last executing test programs: 720.293261ms ago: executing program 3 (id=5445): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000003c0)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000010000400404000001000000b7050000020000006a0a00fe00000000850000000b000000b70000000000000095000000000000009cc6b3fcd62c7d376238975d43a4505f80fc88943c4f0cf08e467b592f868ee30a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa3b1d4e984c46ea7e2a447a36f5662403e1b2be4cc7c2683908a0d411a9872971c7c56f0979bd10b97163c1d6d0e196bf02f46e8953ab1abda45cbe8d0d26b5069f8a98f7dc8f76b74635fc9f9de9ca3c00cb9bf4e418d07fa22f0610a70f2bdf4000000000000b0c2940dd8e263aa743f7555193161f45346b1004006000000e1ffff8816326d7d35c32aac1c7d5b5be399f6609876b5887437a172fbc02a74067529194e533583412dff048f0000000000000000b2728a04816cfb851cd364ff19ffcafe3e64be033c9d2f002cc93c1c13caec04a347383420336bec88c24a9fb6a6991ddb737d527d6acb15426415b6e8b14fdfa2c6e94bd0339454c13ad30000000000000003626165866c154e2514890000b515a1000000000000000eb2e9c15b6c8f6198282d0086fa0000c2ccf3f6d69cfcf1e15ea7a9e57aee78e12ace55736fa42811654e19a7e9b531636794a718b4766d744263b6681da2b2204d848619a3eb62e77460c048df8e72bfe31438163ec4270439b350274e5aa941bfc32ce08e3790dfb0c59bbe45cd27264669c187eed6d67b3be191137814bcb226b2078a1bc45502705d538d8723113445b08b0ac8dc2dfa17fd79ed5fd33b14b0adabf72df024dcde1ef330b927ce1a80474ce4f99a292c71456ec1abbfbb61dc9f0f71395a1751d35fa1"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r2, 0xffff0000, 0x10, 0x0, &(0x7f00000007c0)="2b206d0748010097737ea49da2aa0771", 0x0, 0xf000, 0x720e, 0x20, 0x0, 0x0, 0x0}, 0x50) 636.620178ms ago: executing program 3 (id=5448): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181200", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xd, 0x6, 0x4, 0x5, 0x0, r2}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 636.325348ms ago: executing program 2 (id=5449): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000080), &(0x7f0000000200)='%-010d \x00'}, 0x20) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="b400000000000080711137000000000016000000000000009500740000000000b402ec93b282c07873a8077854eaac347b467aff0b95b792ea215f28d0a539b1c071b2652544c7f45b83fe0a2d9481cbf5b321e17d749308e6983942ca38f2b80af1fb998fcd6e3dfca1cda87552ee6112f1d390185a"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195}, 0x22) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 635.953538ms ago: executing program 3 (id=5450): bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033300fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) 635.658148ms ago: executing program 2 (id=5451): bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e63"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, 0x0, 0xfdef) 623.255619ms ago: executing program 0 (id=5453): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200180000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000f80)=ANY=[@ANYBLOB="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"/3112], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xf, 0xf00, &(0x7f0000000100)="b9ff0b076859268cb89e14f088a847", 0x0, 0xf00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 605.84119ms ago: executing program 3 (id=5454): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], 0x0}, 0x90) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a5000000080000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e63"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 604.013251ms ago: executing program 2 (id=5455): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e63"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 566.638533ms ago: executing program 2 (id=5458): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r0}, &(0x7f0000000600), &(0x7f0000000640)}, 0x20) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 565.144634ms ago: executing program 3 (id=5460): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0x8, 0x8}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000800)={{r1}, &(0x7f0000000780), &(0x7f00000007c0)}, 0x20) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) close(0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0xfffffffc}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r6, r5, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/231, 0xe7}, 0x40010140) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000480)='+]\'-\\\x00') 564.168094ms ago: executing program 4 (id=5461): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181200", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xd, 0x6, 0x4, 0x5, 0x0, r2}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 506.479378ms ago: executing program 4 (id=5462): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000080), &(0x7f0000000200)='%-010d \x00'}, 