0x7f62c1289bd9 [ 1029.967018][ T6665] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1029.987985][ T6665] RSP: 002b:00007f62c050b048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1029.996218][ T6665] RAX: ffffffffffffffda RBX: 00007f62c1417f60 RCX: 00007f62c1289bd9 [ 1030.004128][ T6665] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000009 [ 1030.011929][ T6665] RBP: 00007f62c050b0a0 R08: 0000000000000000 R09: 0000000000000000 [ 1030.019741][ T6665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1030.027551][ T6665] R13: 000000000000000b R14: 00007f62c1417f60 R15: 00007fff951ac2c8 [ 1030.585981][ T6687] FAULT_INJECTION: forcing a failure. [ 1030.585981][ T6687] name failslab, interval 1, probability 0, space 0, times 0 [ 1030.739991][ T6687] CPU: 1 PID: 6687 Comm: syz.1.14204 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 1030.751172][ T6687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1030.761146][ T6687] Call Trace: [ 1030.764283][ T6687] dump_stack_lvl+0x1e2/0x24b [ 1030.769266][ T6687] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1030.774528][ T6687] dump_stack+0x15/0x17 [ 1030.778525][ T6687] should_fail+0x3c6/0x510 [ 1030.782888][ T6687] ? selinux_perf_event_alloc+0x51/0x140 [ 1030.788342][ T6687] __should_failslab+0xa4/0xe0 [ 1030.793026][ T6687] should_failslab+0x9/0x20 [ 1030.797365][ T6687] kmem_cache_alloc_trace+0x3a/0x2e0 [ 1030.802501][ T6687] selinux_perf_event_alloc+0x51/0x140 [ 1030.807794][ T6687] security_perf_event_alloc+0x62/0x90 [ 1030.813077][ T6687] perf_event_alloc+0x15b6/0x1970 [ 1030.817946][ T6687] __se_sys_perf_event_open+0x7ab/0x3c30 [ 1030.823414][ T6687] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 1030.828893][ T6687] ? __ia32_sys_read+0x90/0x90 [ 1030.833478][ T6687] __x64_sys_perf_event_open+0xbf/0xd0 [ 1030.838770][ T6687] do_syscall_64+0x34/0x70 [ 1030.843014][ T6687] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1030.848739][ T6687] RIP: 0033:0x7f438952dbd9 [ 1030.852994][ T6687] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1030.872522][ T6687] RSP: 002b:00007f43887af048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1030.880765][ T6687] RAX: ffffffffffffffda RBX: 00007f43896bbf60 RCX: 00007f438952dbd9 [ 1030.888578][ T6687] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000000 [ 1030.896402][ T6687] RBP: 00007f43887af0a0 R08: 0000000000000000 R09: 0000000000000000 [ 1030.904204][ T6687] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1030.912013][ T6687] R13: 000000000000000b R14: 00007f43896bbf60 R15: 00007ffcea20e128 [ 1031.933653][ T6749] syzkaller0: refused to change device tx_queue_len [ 1032.021598][ T6757] syz.3.14228[6757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1032.064196][ T6757] syz.3.14228[6757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1035.376122][ T6890] syz.3.14271[6890] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1035.463132][ T6890] syz.3.14271[6890] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1038.021832][ T7009] device macsec0 entered promiscuous mode [ 1038.079239][ T7007] device pim6reg1 entered promiscuous mode [ 1038.844780][ T7048] device pim6reg1 entered promiscuous mode [ 1039.559567][ T7086] device pim6reg1 entered promiscuous mode [ 1039.573986][ T7092] geneve1: tun_chr_ioctl cmd 2147767521 [ 1040.202998][ T7135] FAULT_INJECTION: forcing a failure. [ 1040.202998][ T7135] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1040.215969][ T7135] CPU: 1 PID: 7135 Comm: syz.2.14357 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 1040.227310][ T7135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1040.237195][ T7135] Call Trace: [ 1040.240334][ T7135] dump_stack_lvl+0x1e2/0x24b [ 1040.244862][ T7135] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1040.250218][ T7135] ? ktime_get+0x10e/0x140 [ 1040.254470][ T7135] dump_stack+0x15/0x17 [ 1040.258461][ T7135] should_fail+0x3c6/0x510 [ 1040.263244][ T7135] should_fail_usercopy+0x1a/0x20 [ 1040.268103][ T7135] _copy_to_user+0x20/0x90 [ 1040.272352][ T7135] bpf_test_finish+0x235/0x5a0 [ 1040.276975][ T7135] ? convert___skb_to_skb+0x570/0x570 [ 1040.282162][ T7135] ? convert_skb_to___skb+0x360/0x360 [ 1040.287370][ T7135] ? convert_skb_to___skb+0x208/0x360 [ 1040.292574][ T7135] bpf_prog_test_run_skb+0xd7a/0x1410 [ 1040.297784][ T7135] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 1040.303505][ T7135] ? __kasan_check_write+0x14/0x20 [ 1040.308457][ T7135] ? fput_many+0x160/0x1b0 [ 1040.312713][ T7135] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 1040.318442][ T7135] __se_sys_bpf+0x5235/0x11cb0 [ 1040.323039][ T7135] ? stack_trace_save+0x113/0x1c0 [ 1040.327901][ T7135] ? terminate_walk+0x407/0x4f0 [ 1040.332582][ T7135] ? stack_trace_snprint+0xf0/0xf0 [ 1040.337541][ T7135] ? kmem_cache_free+0xa9/0x1e0 [ 1040.342225][ T7135] ? kmem_cache_free+0xa9/0x1e0 [ 1040.346909][ T7135] ? kasan_set_track+0x5d/0x70 [ 1040.351503][ T7135] ? kasan_set_track+0x4b/0x70 [ 1040.356197][ T7135] ? kasan_set_free_info+0x23/0x40 [ 1040.361240][ T7135] ? ____kasan_slab_free+0x121/0x160 [ 1040.366347][ T7135] ? __kasan_slab_free+0x11/0x20 [ 1040.371127][ T7135] ? __x64_sys_bpf+0x90/0x90 [ 1040.372940][ T7130] device pim6reg1 entered promiscuous mode [ 1040.375558][ T7135] ? do_sys_openat2+0x5e1/0x6f0 [ 1040.375567][ T7135] ? __x64_sys_openat+0x243/0x290 [ 1040.375576][ T7135] ? do_syscall_64+0x34/0x70 [ 1040.375593][ T7135] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1040.375604][ T7135] ? _kstrtoull+0x3a0/0x4a0 [ 1040.375615][ T7135] ? kstrtouint_from_user+0x20a/0x2a0 [ 1040.375625][ T7135] ? kstrtol_from_user+0x310/0x310 [ 1040.375637][ T7135] ? memset+0x35/0x40 [ 1040.375647][ T7135] ? __fsnotify_parent+0x4b9/0x6c0 [ 1040.375659][ T7135] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 1040.375668][ T7135] ? proc_fail_nth_write+0x20b/0x290 [ 1040.375677][ T7135] ? proc_fail_nth_read+0x210/0x210 [ 1040.375697][ T7135] ? security_file_permission+0x86/0xb0 [ 1040.375715][ T7135] ? rw_verify_area+0x1c3/0x360 [ 1040.451451][ T7135] ? preempt_count_add+0x92/0x1a0 [ 1040.456310][ T7135] ? vfs_write+0x854/0xe70 [ 1040.460568][ T7135] ? kernel_write+0x3d0/0x3d0 [ 1040.465070][ T7135] ? __kasan_check_write+0x14/0x20 [ 1040.470017][ T7135] ? mutex_lock+0xa5/0x110 [ 1040.474271][ T7135] ? mutex_trylock+0xa0/0xa0 [ 1040.478699][ T7135] ? __kasan_check_write+0x14/0x20 [ 1040.483641][ T7135] ? fput_many+0x160/0x1b0 [ 1040.487898][ T7135] ? debug_smp_processor_id+0x17/0x20 [ 1040.493100][ T7135] __x64_sys_bpf+0x7b/0x90 [ 1040.497355][ T7135] do_syscall_64+0x34/0x70 [ 1040.501609][ T7135] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1040.507424][ T7135] RIP: 0033:0x7fb73de84bd9 [ 1040.511760][ T7135] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1040.531204][ T7135] RSP: 002b:00007fb73d106048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1040.539537][ T7135] RAX: ffffffffffffffda RBX: 00007fb73e012f60 RCX: 00007fb73de84bd9 [ 1040.547346][ T7135] RDX: 0000000000000050 RSI: 0000000020000100 RDI: 000000000000000a [ 1040.555155][ T7135] RBP: 00007fb73d1060a0 R08: 0000000000000000 R09: 0000000000000000 [ 1040.562969][ T7135] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1040.571021][ T7135] R13: 000000000000000b R14: 00007fb73e012f60 R15: 00007ffc4db7c6e8 [ 1041.651408][ T7174] device pim6reg1 entered promiscuous mode [ 1041.961416][ T7188] device syzkaller0 entered promiscuous mode [ 1042.577087][ T7226] device pim6reg1 entered promiscuous mode [ 1042.895445][ T7232] device syzkaller0 entered promiscuous mode [ 1043.518071][ T7256] FAULT_INJECTION: forcing a failure. [ 1043.518071][ T7256] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1043.531251][ T7256] CPU: 0 PID: 7256 Comm: syz.3.14402 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 1043.542513][ T7256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1043.552622][ T7256] Call Trace: [ 1043.555762][ T7256] dump_stack_lvl+0x1e2/0x24b [ 1043.560268][ T7256] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1043.565564][ T7256] ? down_read_trylock+0x179/0x1d0 [ 1043.570506][ T7256] ? __init_rwsem+0x1c0/0x1c0 [ 1043.575020][ T7256] dump_stack+0x15/0x17 [ 1043.579010][ T7256] should_fail+0x3c6/0x510 [ 1043.583271][ T7256] should_fail_alloc_page+0x52/0x60 [ 1043.588297][ T7256] __alloc_pages_nodemask+0x1b3/0xaf0 [ 1043.593509][ T7256] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 1043.598888][ T7256] ? copy_user_enhanced_fast_string+0xe/0x40 [ 1043.604911][ T7256] pipe_write+0x551/0x18c0 [ 1043.609171][ T7256] ? pipe_read+0x1040/0x1040 [ 1043.613585][ T7256] ? fsnotify_perm+0x67/0x4e0 [ 1043.618099][ T7256] ? security_file_permission+0x7b/0xb0 [ 1043.623481][ T7256] ? security_file_permission+0x86/0xb0 [ 1043.628864][ T7256] ? iov_iter_init+0x3f/0x120 [ 1043.633374][ T7256] vfs_write+0xb55/0xe70 [ 1043.637454][ T7256] ? kernel_write+0x3d0/0x3d0 [ 1043.641970][ T7256] ? __fdget_pos+0x209/0x3a0 [ 1043.646401][ T7256] ? ksys_write+0x77/0x2c0 [ 1043.650645][ T7256] ksys_write+0x199/0x2c0 [ 1043.654812][ T7256] ? __ia32_sys_read+0x90/0x90 [ 1043.659414][ T7256] ? debug_smp_processor_id+0x17/0x20 [ 1043.664619][ T7256] __x64_sys_write+0x7b/0x90 [ 1043.669043][ T7256] do_syscall_64+0x34/0x70 [ 1043.673298][ T7256] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1043.679026][ T7256] RIP: 0033:0x7f932a3bfbd9 [ 1043.683362][ T7256] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1043.702805][ T7256] RSP: 002b:00007f9329641048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1043.711051][ T7256] RAX: ffffffffffffffda RBX: 00007f932a54df60 RCX: 00007f932a3bfbd9 [ 1043.718862][ T7256] RDX: 00000000fffffdef RSI: 00000000200001c0 RDI: 0000000000000000 [ 1043.726672][ T7256] RBP: 00007f93296410a0 R08: 0000000000000000 R09: 0000000000000000 [ 1043.734482][ T7256] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1043.742292][ T7256] R13: 000000000000000b R14: 00007f932a54df60 R15: 00007ffd5d28adf8 [ 1044.251833][ T7269] device pim6reg1 entered promiscuous mode [ 1044.614597][ T7324] FAULT_INJECTION: forcing a failure. [ 1044.614597][ T7324] name failslab, interval 1, probability 0, space 0, times 0 [ 1044.646599][ T7324] CPU: 0 PID: 7324 Comm: syz.2.14431 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 1044.657775][ T7324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1044.667660][ T7324] Call Trace: [ 1044.670796][ T7324] dump_stack_lvl+0x1e2/0x24b [ 1044.675307][ T7324] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1044.680598][ T7324] dump_stack+0x15/0x17 [ 1044.684588][ T7324] should_fail+0x3c6/0x510 [ 1044.688844][ T7324] ? kvmalloc_node+0x82/0x130 [ 1044.693355][ T7324] __should_failslab+0xa4/0xe0 [ 1044.697956][ T7324] should_failslab+0x9/0x20 [ 1044.702295][ T7324] __kmalloc+0x60/0x330 [ 1044.706293][ T7324] kvmalloc_node+0x82/0x130 [ 1044.710629][ T7324] alloc_netdev_mqs+0x868/0xcd0 [ 1044.715319][ T7324] tun_set_iff+0x54e/0xdb0 [ 1044.719587][ T7324] __tun_chr_ioctl+0x8b3/0x2260 [ 1044.724445][ T7324] ? tun_flow_create+0x320/0x320 [ 1044.729211][ T7324] ? __fget_files+0x31e/0x380 [ 1044.733716][ T7324] tun_chr_ioctl+0x2a/0x40 [ 1044.737967][ T7324] ? tun_chr_poll+0x670/0x670 [ 1044.742477][ T7324] __se_sys_ioctl+0x114/0x190 [ 1044.746993][ T7324] __x64_sys_ioctl+0x7b/0x90 [ 1044.751419][ T7324] do_syscall_64+0x34/0x70 [ 1044.755673][ T7324] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1044.761397][ T7324] RIP: 0033:0x7fb73de84bd9 [ 1044.765654][ T7324] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1044.785199][ T7324] RSP: 002b:00007fb73d106048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1044.793425][ T7324] RAX: ffffffffffffffda RBX: 00007fb73e012f60 RCX: 00007fb73de84bd9 [ 1044.801234][ T7324] RDX: 0000000020000200 RSI: 00000000400454ca RDI: 0000000000000005 [ 1044.809046][ T7324] RBP: 00007fb73d1060a0 R08: 0000000000000000 R09: 0000000000000000 [ 1044.816854][ T7324] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1044.824667][ T7324] R13: 000000000000000b R14: 00007fb73e012f60 R15: 00007ffc4db7c6e8 [ 1045.149896][ T7438] device pim6reg1 entered promiscuous mode [ 1045.366419][ T7439] bridge0: port 1(bridge_slave_0) entered blocking state [ 1045.398226][ T7439] bridge0: port 1(bridge_slave_0) entered disabled state [ 1045.426506][ T7439] device bridge_slave_0 entered promiscuous mode [ 1045.475756][ T7439] bridge0: port 2(bridge_slave_1) entered blocking state [ 1045.482815][ T7439] bridge0: port 2(bridge_slave_1) entered disabled state [ 1045.490100][ T7439] device bridge_slave_1 entered promiscuous mode [ 1045.548544][ T7439] bridge0: port 2(bridge_slave_1) entered blocking state [ 1045.555374][ T7439] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1045.562581][ T7439] bridge0: port 1(bridge_slave_0) entered blocking state [ 1045.569368][ T7439] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1045.578901][ T4867] bridge0: port 1(bridge_slave_0) entered disabled state [ 1045.585963][ T4867] bridge0: port 2(bridge_slave_1) entered disabled state [ 1045.595542][ T7580] device syzkaller0 entered promiscuous mode [ 1045.627218][T23545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1045.634781][T23545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1045.643676][T23545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1045.654547][T23545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1045.737313][T23545] bridge0: port 1(bridge_slave_0) entered blocking state [ 1045.744229][T23545] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1045.751392][T23545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1045.759605][T23545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1045.768030][T23545] bridge0: port 2(bridge_slave_1) entered blocking state [ 1045.774858][T23545] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1045.798379][T23548] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1045.806273][T23548] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1045.814103][T23548] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1045.822120][T23548] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1045.841452][ T7439] device veth0_vlan entered promiscuous mode [ 1045.847626][T28214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1045.855723][T28214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1045.864259][T28214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1045.872341][T28214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1045.881541][ T946] device bridge_slave_1 left promiscuous mode [ 1045.887458][ T946] bridge0: port 2(bridge_slave_1) entered disabled state [ 1045.895086][ T946] device bridge_slave_0 left promiscuous mode [ 1045.901559][ T946] bridge0: port 1(bridge_slave_0) entered disabled state [ 1045.909367][ T946] device veth1_macvtap left promiscuous mode [ 1045.915271][ T946] device veth0_vlan left promiscuous mode [ 1046.009475][T28237] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1046.017140][T28237] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1046.047114][ T4867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1046.055869][ T4867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1046.071085][ T7439] device veth1_macvtap entered promiscuous mode [ 1046.127917][T23551] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1046.140718][T23551] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1046.155444][T23551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1046.174185][T23551] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1046.182680][T23551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1046.248249][ T7587] bridge0: port 1(bridge_slave_0) entered blocking state [ 1046.255291][ T7587] bridge0: port 1(bridge_slave_0) entered disabled state [ 1046.295802][ T7587] device bridge_slave_0 entered promiscuous mode [ 1046.322199][ T7587] bridge0: port 2(bridge_slave_1) entered blocking state [ 1046.331110][ T7587] bridge0: port 2(bridge_slave_1) entered disabled state [ 1046.396078][ T7587] device bridge_slave_1 entered promiscuous mode [ 1046.632453][ T4867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1046.643201][ T4867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1046.679528][ T4884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1046.690983][ T4884] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1046.707925][ T4884] bridge0: port 1(bridge_slave_0) entered blocking state [ 1046.714803][ T4884] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1046.733906][ T4884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1046.750936][ T4884] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1046.769696][ T4884] bridge0: port 2(bridge_slave_1) entered blocking state [ 1046.776557][ T4884] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1046.811573][ T4884] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1046.828808][ T4884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1046.857375][ T4884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1046.874333][ T4884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1046.888903][ T4884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1046.910371][ T7587] device veth0_vlan entered promiscuous mode [ 1046.918130][T23545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1046.933332][T23545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1046.964622][T23545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1046.974748][T23545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1047.004401][T23548] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1047.019561][T23548] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1047.033577][ T7587] device veth1_macvtap entered promiscuous mode [ 1047.051666][T28222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1047.078045][T28222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1047.086066][T28222] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1047.110595][T28222] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1047.119755][T28222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1047.133573][T28237] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1047.141786][T28237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1047.368228][ T7676] bridge0: port 1(bridge_slave_0) entered blocking state [ 1047.407615][ T7676] bridge0: port 1(bridge_slave_0) entered disabled state [ 1047.438342][ T7676] device bridge_slave_0 entered promiscuous mode [ 1047.529466][ T7676] bridge0: port 2(bridge_slave_1) entered blocking state [ 1047.539792][ T7676] bridge0: port 2(bridge_slave_1) entered disabled state [ 1047.552310][ T7676] device bridge_slave_1 entered promiscuous mode [ 1047.910785][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1047.928379][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1048.006391][T23545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1048.033854][T23545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1048.067719][T23545] bridge0: port 1(bridge_slave_0) entered blocking state [ 1048.074739][T23545] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1048.082425][T23545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1048.105771][T23545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1048.114607][T23545] bridge0: port 2(bridge_slave_1) entered blocking state [ 1048.121566][T23545] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1048.143224][ T946] device bridge_slave_1 left promiscuous mode [ 1048.175703][ T946] bridge0: port 2(bridge_slave_1) entered disabled state [ 1048.183581][ T946] device bridge_slave_0 left promiscuous mode [ 1048.190709][ T946] bridge0: port 1(bridge_slave_0) entered disabled state [ 1048.221180][ T946] device veth1_macvtap left promiscuous mode [ 1048.441804][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1048.933859][T23545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1048.942129][T23545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1049.010195][T28214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1049.019448][T28214] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1049.032731][ T7676] device veth0_vlan entered promiscuous mode [ 1049.120566][T28215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1049.130956][T28215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1049.144627][T28215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1049.162836][T28215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1049.187411][ T7791] bridge0: port 1(bridge_slave_0) entered blocking state [ 1049.203672][ T7791] bridge0: port 1(bridge_slave_0) entered disabled state [ 1049.212357][ T7791] device bridge_slave_0 entered promiscuous mode [ 1049.224653][ T7791] bridge0: port 2(bridge_slave_1) entered blocking state [ 1049.231825][ T7791] bridge0: port 2(bridge_slave_1) entered disabled state [ 1049.239263][ T7791] device bridge_slave_1 entered promiscuous mode [ 1049.246601][T28237] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1049.254715][T28237] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1049.262986][T28237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1049.272989][T28237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1049.301802][ T7676] device veth1_macvtap entered promiscuous mode [ 1049.330100][T28237] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1049.343392][T28237] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1049.369499][T28237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1049.510137][T28215] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1049.520547][T28215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1049.726837][T23548] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1049.752731][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1049.761424][ T4881] bridge0: port 1(bridge_slave_0) entered blocking state [ 1049.768296][ T4881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1049.776030][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1049.784262][ T4881] bridge0: port 2(bridge_slave_1) entered blocking state [ 1049.791138][ T4881] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1049.845999][T23548] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1049.860221][T23548] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1049.950182][T23548] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1050.071056][T23548] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1050.130130][T23548] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1050.218029][T23548] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1050.317004][T23548] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1050.422557][ T7791] device veth0_vlan entered promiscuous mode [ 1051.156643][ T7791] device veth1_macvtap entered promiscuous mode [ 1051.164290][T23548] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1051.173414][T23548] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1051.181895][T23548] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1051.353129][T23545] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1051.362816][ T7860] syz.3.14513[7860] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1051.362886][ T7860] syz.3.14513[7860] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1051.375078][T23545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1051.395360][T23545] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1051.403918][T23545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1051.903742][ T7872] device pim6reg1 entered promiscuous mode [ 1052.506055][ T7895] device syzkaller0 entered promiscuous mode [ 1052.941936][ T7912] device pim6reg1 entered promiscuous mode [ 1053.361724][ T946] device bridge_slave_1 left promiscuous mode [ 1053.375434][ T946] bridge0: port 2(bridge_slave_1) entered disabled state [ 1053.478396][ T946] device bridge_slave_0 left promiscuous mode [ 1053.484367][ T946] bridge0: port 1(bridge_slave_0) entered disabled state [ 1053.560080][ T946] device bridge_slave_1 left promiscuous mode [ 1053.566133][ T946] bridge0: port 2(bridge_slave_1) entered disabled state [ 1053.580754][ T946] device bridge_slave_0 left promiscuous mode [ 1053.586876][ T946] bridge0: port 1(bridge_slave_0) entered disabled state [ 1053.595271][ T946] device veth0_vlan left promiscuous mode [ 1053.602367][ T946] device veth1_macvtap left promiscuous mode [ 1053.615136][ T946] device veth0_vlan left promiscuous mode [ 1054.085266][ T7954] FAULT_INJECTION: forcing a failure. [ 1054.085266][ T7954] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1054.131152][ T7954] CPU: 1 PID: 7954 Comm: syz.4.14544 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 1054.142949][ T7954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1054.152915][ T7954] Call Trace: [ 1054.156137][ T7954] dump_stack_lvl+0x1e2/0x24b [ 1054.160649][ T7954] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1054.165938][ T7954] ? __perf_install_in_context+0x315/0x350 [ 1054.171677][ T7954] dump_stack+0x15/0x17 [ 1054.175663][ T7954] should_fail+0x3c6/0x510 [ 1054.180008][ T7954] should_fail_usercopy+0x1a/0x20 [ 1054.184865][ T7954] _copy_from_user+0x20/0xd0 [ 1054.189290][ T7954] kstrtouint_from_user+0xca/0x2a0 [ 1054.194322][ T7954] ? kstrtol_from_user+0x310/0x310 [ 1054.199444][ T7954] ? snprintf+0xd6/0x120 [ 1054.203624][ T7954] ? flush_smp_call_function_from_idle+0x1b0/0x1b0 [ 1054.209968][ T7954] ? memset+0x35/0x40 [ 1054.213779][ T7954] proc_fail_nth_write+0xa6/0x290 [ 1054.218706][ T7954] ? security_file_permission+0x7b/0xb0 [ 1054.224017][ T7954] ? proc_fail_nth_read+0x210/0x210 [ 1054.229053][ T7954] ? security_file_permission+0x86/0xb0 [ 1054.234432][ T7954] ? rw_verify_area+0x1c3/0x360 [ 1054.239176][ T7954] ? proc_fail_nth_read+0x210/0x210 [ 1054.244159][ T7954] vfs_write+0x36e/0xe70 [ 1054.248236][ T7954] ? kernel_write+0x3d0/0x3d0 [ 1054.252747][ T7954] ? __kasan_check_write+0x14/0x20 [ 1054.257694][ T7954] ? mutex_lock+0xa5/0x110 [ 1054.261947][ T7954] ? mutex_trylock+0xa0/0xa0 [ 1054.266382][ T7954] ? __fdget_pos+0x2e7/0x3a0 [ 1054.270798][ T7954] ? ksys_write+0x77/0x2c0 [ 1054.275051][ T7954] ksys_write+0x199/0x2c0 [ 1054.279228][ T7954] ? __ia32_sys_read+0x90/0x90 [ 1054.283822][ T7954] ? debug_smp_processor_id+0x17/0x20 [ 1054.289200][ T7954] __x64_sys_write+0x7b/0x90 [ 1054.293626][ T7954] do_syscall_64+0x34/0x70 [ 1054.297878][ T7954] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1054.303604][ T7954] RIP: 0033:0x7fb13837275f [ 1054.307867][ T7954] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 29 8c 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 7c 8c 02 00 48 [ 1054.327299][ T7954] RSP: 002b:00007fb1375f5040 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1054.335630][ T7954] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb13837275f [ 1054.343445][ T7954] RDX: 0000000000000001 RSI: 00007fb1375f50b0 RDI: 0000000000000007 [ 1054.351261][ T7954] RBP: 00007fb1375f50a0 R08: 0000000000000000 R09: 0000000000000000 [ 1054.359064][ T7954] R10: ffffffffffffffff R11: 0000000000000293 R12: 0000000000000002 [ 1054.366876][ T7954] R13: 000000000000000b R14: 00007fb138501f60 R15: 00007ffcebdad498 [ 1054.477701][ T7963] FAULT_INJECTION: forcing a failure. [ 1054.477701][ T7963] name failslab, interval 1, probability 0, space 0, times 0 [ 1054.500269][ T7963] CPU: 0 PID: 7963 Comm: syz.2.14548 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 1054.511460][ T7963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1054.521343][ T7963] Call Trace: [ 1054.524477][ T7963] dump_stack_lvl+0x1e2/0x24b [ 1054.528989][ T7963] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1054.534289][ T7963] dump_stack+0x15/0x17 [ 1054.538276][ T7963] should_fail+0x3c6/0x510 [ 1054.542525][ T7963] ? __d_alloc+0x2d/0x6c0 [ 1054.546693][ T7963] __should_failslab+0xa4/0xe0 [ 1054.551297][ T7963] should_failslab+0x9/0x20 [ 1054.555643][ T7963] kmem_cache_alloc+0x3d/0x2e0 [ 1054.560251][ T7963] __d_alloc+0x2d/0x6c0 [ 1054.564225][ T7963] ? _raw_spin_lock+0x1b0/0x1b0 [ 1054.568911][ T7963] d_alloc_pseudo+0x1d/0x70 [ 1054.573266][ T7963] alloc_file_pseudo+0x131/0x2f0 [ 1054.578198][ T7963] ? alloc_empty_file_noaccount+0x80/0x80 [ 1054.583757][ T7963] ? perf_event_alloc+0x15f8/0x1970 [ 1054.588790][ T7963] anon_inode_getfile+0xa7/0x180 [ 1054.593563][ T7963] __se_sys_perf_event_open+0xfe4/0x3c30 [ 1054.599117][ T7963] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 1054.604580][ T7963] ? __ia32_sys_read+0x90/0x90 [ 1054.609185][ T7963] __x64_sys_perf_event_open+0xbf/0xd0 [ 1054.614476][ T7963] do_syscall_64+0x34/0x70 [ 1054.618729][ T7963] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1054.624454][ T7963] RIP: 0033:0x7fd3c4a52bd9 [ 1054.628707][ T7963] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1054.648145][ T7963] RSP: 002b:00007fd3c3cd4048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1054.656392][ T7963] RAX: ffffffffffffffda RBX: 00007fd3c4be0f60 RCX: 00007fd3c4a52bd9 [ 1054.664203][ T7963] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000000 [ 1054.672015][ T7963] RBP: 00007fd3c3cd40a0 R08: 0000000000000000 R09: 0000000000000000 [ 1054.679825][ T7963] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1054.687640][ T7963] R13: 000000000000000b R14: 00007fd3c4be0f60 R15: 00007fff36f85148 [ 1054.885590][ T7985] syz.1.14557[7985] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1054.885638][ T7985] syz.1.14557[7985] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1054.898727][ T7985] syz.1.14557[7985] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1054.910227][ T7985] syz.1.14557[7985] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1055.041814][ T7983] device pim6reg1 entered promiscuous mode [ 1055.061948][ T7997] bridge0: port 2(bridge_slave_1) entered disabled state [ 1055.068984][ T7997] bridge0: port 1(bridge_slave_0) entered disabled state [ 1055.090492][ T7995] tap0: tun_chr_ioctl cmd 1074025677 [ 1055.098563][ T7995] tap0: linktype set to 804 [ 1055.103094][ T7997] bridge0: port 2(bridge_slave_1) entered blocking state [ 1055.109989][ T7997] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1055.117042][ T7997] bridge0: port 1(bridge_slave_0) entered blocking state [ 1055.123840][ T7997] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1055.139440][ T7997] device bridge0 entered promiscuous mode [ 1055.775077][ T8043] bridge0: port 2(bridge_slave_1) entered disabled state [ 1055.782015][ T8043] bridge0: port 1(bridge_slave_0) entered disabled state [ 1055.887519][ T8043] device bridge0 left promiscuous mode [ 1055.907897][ T8045] bridge0: port 2(bridge_slave_1) entered blocking state [ 1055.914778][ T8045] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1055.922065][ T8045] bridge0: port 1(bridge_slave_0) entered blocking state [ 1055.928912][ T8045] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1055.947076][ T8045] device bridge0 entered promiscuous mode [ 1056.450546][ T8064] device pim6reg1 entered promiscuous mode [ 1056.869863][ T8071] device pim6reg1 entered promiscuous mode [ 1057.363243][ T8091] bridge0: port 2(bridge_slave_1) entered disabled state [ 1057.370186][ T8091] bridge0: port 1(bridge_slave_0) entered disabled state [ 1057.377269][ T8091] device bridge0 left promiscuous mode [ 1057.431919][ T8091] bridge0: port 2(bridge_slave_1) entered blocking state [ 1057.438977][ T8091] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1057.446068][ T8091] bridge0: port 1(bridge_slave_0) entered blocking state [ 1057.452874][ T8091] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1057.460438][ T8091] device bridge0 entered promiscuous mode [ 1057.922177][ T8120] device pim6reg1 entered promiscuous mode [ 1058.930802][ T8146] FAULT_INJECTION: forcing a failure. [ 1058.930802][ T8146] name failslab, interval 1, probability 0, space 0, times 0 [ 1058.943344][ T8146] CPU: 0 PID: 8146 Comm: syz.2.14609 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 1058.954488][ T8146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1058.964374][ T8146] Call Trace: [ 1058.967509][ T8146] dump_stack_lvl+0x1e2/0x24b [ 1058.972111][ T8146] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1058.977489][ T8146] ? ____kasan_kmalloc+0xed/0x110 [ 1058.982526][ T8146] ? tipc_sub_subscribe+0x123/0x4a0 [ 1058.987569][ T8146] ? tipc_topsrv_kern_subscr+0x2cd/0x490 [ 1058.993026][ T8146] ? tipc_group_create+0x420/0x660 [ 1058.997976][ T8146] ? tipc_sk_join+0x163/0x8c0 [ 1059.002572][ T8146] ? __sys_setsockopt+0x502/0x870 [ 1059.007520][ T8146] dump_stack+0x15/0x17 [ 1059.011507][ T8146] should_fail+0x3c6/0x510 [ 1059.015769][ T8146] ? tipc_nametbl_subscribe+0x3f5/0x16d0 [ 1059.021232][ T8146] __should_failslab+0xa4/0xe0 [ 1059.025831][ T8146] should_failslab+0x9/0x20 [ 1059.030257][ T8146] kmem_cache_alloc_trace+0x3a/0x2e0 [ 1059.035494][ T8146] tipc_nametbl_subscribe+0x3f5/0x16d0 [ 1059.040783][ T8146] ? tipc_nametbl_withdraw+0x4c0/0x4c0 [ 1059.046073][ T8146] ? tipc_sub_subscribe+0x234/0x4a0 [ 1059.051105][ T8146] tipc_sub_subscribe+0x289/0x4a0 [ 1059.056055][ T8146] tipc_conn_rcv_sub+0x1b6/0x3d0 [ 1059.060918][ T8146] tipc_topsrv_kern_subscr+0x2cd/0x490 [ 1059.066208][ T8146] ? conn_put+0x310/0x310 [ 1059.070374][ T8146] ? __kasan_kmalloc+0x9/0x10 [ 1059.074890][ T8146] ? tipc_group_create+0x9c/0x660 [ 1059.079832][ T8146] tipc_group_create+0x420/0x660 [ 1059.084622][ T8146] tipc_sk_join+0x163/0x8c0 [ 1059.088965][ T8146] ? _copy_from_user+0x96/0xd0 [ 1059.093898][ T8146] tipc_setsockopt+0x794/0xb80 [ 1059.098499][ T8146] ? tipc_shutdown+0x950/0x950 [ 1059.103096][ T8146] ? security_socket_setsockopt+0x82/0xb0 [ 1059.108647][ T8146] ? tipc_shutdown+0x950/0x950 [ 1059.113249][ T8146] __sys_setsockopt+0x502/0x870 [ 1059.117935][ T8146] ? __ia32_sys_recv+0xb0/0xb0 [ 1059.122536][ T8146] __x64_sys_setsockopt+0xbf/0xd0 [ 1059.127398][ T8146] do_syscall_64+0x34/0x70 [ 1059.131738][ T8146] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1059.137760][ T8146] RIP: 0033:0x7fd3c4a52bd9 [ 1059.142020][ T8146] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1059.161720][ T8146] RSP: 002b:00007fd3c3cd4048 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1059.170046][ T8146] RAX: ffffffffffffffda RBX: 00007fd3c4be0f60 RCX: 00007fd3c4a52bd9 [ 1059.177857][ T8146] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000007 [ 1059.185666][ T8146] RBP: 00007fd3c3cd40a0 R08: 0000000000000127 R09: 0000000000000000 [ 1059.193740][ T8146] R10: 0000000020000180 R11: 0000000000000246 R12: 0000000000000001 [ 1059.201550][ T8146] R13: 000000000000000b R14: 00007fd3c4be0f60 R15: 00007fff36f85148 [ 1059.209406][ T8146] tipc: Service creation failed, no memory [ 1059.215001][ T8146] tipc: Failed to subscribe for {4294967295,0,4294967295} [ 1059.834664][ T8201] device syzkaller0 entered promiscuous mode [ 1061.632562][ T8250] device syzkaller0 entered promiscuous mode [ 1062.292478][ T8284] device pim6reg1 entered promiscuous mode [ 1066.961999][ T8400] device veth0_vlan left promiscuous mode [ 1067.029520][ T8400] device veth0_vlan entered promiscuous mode [ 1067.079939][T28217] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1067.088265][T28217] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1067.095739][T28217] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1067.225235][ T8437] device pim6reg1 entered promiscuous mode [ 1067.556516][ T8459] FAULT_INJECTION: forcing a failure. [ 1067.556516][ T8459] name failslab, interval 1, probability 0, space 0, times 0 [ 1067.575515][ T8459] CPU: 1 PID: 8459 Comm: syz.0.14726 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 1067.586692][ T8459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1067.596665][ T8459] Call Trace: [ 1067.599809][ T8459] dump_stack_lvl+0x1e2/0x24b [ 1067.604306][ T8459] ? panic+0x812/0x812 [ 1067.608301][ T8459] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1067.613691][ T8459] dump_stack+0x15/0x17 [ 1067.617671][ T8459] should_fail+0x3c6/0x510 [ 1067.621922][ T8459] ? __alloc_file+0x29/0x330 [ 1067.626352][ T8459] __should_failslab+0xa4/0xe0 [ 1067.630951][ T8459] should_failslab+0x9/0x20 [ 1067.635376][ T8459] kmem_cache_alloc+0x3d/0x2e0 [ 1067.640096][ T8459] ? _raw_spin_lock+0xa4/0x1b0 [ 1067.644693][ T8459] __alloc_file+0x29/0x330 [ 1067.648946][ T8459] ? alloc_empty_file+0x42/0x180 [ 1067.653721][ T8459] alloc_empty_file+0x95/0x180 [ 1067.658317][ T8459] alloc_file+0x5a/0x4e0 [ 1067.662397][ T8459] alloc_file_pseudo+0x259/0x2f0 [ 1067.667176][ T8459] ? alloc_empty_file_noaccount+0x80/0x80 [ 1067.672991][ T8459] ? perf_event_alloc+0x15f8/0x1970 [ 1067.678027][ T8459] anon_inode_getfile+0xa7/0x180 [ 1067.682796][ T8459] __se_sys_perf_event_open+0xfe4/0x3c30 [ 1067.688272][ T8459] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 1067.693748][ T8459] ? __ia32_sys_read+0x90/0x90 [ 1067.698336][ T8459] __x64_sys_perf_event_open+0xbf/0xd0 [ 1067.703628][ T8459] do_syscall_64+0x34/0x70 [ 1067.707886][ T8459] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1067.713605][ T8459] RIP: 0033:0x7f694568dbd9 [ 1067.717861][ T8459] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1067.737298][ T8459] RSP: 002b:00007f694490f048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1067.745544][ T8459] RAX: ffffffffffffffda RBX: 00007f694581bf60 RCX: 00007f694568dbd9 [ 1067.753355][ T8459] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000000 [ 1067.761174][ T8459] RBP: 00007f694490f0a0 R08: 0000000000000000 R09: 0000000000000000 [ 1067.768977][ T8459] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1067.776881][ T8459] R13: 000000000000000b R14: 00007f694581bf60 R15: 00007ffe8e410de8 [ 1070.961789][ T8576] Â: renamed from pim6reg1 [ 1073.019155][ T8669] syz.4.14804[8669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1073.019210][ T8669] syz.4.14804[8669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1073.111573][ T8669] syz.4.14804[8669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1073.127859][ T8669] syz.4.14804[8669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1073.156957][ T8681] device syzkaller0 entered promiscuous mode [ 1075.334596][ T8743] device veth0_vlan left promiscuous mode [ 1075.340808][ T8743] device veth0_vlan entered promiscuous mode [ 1076.575871][ T8819] device pim6reg1 entered promiscuous mode [ 1077.407775][ T8847] device syzkaller0 entered promiscuous mode [ 1078.067767][ T8861] device pim6reg1 entered promiscuous mode [ 1082.988088][ T8998] device syzkaller0 entered promiscuous mode [ 1083.480791][ T9032] device pim6reg1 entered promiscuous mode [ 1084.159994][ T9073] FAULT_INJECTION: forcing a failure. [ 1084.159994][ T9073] name failslab, interval 1, probability 0, space 0, times 0 [ 1084.246733][ T9073] CPU: 0 PID: 9073 Comm: syz.2.14948 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 1084.257999][ T9073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1084.267884][ T9073] Call Trace: [ 1084.271021][ T9073] dump_stack_lvl+0x1e2/0x24b [ 1084.275612][ T9073] ? panic+0x812/0x812 [ 1084.279520][ T9073] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1084.284811][ T9073] dump_stack+0x15/0x17 [ 1084.288803][ T9073] should_fail+0x3c6/0x510 [ 1084.293058][ T9073] ? security_inode_alloc+0x29/0x120 [ 1084.298187][ T9073] __should_failslab+0xa4/0xe0 [ 1084.302865][ T9073] should_failslab+0x9/0x20 [ 1084.307202][ T9073] kmem_cache_alloc+0x3d/0x2e0 [ 1084.311893][ T9073] security_inode_alloc+0x29/0x120 [ 1084.316840][ T9073] inode_init_always+0x767/0x9f0 [ 1084.321621][ T9073] ? sockfs_init_fs_context+0xb0/0xb0 [ 1084.326818][ T9073] new_inode_pseudo+0x93/0x220 [ 1084.331450][ T9073] __sock_create+0x135/0x760 [ 1084.335846][ T9073] ? get_unused_fd_flags+0x94/0xa0 [ 1084.340794][ T9073] __sys_socketpair+0x29f/0x6e0 [ 1084.345480][ T9073] ? __ia32_sys_socket+0x90/0x90 [ 1084.350252][ T9073] ? __ia32_sys_read+0x90/0x90 [ 1084.354857][ T9073] __x64_sys_socketpair+0x9b/0xb0 [ 1084.359715][ T9073] do_syscall_64+0x34/0x70 [ 1084.364317][ T9073] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1084.370043][ T9073] RIP: 0033:0x7fd3c4a52bd9 [ 1084.374296][ T9073] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1084.393830][ T9073] RSP: 002b:00007fd3c3cd4048 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 1084.402071][ T9073] RAX: ffffffffffffffda RBX: 00007fd3c4be0f60 RCX: 00007fd3c4a52bd9 [ 1084.409874][ T9073] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 1084.417685][ T9073] RBP: 00007fd3c3cd40a0 R08: 0000000000000000 R09: 0000000000000000 [ 1084.425498][ T9073] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 1084.433309][ T9073] R13: 000000000000000b R14: 00007fd3c4be0f60 R15: 00007fff36f85148 [ 1084.715462][ T9073] socket: no more sockets [ 1084.780694][ T9133] device pim6reg1 entered promiscuous mode [ 1085.526316][ T9162] device veth0_vlan left promiscuous mode [ 1085.652664][ T9162] device veth0_vlan entered promiscuous mode [ 1086.099769][ T9171] device pim6reg1 entered promiscuous mode [ 1086.216682][ T9172] FAULT_INJECTION: forcing a failure. [ 1086.216682][ T9172] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1086.376304][ T9172] CPU: 1 PID: 9172 Comm: syz.3.14957 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 1086.387929][ T9172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1086.397813][ T9172] Call Trace: [ 1086.400954][ T9172] dump_stack_lvl+0x1e2/0x24b [ 1086.405451][ T9172] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1086.410757][ T9172] dump_stack+0x15/0x17 [ 1086.414746][ T9172] should_fail+0x3c6/0x510 [ 1086.419006][ T9172] should_fail_usercopy+0x1a/0x20 [ 1086.423857][ T9172] _copy_to_user+0x20/0x90 [ 1086.428118][ T9172] simple_read_from_buffer+0xc7/0x150 [ 1086.433320][ T9172] proc_fail_nth_read+0x1a3/0x210 [ 1086.438188][ T9172] ? security_file_permission+0x7b/0xb0 [ 1086.443565][ T9172] ? proc_fault_inject_write+0x390/0x390 [ 1086.449028][ T9172] ? security_file_permission+0x86/0xb0 [ 1086.454416][ T9172] ? rw_verify_area+0x1c3/0x360 [ 1086.459093][ T9172] ? proc_fault_inject_write+0x390/0x390 [ 1086.464562][ T9172] vfs_read+0x204/0xbb0 [ 1086.468550][ T9172] ? __fd_install+0x11e/0x220 [ 1086.473072][ T9172] ? kernel_read+0x70/0x70 [ 1086.477322][ T9172] ? __kasan_check_write+0x14/0x20 [ 1086.482266][ T9172] ? mutex_lock+0xa5/0x110 [ 1086.486516][ T9172] ? mutex_trylock+0xa0/0xa0 [ 1086.491476][ T9172] ? __fdget_pos+0x2e7/0x3a0 [ 1086.495895][ T9172] ? ksys_read+0x77/0x2c0 [ 1086.500063][ T9172] ksys_read+0x199/0x2c0 [ 1086.504161][ T9172] ? vfs_write+0xe70/0xe70 [ 1086.508395][ T9172] ? fpu__clear_all+0x20/0x20 [ 1086.512907][ T9172] ? __kasan_check_read+0x11/0x20 [ 1086.517763][ T9172] __x64_sys_read+0x7b/0x90 [ 1086.522107][ T9172] do_syscall_64+0x34/0x70 [ 1086.526531][ T9172] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1086.532257][ T9172] RIP: 0033:0x7f932a3be6bc [ 1086.536510][ T9172] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8c 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 1f 8d 02 00 48 [ 1086.556037][ T9172] RSP: 002b:00007f9329641040 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1086.564277][ T9172] RAX: ffffffffffffffda RBX: 00007f932a54df60 RCX: 00007f932a3be6bc [ 1086.572085][ T9172] RDX: 000000000000000f RSI: 00007f93296410b0 RDI: 0000000000000007 [ 1086.579894][ T9172] RBP: 00007f93296410a0 R08: 0000000000000000 R09: 0000000000000000 [ 1086.587708][ T9172] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1086.595519][ T9172] R13: 000000000000000b R14: 00007f932a54df60 R15: 00007ffd5d28adf8 [ 1087.219284][ T9219] device pim6reg1 entered promiscuous mode [ 1087.781676][ T9261] device pim6reg1 entered promiscuous