0x20) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="b400000000000080711137000000000016000000000000009500740000000000b402ec93b282c07873a8077854eaac347b467aff0b95b792ea215f28d0a539b1c071b2652544c7f45b83fe0a2d9481cbf5b321e17d749308e6983942ca38f2b80af1fb998fcd6e3dfca1cda87552ee6112f1d390185a"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195}, 0x22) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 495.36822ms ago: executing program 3 (id=5463): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x2, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xb, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000006020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000280)=r4) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x90) write$cgroup_devices(r5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1e0306003c5c980128846360864666702c1ffe80"], 0xffdd) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r1}, &(0x7f0000000040), &(0x7f0000000140)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r6}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r9}, 0x10) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r10}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='track_foreign_dirty\x00', r11}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8922, &(0x7f0000000080)) 492.38385ms ago: executing program 0 (id=5464): bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033300fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) 476.283911ms ago: executing program 4 (id=5465): bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e63"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[], 0xfdef) 473.069381ms ago: executing program 2 (id=5466): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='percpu_alloc_percpu\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000280)='sched_switch\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x18, 0x10, &(0x7f00000004c0)=@raw=[@tail_call, @map_idx={0x18, 0x1, 0x5, 0x0, 0x6}, @exit, @ldst={0x1, 0x0, 0x1, 0xd, 0x4, 0x100, 0x8}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x6}, @ldst={0x1, 0x2, 0x5, 0x4, 0xb, 0xfffffffffffffff0}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @generic={0x8, 0x2, 0x7, 0x50c, 0xa1e}], &(0x7f00000006c0)='GPL\x00', 0x0, 0x2b, &(0x7f0000000700)=""/43, 0x20800, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000bc0)={0x2, 0xa, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c00)=[r0], &(0x7f0000000c40)=[{0x3, 0x1, 0xe, 0xb}, {0x1, 0x3, 0x4, 0x1}, {0x0, 0x5, 0x8, 0xa}, {0x5, 0x1, 0xd, 0x6}, {0x4, 0x2, 0x10, 0x1}], 0x10, 0x1}, 0x90) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000008000008500000006000000957076245b9f20111b348a765ba2ccc3f79777e125b35a37a8cefcf228ccd92c431f16a44ca041d8c78cebadaabf2eccdef6e5a391e1d295edbb22671e4b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) 464.211452ms ago: executing program 4 (id=5467): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc0189436, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x0, 0x0, 0x8}, 0x48) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x0, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="180800000000000000000000000000000013feff0400000018100000", @ANYRES32=r2, @ANYBLOB="00000000000000002c0006000000000018000000000095000000000000001800000006000000000000000900000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xde, &(0x7f0000000340)=""/222, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) close(r2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={0x0}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xd, 0x3, 0x4, 0x1, 0x0, r3}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x4, 0x8, 0x1}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xe, 0x0, 0x0, [{}]}]}}, &(0x7f0000000540)=""/252, 0x32, 0xfc, 0x1}, 0x20) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r6 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r6, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x18, 0xa, &(0x7f0000000680)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="000000000000001f6e0000000000000018100000", @ANYRES32=r7, @ANYBLOB="0000000800000000950000000000000095000000000000008a979cd1449f428129330edd901995442a759e170842a95f03dad4fe6212543a6a30"], &(0x7f0000000000)='GPL\x00', 0x6, 0xfdcb, &(0x7f0000000340)=""/238}, 0x80) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000380), 0x7, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r4}, &(0x7f0000000840), &(0x7f0000000880)=r3}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r4, &(0x7f0000000d40), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 432.564875ms ago: executing program 0 (id=5469): bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 432.374125ms ago: executing program 1 (id=5470): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1, 0x0, 0xffffffffffffffff, 0xf5010000}, 0x6d) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0x8, 