mode [ 1088.076778][ T9286] device pim6reg1 entered promiscuous mode [ 1090.193726][ T9324] bridge0: port 2(bridge_slave_1) entered disabled state [ 1090.200636][ T9324] bridge0: port 1(bridge_slave_0) entered disabled state [ 1090.207694][ T9324] device bridge0 left promiscuous mode [ 1090.582306][ T9339] device pim6reg1 entered promiscuous mode [ 1090.704961][ T9343] geneve1: tun_chr_ioctl cmd 1074025681 [ 1091.113420][ T9366] syz.4.15024[9366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1091.113473][ T9366] syz.4.15024[9366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1091.383513][ T9385] device pim6reg1 entered promiscuous mode [ 1092.304058][ T110] device bridge_slave_1 left promiscuous mode [ 1092.311681][ T110] bridge0: port 2(bridge_slave_1) entered disabled state [ 1092.355933][ T110] device bridge_slave_0 left promiscuous mode [ 1092.402065][ T110] bridge0: port 1(bridge_slave_0) entered disabled state [ 1092.469720][ T110] device veth1_macvtap left promiscuous mode [ 1092.516892][ T110] device veth0_vlan left promiscuous mode [ 1093.129933][ T9437] device pim6reg1 entered promiscuous mode [ 1093.234025][ T9456] tun0: tun_chr_ioctl cmd 1074025676 [ 1093.239240][ T9456] tun0: owner set to 0 [ 1093.373405][ T9481] device pim6reg1 entered promiscuous mode [ 1094.056455][ T9525] device pim6reg1 entered promiscuous mode [ 1094.478237][ T9548] device pim6reg1 entered promiscuous mode [ 1094.610739][ T9550] device syzkaller0 entered promiscuous mode [ 1095.781981][ T9587] syz.2.15101[9587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1095.782028][ T9587] syz.2.15101[9587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1095.807304][ T9587] syz.2.15101[9587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1095.838374][ T9587] syz.2.15101[9587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1096.013392][ T9598] device pim6reg1 entered promiscuous mode [ 1096.135282][ T9614] device pim6reg1 entered promiscuous mode [ 1096.410858][ T9653] device pim6reg1 entered promiscuous mode [ 1097.424664][ T9682] bridge0: port 1(bridge_slave_0) entered blocking state [ 1097.484373][ T9682] bridge0: port 1(bridge_slave_0) entered disabled state [ 1097.500751][ T9682] device bridge_slave_0 entered promiscuous mode [ 1097.510877][ T9690] device pim6reg1 entered promiscuous mode [ 1097.527678][ T9682] bridge0: port 2(bridge_slave_1) entered blocking state [ 1097.537625][ T9682] bridge0: port 2(bridge_slave_1) entered disabled state [ 1097.575720][ T9682] device bridge_slave_1 entered promiscuous mode [ 1097.902226][T28223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1097.913937][T28223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1097.963293][T28221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1097.973678][T28221] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1098.001230][T28221] bridge0: port 1(bridge_slave_0) entered blocking state [ 1098.008115][T28221] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1098.036330][T28221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1098.047828][T28221] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1098.061282][T28221] bridge0: port 2(bridge_slave_1) entered blocking state [ 1098.068158][T28221] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1098.082947][T28221] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1098.091030][T28221] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1098.123645][T28217] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1098.133134][T28217] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1098.145357][ T9682] device veth0_vlan entered promiscuous mode [ 1098.152384][ T4883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1098.165921][ T9682] device veth1_macvtap entered promiscuous mode [ 1098.172778][ T4883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1098.181111][ T4883] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1098.188684][ T4883] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1098.204452][ T4873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1098.218802][ T4873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1098.960452][ T110] device bridge_slave_1 left promiscuous mode [ 1098.967709][ T110] bridge0: port 2(bridge_slave_1) entered disabled state [ 1099.096464][ T110] device bridge_slave_0 left promiscuous mode [ 1099.126989][ T110] bridge0: port 1(bridge_slave_0) entered disabled state [ 1099.188512][ T110] device veth0_vlan left promiscuous mode [ 1099.511230][ T9754] FAULT_INJECTION: forcing a failure. [ 1099.511230][ T9754] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1099.524143][ T9754] CPU: 0 PID: 9754 Comm: syz.3.15166 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 1099.535341][ T9754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1099.545232][ T9754] Call Trace: [ 1099.548368][ T9754] dump_stack_lvl+0x1e2/0x24b [ 1099.553053][ T9754] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1099.558338][ T9754] ? shmem_getpage_gfp+0x2230/0x2480 [ 1099.563556][ T9754] dump_stack+0x15/0x17 [ 1099.567540][ T9754] should_fail+0x3c6/0x510 [ 1099.571796][ T9754] should_fail_usercopy+0x1a/0x20 [ 1099.576653][ T9754] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 1099.582562][ T9754] ? shmem_getpage+0xa0/0xa0 [ 1099.586994][ T9754] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 1099.592721][ T9754] ? memzero_page+0x100/0x100 [ 1099.597225][ T9754] generic_perform_write+0x34c/0x570 [ 1099.602582][ T9754] ? grab_cache_page_write_begin+0xa0/0xa0 [ 1099.608160][ T9754] ? file_remove_privs+0x570/0x570 [ 1099.613108][ T9754] ? __kasan_check_write+0x14/0x20 [ 1099.618067][ T9754] __generic_file_write_iter+0x23c/0x560 [ 1099.623524][ T9754] ? generic_write_checks+0x3b9/0x470 [ 1099.628739][ T9754] generic_file_write_iter+0xaf/0x1c0 [ 1099.633939][ T9754] vfs_write+0xb55/0xe70 [ 1099.638017][ T9754] ? kernel_write+0x3d0/0x3d0 [ 1099.642530][ T9754] ? mutex_trylock+0xa0/0xa0 [ 1099.648380][ T9754] ? __fdget_pos+0x2e7/0x3a0 [ 1099.652808][ T9754] ? ksys_write+0x77/0x2c0 [ 1099.657056][ T9754] ksys_write+0x199/0x2c0 [ 1099.661225][ T9754] ? __ia32_sys_read+0x90/0x90 [ 1099.665918][ T9754] ? debug_smp_processor_id+0x17/0x20 [ 1099.671121][ T9754] __x64_sys_write+0x7b/0x90 [ 1099.675633][ T9754] do_syscall_64+0x34/0x70 [ 1099.679892][ T9754] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1099.685612][ T9754] RIP: 0033:0x7f932a3bfbd9 [ 1099.689986][ T9754] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1099.709483][ T9754] RSP: 002b:00007f9329620048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1099.717728][ T9754] RAX: ffffffffffffffda RBX: 00007f932a54e038 RCX: 00007f932a3bfbd9 [ 1099.725535][ T9754] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000006 [ 1099.733348][ T9754] RBP: 00007f93296200a0 R08: 0000000000000000 R09: 0000000000000000 [ 1099.741159][ T9754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1099.749228][ T9754] R13: 000000000000006e R14: 00007f932a54e038 R15: 00007ffd5d28adf8 [ 1099.837841][ T9773] FAULT_INJECTION: forcing a failure. [ 1099.837841][ T9773] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1099.874137][ T9773] CPU: 1 PID: 9773 Comm: syz.2.15177 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 1099.885325][ T9773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1099.895215][ T9773] Call Trace: [ 1099.898348][ T9773] dump_stack_lvl+0x1e2/0x24b [ 1099.902950][ T9773] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1099.908332][ T9773] ? __kasan_check_write+0x14/0x20 [ 1099.913265][ T9773] dump_stack+0x15/0x17 [ 1099.917258][ T9773] should_fail+0x3c6/0x510 [ 1099.921517][ T9773] should_fail_usercopy+0x1a/0x20 [ 1099.926375][ T9773] copy_page_from_iter+0x398/0x6e0 [ 1099.931414][ T9773] pipe_write+0x92b/0x18c0 [ 1099.935671][ T9773] ? pipe_read+0x1040/0x1040 [ 1099.940088][ T9773] ? fsnotify_perm+0x67/0x4e0 [ 1099.944600][ T9773] ? io_schedule+0x120/0x120 [ 1099.949029][ T9773] ? security_file_permission+0x86/0xb0 [ 1099.954413][ T9773] ? iov_iter_init+0x3f/0x120 [ 1099.958925][ T9773] vfs_write+0xb55/0xe70 [ 1099.963003][ T9773] ? kernel_write+0x3d0/0x3d0 [ 1099.967518][ T9773] ? __fdget_pos+0x209/0x3a0 [ 1099.971940][ T9773] ? ksys_write+0x77/0x2c0 [ 1099.976194][ T9773] ksys_write+0x199/0x2c0 [ 1099.980365][ T9773] ? __ia32_sys_read+0x90/0x90 [ 1099.984974][ T9773] ? debug_smp_processor_id+0x17/0x20 [ 1099.990170][ T9773] __x64_sys_write+0x7b/0x90 [ 1099.994590][ T9773] do_syscall_64+0x34/0x70 [ 1099.998845][ T9773] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1100.004568][ T9773] RIP: 0033:0x7f4a3a4c3bd9 [ 1100.008816][ T9773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1100.028255][ T9773] RSP: 002b:00007f4a39745048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1100.036500][ T9773] RAX: ffffffffffffffda RBX: 00007f4a3a651f60 RCX: 00007f4a3a4c3bd9 [ 1100.044309][ T9773] RDX: 00000000fffffdef RSI: 00000000200001c0 RDI: 0000000000000000 [ 1100.052121][ T9773] RBP: 00007f4a397450a0 R08: 0000000000000000 R09: 0000000000000000 [ 1100.060017][ T9773] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1100.067874][ T9773] R13: 000000000000000b R14: 00007f4a3a651f60 R15: 00007ffe5ca5c8a8 [ 1100.224380][ T9786] device pim6reg1 entered promiscuous mode [ 1100.739409][ T9797] device syzkaller0 entered promiscuous mode [ 1101.321394][ T9850] FAULT_INJECTION: forcing a failure. [ 1101.321394][ T9850] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1101.529118][ T9850] CPU: 1 PID: 9850 Comm: syz.1.15202 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 1101.540471][ T9850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1101.550360][ T9850] Call Trace: [ 1101.553501][ T9850] dump_stack_lvl+0x1e2/0x24b [ 1101.558010][ T9850] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1101.563295][ T9850] ? 0xffffffffa00021e8 [ 1101.567292][ T9850] ? is_bpf_text_address+0x172/0x190 [ 1101.572408][ T9850] ? stack_trace_save+0x1c0/0x1c0 [ 1101.577278][ T9850] dump_stack+0x15/0x17 [ 1101.581261][ T9850] should_fail+0x3c6/0x510 [ 1101.585527][ T9850] should_fail_usercopy+0x1a/0x20 [ 1101.590468][ T9850] _copy_from_user+0x20/0xd0 [ 1101.594893][ T9850] __se_sys_bpf+0x232/0x11cb0 [ 1101.599403][ T9850] ? stack_trace_save+0x113/0x1c0 [ 1101.604270][ T9850] ? terminate_walk+0x407/0x4f0 [ 1101.609040][ T9850] ? stack_trace_snprint+0xf0/0xf0 [ 1101.613986][ T9850] ? kmem_cache_free+0xa9/0x1e0 [ 1101.618672][ T9850] ? kmem_cache_free+0xa9/0x1e0 [ 1101.623356][ T9850] ? kasan_set_track+0x5d/0x70 [ 1101.627956][ T9850] ? kasan_set_track+0x4b/0x70 [ 1101.632557][ T9850] ? kasan_set_free_info+0x23/0x40 [ 1101.637502][ T9850] ? ____kasan_slab_free+0x121/0x160 [ 1101.642624][ T9850] ? __kasan_slab_free+0x11/0x20 [ 1101.647399][ T9850] ? __x64_sys_bpf+0x90/0x90 [ 1101.651826][ T9850] ? do_sys_openat2+0x5e1/0x6f0 [ 1101.656511][ T9850] ? __x64_sys_openat+0x243/0x290 [ 1101.661373][ T9850] ? do_syscall_64+0x34/0x70 [ 1101.665800][ T9850] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1101.671700][ T9850] ? _kstrtoull+0x3a0/0x4a0 [ 1101.676038][ T9850] ? kstrtouint_from_user+0x20a/0x2a0 [ 1101.681250][ T9850] ? kstrtol_from_user+0x310/0x310 [ 1101.686193][ T9850] ? memset+0x35/0x40 [ 1101.690013][ T9850] ? __fsnotify_parent+0x4b9/0x6c0 [ 1101.694962][ T9850] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 1101.701557][ T9850] ? proc_fail_nth_write+0x20b/0x290 [ 1101.706765][ T9850] ? proc_fail_nth_read+0x210/0x210 [ 1101.711798][ T9850] ? security_file_permission+0x86/0xb0 [ 1101.717181][ T9850] ? rw_verify_area+0x1c3/0x360 [ 1101.721864][ T9850] ? slab_free_freelist_hook+0xc0/0x190 [ 1101.727246][ T9850] ? preempt_count_add+0x92/0x1a0 [ 1101.732107][ T9850] ? vfs_write+0x854/0xe70 [ 1101.736359][ T9850] ? kernel_write+0x3d0/0x3d0 [ 1101.740879][ T9850] ? __kasan_check_write+0x14/0x20 [ 1101.745820][ T9850] ? mutex_lock+0xa5/0x110 [ 1101.750070][ T9850] ? mutex_trylock+0xa0/0xa0 [ 1101.754506][ T9850] ? __kasan_check_write+0x14/0x20 [ 1101.759534][ T9850] ? fput_many+0x160/0x1b0 [ 1101.763791][ T9850] ? debug_smp_processor_id+0x17/0x20 [ 1101.769001][ T9850] __x64_sys_bpf+0x7b/0x90 [ 1101.773247][ T9850] do_syscall_64+0x34/0x70 [ 1101.777499][ T9850] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1101.783225][ T9850] RIP: 0033:0x7f438952dbd9 [ 1101.787481][ T9850] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1101.806924][ T9850] RSP: 002b:00007f43887af048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1101.815167][ T9850] RAX: ffffffffffffffda RBX: 00007f43896bbf60 RCX: 00007f438952dbd9 [ 1101.822977][ T9850] RDX: 0000000000000010 RSI: 0000000020000740 RDI: 000000000000000a [ 1101.830790][ T9850] RBP: 00007f43887af0a0 R08: 0000000000000000 R09: 0000000000000000 [ 1101.838596][ T9850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1101.846409][ T9850] R13: 000000000000000b R14: 00007f43896bbf60 R15: 00007ffcea20e128 [ 1106.547023][T10028] €Â: renamed from veth0_vlan [ 1113.506226][T10287] device syzkaller0 entered promiscuous mode [ 1113.564738][T10291] FAULT_INJECTION: forcing a failure. [ 1113.564738][T10291] name failslab, interval 1, probability 0, space 0, times 0 [ 1113.680035][T10291] CPU: 0 PID: 10291 Comm: syz.1.15358 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 1113.691387][T10291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1113.701280][T10291] Call Trace: [ 1113.704428][T10291] dump_stack_lvl+0x1e2/0x24b [ 1113.708931][T10291] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1113.714215][T10291] ? __get_vm_area_node+0x116/0x470 [ 1113.719259][T10291] ? ____kasan_kmalloc+0xed/0x110 [ 1113.724108][T10291] ? __kasan_kmalloc+0x9/0x10 [ 1113.728626][T10291] dump_stack+0x15/0x17 [ 1113.732632][T10291] should_fail+0x3c6/0x510 [ 1113.736870][T10291] ? alloc_vmap_area+0x16f/0x1a90 [ 1113.741732][T10291] __should_failslab+0xa4/0xe0 [ 1113.746328][T10291] should_failslab+0x9/0x20 [ 1113.750666][T10291] kmem_cache_alloc+0x3d/0x2e0 [ 1113.755270][T10291] alloc_vmap_area+0x16f/0x1a90 [ 1113.759963][T10291] ? vm_map_ram+0x9d0/0x9d0 [ 1113.764301][T10291] ? __kasan_kmalloc+0x9/0x10 [ 1113.769045][T10291] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 1113.774416][T10291] ? __get_vm_area_node+0x116/0x470 [ 1113.779452][T10291] __get_vm_area_node+0x156/0x470 [ 1113.784311][T10291] __vmalloc_node_range+0xdc/0x7c0 [ 1113.789262][T10291] ? prealloc_init+0x13b/0x7f0 [ 1113.793858][T10291] ? get_random_u64+0x5b0/0x5b0 [ 1113.798557][T10291] bpf_map_area_alloc+0xd9/0xf0 [ 1113.803317][T10291] ? prealloc_init+0x13b/0x7f0 [ 1113.807928][T10291] prealloc_init+0x13b/0x7f0 [ 1113.812347][T10291] ? __kmalloc+0x1aa/0x330 [ 1113.816600][T10291] htab_map_alloc+0x68d/0x950 [ 1113.821112][T10291] __se_sys_bpf+0x620f/0x11cb0 [ 1113.825709][T10291] ? stack_trace_save+0x113/0x1c0 [ 1113.830570][T10291] ? terminate_walk+0x407/0x4f0 [ 1113.835255][T10291] ? stack_trace_snprint+0xf0/0xf0 [ 1113.840206][T10291] ? kmem_cache_free+0xa9/0x1e0 [ 1113.844887][T10291] ? kmem_cache_free+0xa9/0x1e0 [ 1113.849573][T10291] ? kasan_set_track+0x5d/0x70 [ 1113.854176][T10291] ? kasan_set_track+0x4b/0x70 [ 1113.858776][T10291] ? kasan_set_free_info+0x23/0x40 [ 1113.863724][T10291] ? ____kasan_slab_free+0x121/0x160 [ 1113.868842][T10291] ? __kasan_slab_free+0x11/0x20 [ 1113.873617][T10291] ? __x64_sys_bpf+0x90/0x90 [ 1113.878042][T10291] ? do_sys_openat2+0x5e1/0x6f0 [ 1113.882729][T10291] ? __x64_sys_openat+0x243/0x290 [ 1113.887587][T10291] ? do_syscall_64+0x34/0x70 [ 1113.892017][T10291] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1113.897931][T10291] ? _kstrtoull+0x3a0/0x4a0 [ 1113.902263][T10291] ? kstrtouint_from_user+0x20a/0x2a0 [ 1113.907468][T10291] ? kstrtol_from_user+0x310/0x310 [ 1113.912414][T10291] ? memset+0x35/0x40 [ 1113.916233][T10291] ? __fsnotify_parent+0x4b9/0x6c0 [ 1113.921186][T10291] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 1113.927790][T10291] ? proc_fail_nth_write+0x20b/0x290 [ 1113.932904][T10291] ? proc_fail_nth_read+0x210/0x210 [ 1113.937932][T10291] ? security_file_permission+0x86/0xb0 [ 1113.943313][T10291] ? rw_verify_area+0x1c3/0x360 [ 1113.947999][T10291] ? slab_free_freelist_hook+0xc0/0x190 [ 1113.953494][T10291] ? preempt_count_add+0x92/0x1a0 [ 1113.958360][T10291] ? vfs_write+0x854/0xe70 [ 1113.962610][T10291] ? kernel_write+0x3d0/0x3d0 [ 1113.967121][T10291] ? __kasan_check_write+0x14/0x20 [ 1113.972066][T10291] ? mutex_lock+0xa5/0x110 [ 1113.976325][T10291] ? mutex_trylock+0xa0/0xa0 [ 1113.980750][T10291] ? __kasan_check_write+0x14/0x20 [ 1113.985693][T10291] ? fput_many+0x160/0x1b0 [ 1113.989954][T10291] ? debug_smp_processor_id+0x17/0x20 [ 1113.996156][T10291] __x64_sys_bpf+0x7b/0x90 [ 1114.000370][T10291] do_syscall_64+0x34/0x70 [ 1114.004630][T10291] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1114.010349][T10291] RIP: 0033:0x7f438952dbd9 [ 1114.014614][T10291] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1114.034143][T10291] RSP: 002b:00007f438878e048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1114.042394][T10291] RAX: ffffffffffffffda RBX: 00007f43896bc038 RCX: 00007f438952dbd9 [ 1114.050374][T10291] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 1114.058178][T10291] RBP: 00007f438878e0a0 R08: 0000000000000000 R09: 0000000000000000 [ 1114.065994][T10291] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1114.073820][T10291] R13: 000000000000006e R14: 00007f43896bc038 R15: 00007ffcea20e128 [ 1114.818377][T10353] FAULT_INJECTION: forcing a failure. [ 1114.818377][T10353] name failslab, interval 1, probability 0, space 0, times 0 [ 1114.848860][T10353] CPU: 1 PID: 10353 Comm: syz.1.15381 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 1114.860221][T10353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1114.870099][T10353] Call Trace: [ 1114.873234][T10353] dump_stack_lvl+0x1e2/0x24b [ 1114.877744][T10353] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1114.883037][T10353] dump_stack+0x15/0x17 [ 1114.887111][T10353] should_fail+0x3c6/0x510 [ 1114.891367][T10353] ? selinux_sk_alloc_security+0x60/0x140 [ 1114.896920][T10353] __should_failslab+0xa4/0xe0 [ 1114.901532][T10353] should_failslab+0x9/0x20 [ 1114.905887][T10353] kmem_cache_alloc_trace+0x3a/0x2e0 [ 1114.911079][T10353] selinux_sk_alloc_security+0x60/0x140 [ 1114.916455][T10353] security_sk_alloc+0x72/0xb0 [ 1114.921183][T10353] sk_prot_alloc+0x142/0x370 [ 1114.925593][T10353] sk_alloc+0x38/0x4d0 [ 1114.929511][T10353] ? security_inode_alloc+0xc0/0x120 [ 1114.934632][T10353] inet6_create+0x6c4/0x1130 [ 1114.939048][T10353] __sock_create+0x3a6/0x760 [ 1114.943490][T10353] __sys_socketpair+0x29f/0x6e0 [ 1114.948244][T10353] ? __ia32_sys_socket+0x90/0x90 [ 1114.953017][T10353] ? __ia32_sys_read+0x90/0x90 [ 1114.957615][T10353] __x64_sys_socketpair+0x9b/0xb0 [ 1114.962675][T10353] do_syscall_64+0x34/0x70 [ 1114.966904][T10353] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1114.972627][T10353] RIP: 0033:0x7f438952dbd9 [ 1114.976882][T10353] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1114.996408][T10353] RSP: 002b:00007f43887af048 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 1115.004655][T10353] RAX: ffffffffffffffda RBX: 00007f43896bbf60 RCX: 00007f438952dbd9 [ 1115.012476][T10353] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 1115.020277][T10353] RBP: 00007f43887af0a0 R08: 0000000000000000 R09: 0000000000000000 [ 1115.028173][T10353] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 1115.035992][T10353] R13: 000000000000000b R14: 00007f43896bbf60 R15: 00007ffcea20e128 [ 1115.242561][T10351] bridge0: port 3(veth0_to_batadv) entered blocking state [ 1115.257344][T10351] bridge0: port 3(veth0_to_batadv) entered disabled state [ 1115.317680][T10351] device veth0_to_batadv entered promiscuous mode [ 1115.334936][T10351] bridge0: port 3(veth0_to_batadv) entered blocking state [ 1115.343544][T10351] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 1115.394669][T10366] device veth0_vlan left promiscuous mode [ 1115.401806][T10366] device veth0_vlan entered promiscuous mode [ 1115.428433][ T4867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1115.436401][ T4867] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1115.471801][ T4867] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1115.581519][T10374] device sit0 entered promiscuous mode [ 1116.388643][T10401] FAULT_INJECTION: forcing a failure. [ 1116.388643][T10401] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1116.401676][T10401] CPU: 0 PID: 10401 Comm: syz.1.15397 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 1116.413552][T10401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1116.423437][T10401] Call Trace: [ 1116.426576][T10401] dump_stack_lvl+0x1e2/0x24b [ 1116.431216][T10401] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1116.436905][T10401] dump_stack+0x15/0x17 [ 1116.440895][T10401] should_fail+0x3c6/0x510 [ 1116.445147][T10401] should_fail_usercopy+0x1a/0x20 [ 1116.450010][T10401] _copy_from_user+0x20/0xd0 [ 1116.454441][T10401] sock_ioctl+0x648/0x760 [ 1116.458604][T10401] ? sock_poll+0x340/0x340 [ 1116.462858][T10401] ? security_file_ioctl+0x84/0xb0 [ 1116.467798][T10401] ? sock_poll+0x340/0x340 [ 1116.472054][T10401] __se_sys_ioctl+0x114/0x190 [ 1116.476568][T10401] __x64_sys_ioctl+0x7b/0x90 [ 1116.480993][T10401] do_syscall_64+0x34/0x70 [ 1116.485248][T10401] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1116.490979][T10401] RIP: 0033:0x7f438952dbd9 [ 1116.495229][T10401] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1116.514773][T10401] RSP: 002b:00007f43887af048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1116.523227][T10401] RAX: ffffffffffffffda RBX: 00007f43896bbf60 RCX: 00007f438952dbd9 [ 1116.530993][T10401] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 000000000000000a [ 1116.538974][T10401] RBP: 00007f43887af0a0 R08: 0000000000000000 R09: 0000000000000000 [ 1116.546983][T10401] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1116.554793][T10401] R13: 000000000000000b R14: 00007f43896bbf60 R15: 00007ffcea20e128 [ 1116.962309][T10438] FAULT_INJECTION: forcing a failure. [ 1116.962309][T10438] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1117.042454][T10438] CPU: 1 PID: 10438 Comm: syz.4.15412 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 1117.053728][T10438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1117.063620][T10438] Call Trace: [ 1117.066760][T10438] dump_stack_lvl+0x1e2/0x24b [ 1117.071267][T10438] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1117.076558][T10438] dump_stack+0x15/0x17 [ 1117.080550][T10438] should_fail+0x3c6/0x510 [ 1117.084805][T10438] should_fail_alloc_page+0x52/0x60 [ 1117.089846][T10438] __alloc_pages_nodemask+0x1b3/0xaf0 [ 1117.095049][T10438] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 1117.100438][T10438] kmalloc_order+0x4c/0x170 [ 1117.104767][T10438] kmalloc_order_trace+0x18/0x90 [ 1117.109542][T10438] ? alloc_skb_with_frags+0xa1/0x570 [ 1117.114663][T10438] __kmalloc_track_caller+0x1dd/0x320 [ 1117.119868][T10438] ? __alloc_skb+0x80/0x510 [ 1117.124203][T10438] ? alloc_skb_with_frags+0xa1/0x570 [ 1117.129325][T10438] __alloc_skb+0xbc/0x510 [ 1117.133496][T10438] alloc_skb_with_frags+0xa1/0x570 [ 1117.138439][T10438] ? 