0x8}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="b400000000000080711137000000000016000000000000009500740000000000b402ec93b282c07873a8077854eaac347b467aff0b95b792ea215f28d0a539b1c071b2652544c7f45b83fe0a2d9481cbf5b321e17d749308e6983942ca38f2b80af1fb998fcd6e3dfca1cda87552ee6112f1d390185a"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195}, 0x22) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 419.928936ms ago: executing program 1 (id=5471): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], 0x0}, 0x90) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a5000000080000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e63"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 419.596986ms ago: executing program 0 (id=5472): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181200", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xd, 0x6, 0x4, 0x5, 0x0, r2}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 410.749016ms ago: executing program 1 (id=5473): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e63"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 369.2602ms ago: executing program 4 (id=5474): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 368.432429ms ago: executing program 0 (id=5475): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000080), &(0x7f0000000200)='%-010d \x00'}, 0x20) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="b400000000000080711137000000000016000000000000009500740000000000b402ec93b282c07873a8077854eaac347b467aff0b95b792ea215f28d0a539b1c071b2652544c7f45b83fe0a2d9481cbf5b321e17d749308e6983942ca38f2b80af1fb998fcd6e3dfca1cda87552ee6112f1d390185a"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195}, 0x22) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 368.13809ms ago: executing program 4 (id=5476): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r0}, &(0x7f0000000600), &(0x7f0000000640)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 367.30986ms ago: executing program 1 (id=5477): bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e63"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[], 0xfdef) 357.429781ms ago: executing program 2 (id=5478): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000002c0)={&(0x7f0000000080)="94576282d4cceb90cb5c19e64a75df932ec16f370526b4e7742e6e36c2d87abb6e858aa2e07e918d4e3a8b75003d7355c60a4401e956551ba5fef376edfce0ddd1a247a10874605eee69911683f94b0ccdbb255fb31440c0ddb5320c29d7bd141cb1f7cd2c7c76767ea78c88a2a77ce8efb8c7783a0007aa6f6a2b803e0b0b90a1974a81de2874381cb39347a3", &(0x7f0000000140)=""/66, &(0x7f00000001c0)="c6f6dbcf3cb65ccfddd1868c5d308cee56bb63253a419f17b43ff6a0cc50f4a3ed70bde0b09817d2c795e1c8b36a7ad76b35c73d9e081520cf3039fd9059408cd2b0b6b21c9638134f9401ef9f54611fb9ac0d1fed575a5889f29c3ed39cb053aa69fd68a829b0224603b4fe31ba0bc5cc53e9ecf30501d0a198eb31cd142ac8d53196c5db5a2dc6938cfb64d96bcf292f617b8512bc3e28053a78901d03", &(0x7f0000000280)="4ccad79b6ff08d91e2ca2ba6554029c01d691215b2a0f3e67c8167503b6d850eb509a5fd637b3e359d519ebf9a49a90553a15e3ab190", 0x1, r1}, 0x38) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000300)={r1, r1}, 0xc) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x2, 0x10, 0x7, 0x97, 0x0, 0xa, 0x9adcacf70653211d, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000340), 0x1}, 0x800, 0x1000, 0x6, 0x9, 0x3, 0x7, 0x0, 0x0, 0x6, 0x0, 0xb0}, r0, 0x5, 0xffffffffffffffff, 0xe) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000480)={{r1, 0xffffffffffffffff}, &(0x7f0000000400), &(0x7f0000000440)}, 0x20) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0), 0x4) r4 = openat$cgroup_ro(r0, &(0x7f0000000500)='memory.numa_stat\x00', 0x0, 0x0) recvmsg(r1, &(0x7f00000018c0)={&(0x7f0000000540)=@hci, 0x80, &(0x7f0000001880)=[{&(0x7f00000005c0)=""/216, 0xd8}, {&(0x7f00000006c0)=""/188, 0xbc}, {&(0x7f0000000780)=""/207, 0xcf}, {&(0x7f0000000880)=""/4096, 0x1000}], 0x4}, 0x40012140) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001900)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0xfffffffe, '\x00', 0x0, r1, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001c40)={r4, 0xe0, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000001980)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, &(0x7f00000019c0)=[0x0, 0x0, 0x0], &(0x7f0000001a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xa0, &(0x7f0000001a40)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000001a80), &(0x7f0000001ac0), 0x8, 0xcd, 0x8, 0x8, &(0x7f0000001b00)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001c80)=@bloom_filter={0x1e, 0x401, 0x8, 0x7, 0x802, r5, 0x6, '\x00', r6, r1, 0x1, 0x2, 0x3, 0x2}, 0x48) write$cgroup_subtree(r1, &(0x7f0000001d00)={[{0x2d, 'rdma'}, {0x2b, 'pids'}, {0x2b, 'devices'}, {0x2d, 'rlimit'}, {0x2d, 'blkio'}, {0x2d, 'devices'}, {0x2d, 'rlimit'}, {0x2d, 'cpu'}, {0x2b, 'net_prio'}]}, 0x44) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001dc0)=@generic={&(0x7f0000001d80)='./file0\x00', r1}, 