0xffffffffa00021e8 [ 1117.142434][T10438] ? is_bpf_text_address+0x172/0x190 [ 1117.147553][T10438] ? stack_trace_save+0x1c0/0x1c0 [ 1117.152413][T10438] sock_alloc_send_pskb+0x915/0xa50 [ 1117.157449][T10438] ? sock_kzfree_s+0x60/0x60 [ 1117.161874][T10438] ? stack_trace_snprint+0xf0/0xf0 [ 1117.166823][T10438] tun_get_user+0xe90/0x38f0 [ 1117.171248][T10438] ? _kstrtoull+0x3a0/0x4a0 [ 1117.175585][T10438] ? tun_do_read+0x1f60/0x1f60 [ 1117.180181][T10438] ? kstrtouint_from_user+0x20a/0x2a0 [ 1117.185395][T10438] ? kstrtol_from_user+0x310/0x310 [ 1117.190342][T10438] ? avc_policy_seqno+0x1b/0x70 [ 1117.195030][T10438] ? selinux_file_permission+0x2bb/0x560 [ 1117.200503][T10438] ? fsnotify_perm+0x67/0x4e0 [ 1117.205009][T10438] tun_chr_write_iter+0x1a8/0x250 [ 1117.209868][T10438] vfs_write+0xb55/0xe70 [ 1117.213949][T10438] ? kernel_write+0x3d0/0x3d0 [ 1117.218464][T10438] ? __fdget_pos+0x209/0x3a0 [ 1117.222883][T10438] ? ksys_write+0x77/0x2c0 [ 1117.227139][T10438] ksys_write+0x199/0x2c0 [ 1117.231311][T10438] ? __ia32_sys_read+0x90/0x90 [ 1117.235908][T10438] ? debug_smp_processor_id+0x17/0x20 [ 1117.241112][T10438] __x64_sys_write+0x7b/0x90 [ 1117.245546][T10438] do_syscall_64+0x34/0x70 [ 1117.249795][T10438] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1117.255866][T10438] RIP: 0033:0x7fb138373bd9 [ 1117.260122][T10438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1117.279561][T10438] RSP: 002b:00007fb1375f5048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1117.287806][T10438] RAX: ffffffffffffffda RBX: 00007fb138501f60 RCX: 00007fb138373bd9 [ 1117.295615][T10438] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 1117.303420][T10438] RBP: 00007fb1375f50a0 R08: 0000000000000000 R09: 0000000000000000 [ 1117.311231][T10438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1117.319044][T10438] R13: 000000000000000b R14: 00007fb138501f60 R15: 00007ffcebdad498 [ 1118.572517][T10524] syz.1.15444[10524] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1118.572567][T10524] syz.1.15444[10524] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1120.660265][T10624] syz.2.15478[10624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1120.707645][T10624] syz.2.15478[10624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1121.467932][T10658] device pim6reg1 entered promiscuous mode [ 1122.580192][T10693] FAULT_INJECTION: forcing a failure. [ 1122.580192][T10693] name failslab, interval 1, probability 0, space 0, times 0 [ 1122.592733][T10693] CPU: 0 PID: 10693 Comm: syz.2.15496 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 1122.603964][T10693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1122.613862][T10693] Call Trace: [ 1122.616992][T10693] dump_stack_lvl+0x1e2/0x24b [ 1122.621508][T10693] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1122.626885][T10693] dump_stack+0x15/0x17 [ 1122.630873][T10693] should_fail+0x3c6/0x510 [ 1122.635126][T10693] ? skb_ensure_writable+0x2d0/0x440 [ 1122.640247][T10693] __should_failslab+0xa4/0xe0 [ 1122.644854][T10693] should_failslab+0x9/0x20 [ 1122.649277][T10693] __kmalloc_track_caller+0x5f/0x320 [ 1122.654387][T10693] ? skb_ensure_writable+0x2d0/0x440 [ 1122.659511][T10693] pskb_expand_head+0x12b/0x1180 [ 1122.664284][T10693] ? __kasan_check_write+0x14/0x20 [ 1122.669245][T10693] skb_ensure_writable+0x2d0/0x440 [ 1122.674203][T10693] bpf_clone_redirect+0x117/0x390 [ 1122.679037][T10693] bpf_prog_5e3b4e18def6d727+0x56/0x90c [ 1122.684416][T10693] ? rcu_gp_kthread+0x490/0x23a0 [ 1122.689191][T10693] ? rcu_read_unlock_special+0xd8/0x4c0 [ 1122.694570][T10693] ? schedule_preempt_disabled+0x20/0x20 [ 1122.700039][T10693] ? __rcu_read_unlock+0x90/0x90 [ 1122.704816][T10693] ? __kasan_check_read+0x11/0x20 [ 1122.709671][T10693] ? bpf_test_timer_continue+0x140/0x440 [ 1122.715154][T10693] ? kvm_sched_clock_read+0x18/0x40 [ 1122.720182][T10693] ? sched_clock+0x3a/0x40 [ 1122.724428][T10693] bpf_test_run+0x7ec/0xc20 [ 1122.729105][T10693] ? convert___skb_to_skb+0x570/0x570 [ 1122.734301][T10693] ? eth_type_trans+0x2e4/0x620 [ 1122.738988][T10693] ? eth_get_headlen+0x240/0x240 [ 1122.743763][T10693] ? convert___skb_to_skb+0x44/0x570 [ 1122.748879][T10693] bpf_prog_test_run_skb+0xb6e/0x1410 [ 1122.754092][T10693] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 1122.759818][T10693] ? __kasan_check_write+0x14/0x20 [ 1122.764766][T10693] ? fput_many+0x160/0x1b0 [ 1122.769026][T10693] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 1122.774746][T10693] __se_sys_bpf+0x5235/0x11cb0 [ 1122.779345][T10693] ? stack_trace_save+0x113/0x1c0 [ 1122.784295][T10693] ? terminate_walk+0x407/0x4f0 [ 1122.788978][T10693] ? stack_trace_snprint+0xf0/0xf0 [ 1122.794100][T10693] ? kmem_cache_free+0xa9/0x1e0 [ 1122.798806][T10693] ? kmem_cache_free+0xa9/0x1e0 [ 1122.803470][T10693] ? kasan_set_track+0x5d/0x70 [ 1122.808072][T10693] ? kasan_set_track+0x4b/0x70 [ 1122.812680][T10693] ? kasan_set_free_info+0x23/0x40 [ 1122.817629][T10693] ? ____kasan_slab_free+0x121/0x160 [ 1122.822736][T10693] ? __kasan_slab_free+0x11/0x20 [ 1122.827513][T10693] ? __x64_sys_bpf+0x90/0x90 [ 1122.831938][T10693] ? memset+0x35/0x40 [ 1122.835761][T10693] ? _kstrtoull+0x3a0/0x4a0 [ 1122.840098][T10693] ? kstrtouint_from_user+0x20a/0x2a0 [ 1122.845307][T10693] ? kstrtol_from_user+0x310/0x310 [ 1122.850532][T10693] ? memset+0x35/0x40 [ 1122.854416][T10693] ? __fsnotify_parent+0x4b9/0x6c0 [ 1122.859369][T10693] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 1122.865962][T10693] ? proc_fail_nth_write+0x20b/0x290 [ 1122.871079][T10693] ? proc_fail_nth_read+0x210/0x210 [ 1122.876113][T10693] ? security_file_permission+0x86/0xb0 [ 1122.881501][T10693] ? rw_verify_area+0x1c3/0x360 [ 1122.886186][T10693] ? preempt_count_add+0x92/0x1a0 [ 1122.891044][T10693] ? vfs_write+0x854/0xe70 [ 1122.895296][T10693] ? kernel_write+0x3d0/0x3d0 [ 1122.899811][T10693] ? __kasan_check_write+0x14/0x20 [ 1122.904753][T10693] ? mutex_lock+0xa5/0x110 [ 1122.909005][T10693] ? mutex_trylock+0xa0/0xa0 [ 1122.913438][T10693] ? __kasan_check_write+0x14/0x20 [ 1122.918389][T10693] ? fput_many+0x160/0x1b0 [ 1122.922640][T10693] ? debug_smp_processor_id+0x17/0x20 [ 1122.927857][T10693] __x64_sys_bpf+0x7b/0x90 [ 1122.932099][T10693] do_syscall_64+0x34/0x70 [ 1122.936351][T10693] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1122.942076][T10693] RIP: 0033:0x7f4a3a4c3bd9 [ 1122.946328][T10693] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1122.965770][T10693] RSP: 002b:00007f4a39745048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1122.974013][T10693] RAX: ffffffffffffffda RBX: 00007f4a3a651f60 RCX: 00007f4a3a4c3bd9 [ 1122.981823][T10693] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 1122.989631][T10693] RBP: 00007f4a397450a0 R08: 0000000000000000 R09: 0000000000000000 [ 1122.997444][T10693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1123.005255][T10693] R13: 000000000000000b R14: 00007f4a3a651f60 R15: 00007ffe5ca5c8a8 [ 1123.292965][T10703] device pim6reg1 entered promiscuous mode [ 1123.858625][T10722] device pim6reg1 entered promiscuous mode [ 1125.408488][T10766] device pim6reg1 entered promiscuous mode [ 1127.679022][T10842] FAULT_INJECTION: forcing a failure. [ 1127.679022][T10842] name failslab, interval 1, probability 0, space 0, times 0 [ 1127.760695][T10842] CPU: 0 PID: 10842 Comm: syz.2.15551 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 1127.772138][T10842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1127.782028][T10842] Call Trace: [ 1127.785339][T10842] dump_stack_lvl+0x1e2/0x24b [ 1127.790112][T10842] ? panic+0x812/0x812 [ 1127.794013][T10842] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1127.799309][T10842] dump_stack+0x15/0x17 [ 1127.803292][T10842] should_fail+0x3c6/0x510 [ 1127.807548][T10842] ? sock_alloc_inode+0x1b/0xb0 [ 1127.812324][T10842] __should_failslab+0xa4/0xe0 [ 1127.816919][T10842] should_failslab+0x9/0x20 [ 1127.821265][T10842] kmem_cache_alloc+0x3d/0x2e0 [ 1127.825871][T10842] ? sockfs_init_fs_context+0xb0/0xb0 [ 1127.831154][T10842] sock_alloc_inode+0x1b/0xb0 [ 1127.835665][T10842] ? sockfs_init_fs_context+0xb0/0xb0 [ 1127.840876][T10842] new_inode_pseudo+0x64/0x220 [ 1127.845655][T10842] __sock_create+0x135/0x760 [ 1127.850080][T10842] __sys_socketpair+0x313/0x6e0 [ 1127.854849][T10842] ? __ia32_sys_socket+0x90/0x90 [ 1127.859622][T10842] ? __ia32_sys_read+0x90/0x90 [ 1127.864309][T10842] __x64_sys_socketpair+0x9b/0xb0 [ 1127.869170][T10842] do_syscall_64+0x34/0x70 [ 1127.873430][T10842] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1127.879146][T10842] RIP: 0033:0x7f4a3a4c3bd9 [ 1127.883491][T10842] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1127.903014][T10842] RSP: 002b:00007f4a39745048 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 1127.911363][T10842] RAX: ffffffffffffffda RBX: 00007f4a3a651f60 RCX: 00007f4a3a4c3bd9 [ 1127.919167][T10842] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 1127.926974][T10842] RBP: 00007f4a397450a0 R08: 0000000000000000 R09: 0000000000000000 [ 1127.934782][T10842] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 1127.942595][T10842] R13: 000000000000000b R14: 00007f4a3a651f60 R15: 00007ffe5ca5c8a8 [ 1127.976644][T10842] socket: no more sockets [ 1129.858044][ T946] device bridge_slave_1 left promiscuous mode [ 1129.864002][ T946] bridge0: port 2(bridge_slave_1) entered disabled state [ 1129.871437][ T946] device bridge_slave_0 left promiscuous mode [ 1129.877353][ T946] bridge0: port 1(bridge_slave_0) entered disabled state [ 1129.885041][ T946] device veth1_macvtap left promiscuous mode [ 1129.890900][ T946] device veth0_vlan left promiscuous mode [ 1131.423463][ T946] device veth0_to_batadv left promiscuous mode [ 1131.429547][ T946] bridge0: port 3(veth0_to_batadv) entered disabled state [ 1131.436654][ T946] device bridge_slave_1 left promiscuous mode [ 1131.442601][ T946] bridge0: port 2(bridge_slave_1) entered disabled state [ 1131.449742][ T946] device bridge_slave_0 left promiscuous mode [ 1131.455898][ T946] bridge0: port 1(bridge_slave_0) entered disabled state [ 1131.463908][ T946] device bridge_slave_1 left promiscuous mode [ 1131.470045][ T946] bridge0: port 2(bridge_slave_1) entered disabled state [ 1131.477236][ T946] device bridge_slave_0 left promiscuous mode [ 1131.483292][ T946] bridge0: port 1(bridge_slave_0) entered disabled state [ 1131.490981][ T946] device bridge_slave_1 left promiscuous mode [ 1131.497007][ T946] bridge0: port 2(bridge_slave_1) entered disabled state [ 1131.504276][ T946] device bridge_slave_0 left promiscuous mode [ 1131.510385][ T946] bridge0: port 1(bridge_slave_0) entered disabled state [ 1131.518423][ T946] device veth1_macvtap left promiscuous mode [ 1131.524341][ T946] device veth0_vlan left promiscuous mode [ 1131.530690][ T946] device veth0_vlan left promiscuous mode [ 1131.536468][ T946] device veth1_macvtap left promiscuous mode [ 1131.915093][T10932] bridge0: port 1(bridge_slave_0) entered blocking state [ 1131.922223][T10932] bridge0: port 1(bridge_slave_0) entered disabled state [ 1131.929872][T10932] device bridge_slave_0 entered promiscuous mode [ 1131.936713][T10932] bridge0: port 2(bridge_slave_1) entered blocking state [ 1131.943713][T10932] bridge0: port 2(bridge_slave_1) entered disabled state [ 1131.951089][T10932] device bridge_slave_1 entered promiscuous mode [ 1131.982286][T10932] bridge0: port 2(bridge_slave_1) entered blocking state [ 1131.989148][T10932] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1131.996242][T10932] bridge0: port 1(bridge_slave_0) entered blocking state [ 1132.003049][T10932] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1132.020287][ T4884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1132.027914][ T4884] bridge0: port 1(bridge_slave_0) entered disabled state [ 1132.034872][ T4884] bridge0: port 2(bridge_slave_1) entered disabled state [ 1132.053870][T10932] device veth0_vlan entered promiscuous mode [ 1132.060388][T28217] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1132.068926][T28217] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1132.076609][T28217] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1132.084104][T28217] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1132.091432][T28217] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1132.099440][T28217] bridge0: port 1(bridge_slave_0) entered blocking state [ 1132.106257][T28217] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1132.113714][T28217] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1132.121864][T28217] bridge0: port 2(bridge_slave_1) entered blocking state [ 1132.128714][T28217] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1132.136005][T28217] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1132.143856][T28217] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1132.155867][T10932] device veth1_macvtap entered promiscuous mode [ 1132.162688][ T4873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1132.176033][ T4873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1132.184322][ T4873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1132.572640][T10938] bridge0: port 1(bridge_slave_0) entered blocking state [ 1132.580057][T10938] bridge0: port 1(bridge_slave_0) entered disabled state [ 1132.587422][T10938] device bridge_slave_0 entered promiscuous mode [ 1132.594525][T10938] bridge0: port 2(bridge_slave_1) entered blocking state [ 1132.601439][T10938] bridge0: port 2(bridge_slave_1) entered disabled state [ 1132.608668][T10938] device bridge_slave_1 entered promiscuous mode [ 1132.640899][T10938] bridge0: port 2(bridge_slave_1) entered blocking state [ 1132.647757][T10938] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1132.654834][T10938] bridge0: port 1(bridge_slave_0) entered blocking state [ 1132.661662][T10938] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1132.678883][ T4873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1132.686354][ T4873] bridge0: port 1(bridge_slave_0) entered disabled state [ 1132.693473][ T4873] bridge0: port 2(bridge_slave_1) entered disabled state [ 1132.708391][T28214] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1132.716310][T28214] bridge0: port 1(bridge_slave_0) entered blocking state [ 1132.723087][T28214] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1132.730264][T28214] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1132.738631][T28214] bridge0: port 2(bridge_slave_1) entered blocking state [ 1132.745453][T28214] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1132.752826][T28214] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1132.760605][T28214] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1132.773244][ T4873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1132.784211][T10938] device veth0_vlan entered promiscuous mode [ 1132.791141][ T4884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1132.799121][ T4884] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1132.806381][ T4884] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1132.818092][T28213] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1132.827024][T10938] device veth1_macvtap entered promiscuous mode [ 1132.836136][T28213] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1132.846016][ T4884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1133.802878][T10955] FAULT_INJECTION: forcing a failure. [ 1133.802878][T10955] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1133.816244][T10955] CPU: 1 PID: 10955 Comm: syz.1.15580 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 1133.827517][T10955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1133.837479][T10955] Call Trace: [ 1133.840713][T10955] dump_stack_lvl+0x1e2/0x24b [ 1133.845294][T10955] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1133.850672][T10955] ? finish_task_switch+0x130/0x5a0 [ 1133.855706][T10955] dump_stack+0x15/0x17 [ 1133.859706][T10955] should_fail+0x3c6/0x510 [ 1133.863947][T10955] should_fail_usercopy+0x1a/0x20 [ 1133.868832][T10955] _copy_from_user+0x20/0xd0 [ 1133.873253][T10955] vti6_ioctl+0x41b/0x17d0 [ 1133.877510][T10955] ? schedule+0x154/0x1d0 [ 1133.881666][T10955] ? vti6_tnl_xmit+0x1780/0x1780 [ 1133.886441][T10955] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 1133.893179][T10955] ? preempt_count_add+0x92/0x1a0 [ 1133.897999][T10955] ? full_name_hash+0xbd/0xf0 [ 1133.902507][T10955] dev_ifsioc+0x6a1/0xae0 [ 1133.906678][T10955] ? dev_ioctl+0xb40/0xb40 [ 1133.911023][T10955] ? dev_get_by_name_rcu+0xc5/0xf0 [ 1133.916145][T10955] dev_ioctl+0x5cc/0xb40 [ 1133.920210][T10955] sock_ioctl+0x685/0x760 [ 1133.924383][T10955] ? sock_poll+0x340/0x340 [ 1133.928653][T10955] ? security_file_ioctl+0x84/0xb0 [ 1133.933669][T10955] ? sock_poll+0x340/0x340 [ 1133.937916][T10955] __se_sys_ioctl+0x114/0x190 [ 1133.942423][T10955] __x64_sys_ioctl+0x7b/0x90 [ 1133.946852][T10955] do_syscall_64+0x34/0x70 [ 1133.951107][T10955] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1133.956833][T10955] RIP: 0033:0x7f438952dbd9 [ 1133.961092][T10955] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1133.980538][T10955] RSP: 002b:00007f43887af048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1133.989589][T10955] RAX: ffffffffffffffda RBX: 00007f43896bbf60 RCX: 00007f438952dbd9 [ 1133.997387][T10955] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 000000000000000a [ 1134.005300][T10955] RBP: 00007f43887af0a0 R08: 0000000000000000 R09: 0000000000000000 [ 1134.013111][T10955] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1134.020907][T10955] R13: 000000000000000b R14: 00007f43896bbf60 R15: 00007ffcea20e128 [ 1134.076619][T10951] bridge0: port 1(bridge_slave_0) entered blocking state [ 1134.083573][T10951] bridge0: port 1(bridge_slave_0) entered disabled state [ 1134.091987][T10951] device bridge_slave_0 entered promiscuous mode [ 1134.099414][T10951] bridge0: port 2(bridge_slave_1) entered blocking state [ 1134.106556][T10951] bridge0: port 2(bridge_slave_1) entered disabled state [ 1134.114178][T10951] device bridge_slave_1 entered promiscuous mode [ 1134.212885][T10956] bridge0: port 1(bridge_slave_0) entered blocking state [ 1134.227462][T10956] bridge0: port 1(bridge_slave_0) entered disabled state [ 1134.242450][T10956] device bridge_slave_0 entered promiscuous mode [ 1134.263677][T10956] bridge0: port 2(bridge_slave_1) entered blocking state [ 1134.273890][T10956] bridge0: port 2(bridge_slave_1) entered disabled state [ 1134.284493][T10956] device bridge_slave_1 entered promiscuous mode SYZFAIL: proc resp pipe read failed n=-1 (errno 11: Resource temporarily unavailable) [ 1136.348335][ T438] device bridge_slave_1 left promiscuous mode [ 1136.354309][ T438] bridge0: port 2(bridge_slave_1) entered disabled state [ 1136.361792][ T438] device bridge_slave_0 left promiscuous mode [ 1136.367918][ T438] bridge0: port 1(bridge_slave_0) entered disabled state [ 1136.375531][ T438] device veth1_macvtap left promiscuous mode [ 1136.381432][ T438] device veth0_vlan left promiscuous mode [ 1137.888877][ T438] device bridge_slave_1 left promiscuous mode [ 1137.894827][ T438] bridge0: port 2(bridge_slave_1) entered disabled state [ 1137.902193][ T438] device bridge_slave_0 left promiscuous mode [ 1137.908223][ T438] bridge0: port 1(bridge_slave_0) entered disabled state [ 1137.916023][ T438] device bridge_slave_1 left promiscuous mode [ 1137.922047][ T438] bridge0: port 2(bridge_slave_1) entered disabled state [ 1137.932282][ T438] device bridge_slave_0 left promiscuous mode [ 1137.938365][ T438] bridge0: port 1(bridge_slave_0) entered disabled state [ 1137.945771][ T438] device bridge_slave_1 left promiscuous mode [ 1137.951818][ T438] bridge0: port 2(bridge_slave_1) entered disabled state [ 1137.959043][ T438] device bridge_slave_0 left promiscuous mode [ 1137.964945][ T438] bridge0: port 1(bridge_slave_0) entered disabled state [ 1137.972632][ T438] device bridge_slave_1 left promiscuous mode [ 1137.978579][ T438] bridge0: port 2(bridge_slave_1) entered disabled state [ 1137.985698][ T438] device bridge_slave_0 left promiscuous mode [ 1137.991728][ T438] bridge0: port 1(bridge_slave_0) entered disabled state [ 1137.999430][ T438] device veth1_macvtap left promiscuous mode [ 1138.005310][ T438] device veth0_vlan left promiscuous mode [ 1138.011175][ T438] device veth1_macvtap left promiscuous mode