0x18) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001e00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f0000001e40)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) r10 = openat$cgroup_ro(r4, &(0x7f0000001f00)='memory.stat\x00', 0x0, 0x0) r11 = perf_event_open$cgroup(&(0x7f0000001f80)={0x1, 0x80, 0x3, 0x7f, 0xe, 0x5, 0x0, 0x1000, 0x80, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x46ec0d0f, 0x4, @perf_bp={&(0x7f0000001f40), 0x9}, 0x20, 0xc, 0x8, 0x1, 0x51, 0x83ed, 0x6, 0x0, 0x5}, r4, 0x0, 0xffffffffffffffff, 0xa) perf_event_open$cgroup(&(0x7f0000001e80)={0x2, 0x80, 0x6, 0xf7, 0x46, 0x3, 0x0, 0x8, 0x1180, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xaf3, 0x2, @perf_config_ext={0x2, 0x9}, 0x15000, 0x5, 0x5, 0x2, 0xff, 0xe00, 0x9, 0x0, 0x68000, 0x0, 0x2}, r10, 0x3, r11, 0x1) close(r3) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000002000)={0x1b, 0x0, 0x0, 0x7, 0x0, r2, 0x3, '\x00', r6, r9, 0x4, 0x1, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x1, 0x15, &(0x7f0000002080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@btf_id={0x18, 0x7, 0x3, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x4e}, @jmp={0x5, 0x0, 0x0, 0x3, 0x7, 0x1, 0x1}, @map_fd={0x18, 0x8, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000002140)='GPL\x00', 0x1000, 0xb8, &(0x7f0000002180)=""/184, 0x0, 0x0, '\x00', r6, 0xe, r10, 0x8, &(0x7f0000002240)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002280)={0x1, 0x8, 0xffff, 0x5}, 0x10, r7, r9, 0x9, &(0x7f00000022c0)=[r2], &(0x7f0000002300)=[{0x1, 0x5, 0xf, 0xa}, {0x2, 0x2, 0xb, 0xa}, {0x3, 0x1, 0x10, 0x1}, {0x1, 0x4, 0xa, 0xb}, {0x5, 0x1, 0xc, 0x2}, {0x2, 0x3, 0x8, 0x7}, {0x4, 0x1, 0x10, 0x7}, {0x1, 0x3, 0xf, 0x8}, {0x3, 0x2, 0xd, 0x7}], 0x10, 0xa}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002540)={&(0x7f0000002480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@int={0x9, 0x0, 0x0, 0x1, 0x0, 0x52, 0x0, 0x80}, @restrict={0xf, 0x0, 0x0, 0xb, 0x1}, @func={0x10, 0x0, 0x0, 0xc, 0x1}]}, {0x0, [0x2e, 0x61, 0x61]}}, &(0x7f0000002500), 0x45, 0x0, 0x1, 0x7fffffff}, 0x20) openat$cgroup_freezer_state(r9, &(0x7f0000002580), 0x2, 0x0) perf_event_open(&(0x7f00000025c0)={0x0, 0x80, 0x80, 0x3, 0x38, 0xc, 0x0, 0x8001, 0x0, 0x13, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffff8001, 0x0, @perf_config_ext={0x5f65, 0x1}, 0x10, 0x7, 0xfffffffa, 0x3, 0xf6a, 0x7, 0x9, 0x0, 0x4, 0x0, 0x4}, 0xffffffffffffffff, 0xe, r4, 0x1) r13 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000002640)='cgroup.threads\x00', 0x2, 0x0) r14 = getpid() write$cgroup_pid(r13, &(0x7f0000002680)=r14, 0x12) sendmsg$inet(r4, &(0x7f0000003940)={0x0, 0x0, &(0x7f0000003740)=[{&(0x7f00000026c0)="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", 0x1000}, {&(0x7f00000036c0)="c15d0416a16c8adec9ce7b371d1a198ae23a160ea051292975793516f879cfdf73d9fa52cc45f7b88c0b695e7652e5a9d58fbbb0093d2a719b2b182f439b5dbef64e05aa43ea0136fe41f75745ea", 0x4e}], 0x2, &(0x7f0000003780)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_tos_int={{0x14}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @empty, @multicast2}}}, @ip_retopts={{0x12c, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x3e, 0x0, 0x5, [0x80, 0xb, 0x3, 0xbe, 0x46cd4e7c]}, @timestamp_prespec={0x44, 0x4, 0x25, 0x3, 0x2}, @ssrr={0x89, 0x13, 0x34, [@empty, @dev={0xac, 0x14, 0x14, 0x24}, @dev={0xac, 0x14, 0x14, 0x1a}, @local]}, @cipso={0x86, 0x22, 0x2, [{0x2, 0xe, "873f8dc763fba80c3e207d97"}, {0x1, 0x4, "9961"}, {0x2, 0xa, "9b559f6e03683d47"}]}, @cipso={0x86, 0x4a, 0x1, [{0x6, 0xc, "c82f58c0770d4cdf1ffe"}, {0x5, 0x3, "f0"}, {0x5, 0x8, "a8480596ca1a"}, {0x5, 0x6, "e04181aa"}, {0x3, 0x3, 't'}, {0x2, 0x8, "5c0b8c5c979b"}, {0x0, 0x11, "6e6e0d9eee6200590079508679a634"}, {0x7, 0xb, "4bc80d5fd103fed3ef"}]}, @timestamp={0x44, 0x10, 0xa5, 0x0, 0x3, [0x1, 0x0, 0x1]}, @cipso={0x86, 0x45, 0xffffffffffffffff, [{0x7, 0x6, "ef0090cb"}, {0x0, 0x7, "dba1b236cb"}, {0x1, 0xe, "0a35b4cc844116b96d037f7c"}, {0x5, 0xe, "8f9a325f9cc84ccad9242ad8"}, {0x0, 0x9, "99b137606f8da2"}, {0x1, 0xd, "889e208793d83252881957"}]}, @timestamp_addr={0x44, 0x2c, 0x39, 0x1, 0x1, [{@local, 0x2}, {@broadcast, 0x4}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2da000}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x8}, {@empty, 0x6}]}]}}}], 0x1b0}, 0x24040014) bpf$MAP_CREATE(0x0, &(0x7f0000003980)=@bloom_filter={0x1e, 0x9, 0x2, 0x9, 0xa0, r5, 0xbcfb, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x1, 0xb}, 0x48) 350.554051ms ago: executing program 0 (id=5479): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0x8, 0x8}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000800)={{r1}, &(0x7f0000000780), &(0x7f00000007c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r5, r4, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r5}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r3, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) (fail_nth: 5) 350.193701ms ago: executing program 1 (id=5480): bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033300fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) 0s ago: executing program 1 (id=5481): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1, 0x0, 0xffffffffffffffff, 0xf5010000}, 0x6d) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0x8, 0x8}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="b400000000000080711137000000000016000000000000009500740000000000b402ec93b282c07873a8077854eaac347b467aff0b95b792ea215f28d0a539b1c071b2652544c7f45b83fe0a2d9481cbf5b321e17d749308e6983942ca38f2b80af1fb998fcd6e3dfca1cda87552ee6112f1d390185a"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195}, 0x22) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) kernel console output (not intermixed with test programs): ered promiscuous mode [ 158.815405][ T9548] device veth0_vlan left promiscuous mode [ 158.823860][ T9548] device veth0_vlan entered promiscuous mode [ 158.955629][ T9572] device pim6reg1 entered promiscuous mode [ 159.088209][ T9619] device pim6reg1 entered promiscuous mode [ 159.215746][ T9654] device pim6reg1 entered promiscuous mode [ 159.354477][ T9692] device pim6reg1 entered promiscuous mode [ 159.437192][ T9704] device veth0_vlan left promiscuous mode [ 159.463691][ T9704] device veth0_vlan entered promiscuous mode [ 159.537076][ T9733] device pim6reg1 entered promiscuous mode [ 159.558755][ T9736] device veth0_vlan left promiscuous mode [ 159.564894][ T9736] device veth0_vlan entered promiscuous mode [ 159.670814][ T9754] device veth0_vlan left promiscuous mode [ 159.711043][ T9754] device veth0_vlan entered promiscuous mode [ 159.746946][ T5203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 159.757971][ T5203] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 159.765418][ T5203] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 159.775145][ T9770] device veth0_vlan left promiscuous mode [ 159.783486][ T9770] device veth0_vlan entered promiscuous mode [ 159.805247][ T9775] device pim6reg1 entered promiscuous mode [ 159.841725][ T9778] device veth0_vlan left promiscuous mode [ 159.848027][ T9778] device veth0_vlan entered promiscuous mode [ 159.936870][ T9797] device veth0_vlan left promiscuous mode [ 159.971551][ T9797] device veth0_vlan entered promiscuous mode [ 160.026202][ T9816] device veth0_vlan left promiscuous mode [ 160.060336][ T9816] device veth0_vlan entered promiscuous mode [ 160.076588][ T9827] device pim6reg1 entered promiscuous mode [ 160.187084][ T9849] device veth0_vlan left promiscuous mode [ 160.235128][ T9849] device veth0_vlan entered promiscuous mode [ 160.307208][ T9866] device pim6reg1 entered promiscuous mode [ 160.372366][ T9876] device veth0_vlan left promiscuous mode [ 160.403748][ T9876] device veth0_vlan entered promiscuous mode [ 160.545777][ T9909] device veth0_vlan left promiscuous mode [ 160.642280][ T9909] device veth0_vlan entered promiscuous mode [ 160.657449][ T9934] device pim6reg1 entered promiscuous mode [ 160.670015][ T9931] device veth0_vlan left promiscuous mode [ 160.676248][ T9931] device veth0_vlan entered promiscuous mode [ 160.827095][ T9973] device veth0_vlan left promiscuous mode [ 160.833731][ T9973] device veth0_vlan entered promiscuous mode [ 160.853415][ T9959] device veth0_vlan left promiscuous mode [ 160.903576][ T9959] device veth0_vlan entered promiscuous mode [ 160.965596][ T9987] device pim6reg1 entered promiscuous mode [ 160.979485][ T9994] device veth0_vlan left promiscuous mode [ 161.013100][ T9994] device veth0_vlan entered promiscuous mode [ 161.076388][T10010] device veth0_vlan left promiscuous mode [ 161.089586][T10010] device veth0_vlan entered promiscuous mode [ 161.202122][T10038] device pim6reg1 entered promiscuous mode [ 161.243039][T10053] device veth0_vlan left promiscuous mode [ 161.249303][T10053] device veth0_vlan entered promiscuous mode [ 161.256939][T10045] device veth0_vlan left promiscuous mode [ 161.314213][T10045] device veth0_vlan entered promiscuous mode [ 161.419984][T10085] device veth0_vlan left promiscuous mode [ 161.431012][T10085] device veth0_vlan entered promiscuous mode [ 161.455332][T10096] device pim6reg1 entered promiscuous mode [ 161.511704][T10108] device veth0_vlan left promiscuous mode [ 161.602134][T10108] device veth0_vlan entered promiscuous mode [ 161.643391][T10136] device veth0_vlan left promiscuous mode [ 161.649881][T10136] device veth0_vlan entered promiscuous mode [ 161.667805][T10140] device pim6reg1 entered promiscuous mode [ 161.685384][T10133] device veth0_vlan left promiscuous mode [ 161.706336][T10133] device veth0_vlan entered promiscuous mode [ 161.713396][ T5203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 161.730447][ T5203] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 161.752805][ T5203] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 161.788625][T10163] device veth0_vlan left promiscuous mode [ 161.795436][T10163] device veth0_vlan entered promiscuous mode [ 161.859819][T10178] device veth0_vlan left promiscuous mode [ 161.874893][T10178] device veth0_vlan entered promiscuous mode [ 161.898237][ T30] audit: type=1400 audit(1721876866.539:151): avc: denied { ioctl } for pid=10196 comm="syz.4.4191" path="socket:[49955]" dev="sockfs" ino=49955 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 161.924449][T10193] device pim6reg1 entered promiscuous mode [ 161.939280][T10199] device pim6reg1 entered promiscuous mode [ 161.993178][T10213] device veth0_vlan left promiscuous mode [ 161.999488][T10213] device veth0_vlan entered promiscuous mode [ 162.079806][T10232] device pim6reg1 entered promiscuous mode [ 162.109708][T10230] device veth0_vlan left promiscuous mode [ 162.116676][T10230] device veth0_vlan entered promiscuous mode [ 162.128962][T10242] device pim6reg1 entered promiscuous mode [ 162.212162][T10254] device veth0_vlan left promiscuous mode [ 162.219397][T10254] device veth0_vlan entered promiscuous mode [ 162.248826][T10273] device wg2 entered promiscuous mode [ 162.327570][T10293] device pim6reg1 entered promiscuous mode [ 162.333924][T10289] device veth0_vlan left promiscuous mode [ 162.343141][T10289] device veth0_vlan entered promiscuous mode [ 162.398898][T10307] FAULT_INJECTION: forcing a failure. [ 162.398898][T10307] name failslab, interval 1, probability 0, space 0, times 0 [ 162.415133][T10307] CPU: 0 PID: 10307 Comm: syz.1.4245 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 162.424942][T10307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 162.434834][T10307] Call Trace: [ 162.437969][T10307] [ 162.440864][T10307] dump_stack_lvl+0x151/0x1b7 [ 162.445332][T10307] ? io_uring_drop_tctx_refs+0x190/0x190 [ 162.450797][T10307] ? avc_has_perm+0x16f/0x260 [ 162.455311][T10307] dump_stack+0x15/0x17 [ 162.459304][T10307] should_fail+0x3c6/0x510 [ 162.463555][T10307] __should_failslab+0xa4/0xe0 [ 162.468156][T10307] should_failslab+0x9/0x20 [ 162.472501][T10307] slab_pre_alloc_hook+0x37/0xd0 [ 162.477270][T10307] __kmalloc+0x6d/0x270 [ 162.481268][T10307] ? qdisc_alloc+0x75/0x770 [ 162.485602][T10307] qdisc_alloc+0x75/0x770 [ 162.489766][T10307] ? tun_device_event+0x3e5/0xf80 [ 162.494626][T10307] qdisc_create_dflt+0x6b/0x3e0 [ 162.499314][T10307] ? _raw_spin_lock+0xa4/0x1b0 [ 162.504088][T10307] dev_activate+0x2e0/0x1140 [ 162.508514][T10307] __dev_open+0x3bf/0x4e0 [ 162.512680][T10307] ? dev_open+0x260/0x260 [ 162.516846][T10307] ? _raw_spin_unlock_bh+0x51/0x60 [ 162.521795][T10307] ? dev_set_rx_mode+0x245/0x2e0 [ 162.526569][T10307] ? __kasan_check_read+0x11/0x20 [ 162.531425][T10307] __dev_change_flags+0x1db/0x6e0 [ 162.536288][T10307] ? avc_denied+0x1b0/0x1b0 [ 162.540625][T10307] ? dev_get_flags+0x1e0/0x1e0 [ 162.545227][T10307] ? _kstrtoull+0x3a0/0x4a0 [ 162.549569][T10307] dev_change_flags+0x8c/0x1a0 [ 162.554166][T10307] dev_ifsioc+0x147/0x10c0 [ 162.558421][T10307] ? dev_ioctl+0xe70/0xe70 [ 162.562669][T10307] ? mutex_lock+0xb6/0x1e0 [ 162.566923][T10307] ? wait_for_completion_killable_timeout+0x10/0x10 [ 162.573347][T10307] dev_ioctl+0x54d/0xe70 [ 162.577429][T10307] sock_do_ioctl+0x34f/0x5a0 [ 162.581852][T10307] ? sock_show_fdinfo+0xa0/0xa0 [ 162.586544][T10307] ? selinux_file_ioctl+0x3cc/0x540 [ 162.591668][T10307] sock_ioctl+0x455/0x740 [ 162.595832][T10307] ? sock_poll+0x400/0x400 [ 162.600096][T10307] ? __fget_files+0x31e/0x380 [ 162.604637][T10307] ? security_file_ioctl+0x84/0xb0 [ 162.609545][T10307] ? sock_poll+0x400/0x400 [ 162.613802][T10307] __se_sys_ioctl+0x114/0x190 [ 162.618320][T10307] __x64_sys_ioctl+0x7b/0x90 [ 162.622739][T10307] do_syscall_64+0x3d/0xb0 [ 162.626990][T10307] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 162.632720][T10307] RIP: 0033:0x7f144f92cf19 [ 162.636976][T10307] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 162.656412][T10307] RSP: 002b:00007f144e5ae048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 162.664659][T10307] RAX: ffffffffffffffda RBX: 00007f144fabcf60 RCX: 00007f144f92cf19 [ 162.672471][T10307] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 162.680280][T10307] RBP: 00007f144e5ae0a0 R08: 0000000000000000 R09: 0000000000000000 [ 162.688102][T10307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 162.695904][T10307] R13: 000000000000000b R14: 00007f144fabcf60 R15: 00007fffb1a54d88 [ 162.703719][T10307] [ 162.707809][T10307] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 162.715353][T10307] device pim6reg1 entered promiscuous mode [ 162.784791][T10332] device veth0_vlan left promiscuous mode [ 162.791244][T10332] device veth0_vlan entered promiscuous mode [ 162.818935][T10343] device pim6reg1 entered promiscuous mode [ 162.915486][T10370] device veth0_vlan left promiscuous mode [ 162.938416][T10370] device veth0_vlan entered promiscuous mode [ 162.953820][T10384] device pim6reg1 entered promiscuous mode [ 163.091632][T10418] device veth0_vlan left promiscuous mode [ 163.097848][T10418] device veth0_vlan entered promiscuous mode [ 163.151155][T10435] device pim6reg1 entered promiscuous mode [ 163.283999][T10463] device veth0_vlan left promiscuous mode [ 163.290512][T10463] device veth0_vlan entered promiscuous mode [ 163.475336][T10477] device pim6reg1 entered promiscuous mode [ 163.610641][T10487] device veth0_vlan left promiscuous mode [ 163.616790][T10487] device veth0_vlan entered promiscuous mode [ 163.872540][T10502] device pim6reg1 entered promiscuous mode [ 163.980061][T10512] device veth0_vlan left promiscuous mode [ 163.993147][T10512] device veth0_vlan entered promiscuous mode [ 164.062703][T10528] device pim6reg1 entered promiscuous mode [ 164.122573][T10552] device veth0_vlan left promiscuous mode [ 164.129141][T10552] device veth0_vlan entered promiscuous mode [ 164.160033][T10564] FAULT_INJECTION: forcing a failure. [ 164.160033][T10564] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 164.173304][T10564] CPU: 1 PID: 10564 Comm: syz.3.4366 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 164.183100][T10564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 164.192997][T10564] Call Trace: [ 164.196151][T10564] [ 164.198895][T10564] dump_stack_lvl+0x151/0x1b7 [ 164.203411][T10564] ? io_uring_drop_tctx_refs+0x190/0x190 [ 164.208875][T10564] ? kstrtouint_from_user+0x20a/0x2a0 [ 164.214084][T10564] dump_stack+0x15/0x17 [ 164.218349][T10564] should_fail+0x3c6/0x510 [ 164.222593][T10564] should_fail_usercopy+0x1a/0x20 [ 164.227449][T10564] _copy_to_user+0x20/0x90 [ 164.231702][T10564] simple_read_from_buffer+0xc7/0x150 [ 164.236909][T10564] proc_fail_nth_read+0x1a3/0x210 [ 164.241768][T10564] ? proc_fault_inject_write+0x390/0x390 [ 164.247237][T10564] ? fsnotify_perm+0x470/0x5d0 [ 164.251839][T10564] ? security_file_permission+0x86/0xb0 [ 164.257217][T10564] ? proc_fault_inject_write+0x390/0x390 [ 164.262685][T10564] vfs_read+0x27d/0xd40 [ 164.266678][T10564] ? kernel_read+0x1f0/0x1f0 [ 164.271105][T10564] ? __kasan_check_write+0x14/0x20 [ 164.276051][T10564] ? mutex_lock+0xb6/0x1e0 [ 164.280304][T10564] ? wait_for_completion_killable_timeout+0x10/0x10 [ 164.286728][T10564] ? __fdget_pos+0x2e7/0x3a0 [ 164.291153][T10564] ? ksys_read+0x77/0x2c0 [ 164.295320][T10564] ksys_read+0x199/0x2c0 [ 164.299399][T10564] ? vfs_write+0x1110/0x1110 [ 164.303825][T10564] ? debug_smp_processor_id+0x17/0x20 [ 164.309032][T10564] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 164.315022][T10564] __x64_sys_read+0x7b/0x90 [ 164.319363][T10564] do_syscall_64+0x3d/0xb0 [ 164.323612][T10564] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 164.329344][T10564] RIP: 0033:0x7fd73780d9fc [ 164.333607][T10564] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8c 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 1f 8d 02 00 48 [ 164.353036][T10564] RSP: 002b:00007fd736490040 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 164.361281][T10564] RAX: ffffffffffffffda RBX: 00007fd73799ef60 RCX: 00007fd73780d9fc [ 164.369095][T10564] RDX: 000000000000000f RSI: 00007fd7364900b0 RDI: 0000000000000004 [ 164.376940][T10564] RBP: 00007fd7364900a0 R08: 0000000000000000 R09: 0000000000000000 [ 164.384713][T10564] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 164.392524][T10564] R13: 000000000000000b R14: 00007fd73799ef60 R15: 00007fff1933c2e8 [ 164.400341][T10564] [ 164.445203][T10583] device pim6reg1 entered promiscuous mode [ 164.463974][T10587] device veth0_vlan left promiscuous mode [ 164.470675][T10587] device veth0_vlan entered promiscuous mode [ 164.578845][T10615] device veth0_vlan left promiscuous mode [ 164.588070][T10615] device veth0_vlan entered promiscuous mode [ 164.598458][T10621] device pim6reg1 entered promiscuous mode [ 164.695986][T10651] device veth0_vlan left promiscuous mode [ 164.702115][T10651] device veth0_vlan entered promiscuous mode [ 164.760190][T10667] device pim6reg1 entered promiscuous mode [ 164.823646][T10681] device veth0_vlan left promiscuous mode [ 164.829956][T10681] device veth0_vlan entered promiscuous mode [ 164.837327][T10680] device veth0_vlan left promiscuous mode [ 164.843385][T10680] device veth0_vlan entered promiscuous mode [ 164.863063][ T30] audit: type=1400 audit(1721876869.499:152): avc: denied { create } for pid=10682 comm="syz.2.4423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 164.874699][T10683] device sit0 entered promiscuous mode [ 165.011600][T10707] device pim6reg1 entered promiscuous mode [ 165.031792][T10709] device veth0_vlan left promiscuous mode [ 165.038234][T10709] device veth0_vlan entered promiscuous mode [ 165.129849][T10734] device veth0_vlan left promiscuous mode [ 165.136425][T10734] device veth0_vlan entered promiscuous mode [ 165.157545][T10741] device pim6reg1 entered promiscuous mode [ 165.171178][T10738] device veth0_vlan left promiscuous mode [ 165.177317][T10738] device veth0_vlan entered promiscuous mode [ 165.225396][T10745] device veth0_vlan left promiscuous mode [ 165.231725][T10745] device veth0_vlan entered promiscuous mode [ 165.300049][T10760] device veth0_vlan left promiscuous mode [ 165.306361][T10760] device veth0_vlan entered promiscuous mode [ 165.315411][T10763] device veth0_vlan left promiscuous mode [ 165.321526][T10763] device veth0_vlan entered promiscuous mode [ 165.352894][T10767] device pim6reg1 entered promiscuous mode [ 165.372936][T10769] device veth0_vlan left promiscuous mode [ 165.379363][T10769] device veth0_vlan entered promiscuous mode [ 165.462508][T10786] device veth0_vlan left promiscuous mode [ 165.469574][T10786] device veth0_vlan entered promiscuous mode [ 165.510456][T10796] device pim6reg1 entered promiscuous mode [ 165.516774][T10792] device veth0_vlan left promiscuous mode [ 165.523200][T10792] device veth0_vlan entered promiscuous mode [ 165.530127][T10794] device veth0_vlan left promiscuous mode [ 165.536334][T10794] device veth0_vlan entered promiscuous mode [ 165.619516][T10816] device veth0_vlan left promiscuous mode [ 165.625481][T10816] device veth0_vlan entered promiscuous mode [ 165.633236][T10818] device veth0_vlan left promiscuous mode [ 165.640390][T10818] device veth0_vlan entered promiscuous mode [ 165.705352][T10821] device veth0_vlan left promiscuous mode [ 165.711960][T10821] device veth0_vlan entered promiscuous mode [ 165.760551][T10835] device pim6reg1 entered promiscuous mode [ 166.051798][T10844] device veth0_vlan left promiscuous mode [ 166.059897][T10844] device veth0_vlan entered promiscuous mode [ 166.078973][T10850] device veth0_vlan left promiscuous mode [ 166.086761][T10850] device veth0_vlan entered promiscuous mode [ 166.100686][T10848] device veth0_vlan left promiscuous mode [ 166.108191][T10848] device veth0_vlan entered promiscuous mode [ 166.160362][T10866] FAULT_INJECTION: forcing a failure. [ 166.160362][T10866] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 166.166903][T10874] device pim6reg1 entered promiscuous mode [ 166.179066][T10866] CPU: 0 PID: 10866 Comm: syz.0.4512 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 166.188857][T10866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 166.198751][T10866] Call Trace: [ 166.201871][T10866] [ 166.204651][T10866] dump_stack_lvl+0x151/0x1b7 [ 166.209162][T10866] ? io_uring_drop_tctx_refs+0x190/0x190 [ 166.214631][T10866] ? kmem_cache_free+0x116/0x2e0 [ 166.219403][T10866] dump_stack+0x15/0x17 [ 166.223399][T10866] should_fail+0x3c6/0x510 [ 166.227650][T10866] should_fail_usercopy+0x1a/0x20 [ 166.232509][T10866] _copy_from_user+0x20/0xd0 [ 166.236936][T10866] __copy_msghdr_from_user+0xaf/0x7c0 [ 166.242147][T10866] ? __ia32_sys_shutdown+0x70/0x70 [ 166.247093][T10866] ___sys_sendmsg+0x166/0x2e0 [ 166.251690][T10866] ? __sys_sendmsg+0x260/0x260 [ 166.256314][T10866] ? __fdget+0x1bc/0x240 [ 166.260370][T10866] __se_sys_sendmsg+0x19a/0x260 [ 166.265061][T10866] ? __x64_sys_sendmsg+0x90/0x90 [ 166.269830][T10866] ? ksys_write+0x260/0x2c0 [ 166.274170][T10866] ? debug_smp_processor_id+0x17/0x20 [ 166.279375][T10866] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 166.285278][T10866] __x64_sys_sendmsg+0x7b/0x90 [ 166.289878][T10866] do_syscall_64+0x3d/0xb0 [ 166.294217][T10866] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 166.299949][T10866] RIP: 0033:0x7f422e313f19 [ 166.304203][T10866] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 166.324075][T10866] RSP: 002b:00007f422cf95048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 166.332320][T10866] RAX: ffffffffffffffda RBX: 00007f422e4a3f60 RCX: 00007f422e313f19 [ 166.340131][T10866] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000007 [ 166.347941][T10866] RBP: 00007f422cf950a0 R08: 0000000000000000 R09: 0000000000000000 [ 166.355752][T10866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 166.363562][T10866] R13: 000000000000000b R14: 00007f422e4a3f60 R15: 00007ffc0a0ec658 [ 166.371383][T10866] [ 166.430288][T10883] device veth0_vlan left promiscuous mode [ 166.437720][T10883] device veth0_vlan entered promiscuous mode [ 166.483063][T10900] device veth0_vlan left promiscuous mode [ 166.500533][T10900] device veth0_vlan entered promiscuous mode [ 166.540824][T10923] device pim6reg1 entered promiscuous mode [ 166.587052][T10935] FAULT_INJECTION: forcing a failure. [ 166.587052][T10935] name failslab, interval 1, probability 0, space 0, times 0 [ 166.603243][T10935] CPU: 0 PID: 10935 Comm: syz.0.4544 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 166.613048][T10935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 166.622943][T10935] Call Trace: [ 166.626066][T10935] [ 166.628841][T10935] dump_stack_lvl+0x151/0x1b7 [ 166.633357][T10935] ? io_uring_drop_tctx_refs+0x190/0x190 [ 166.638910][T10935] dump_stack+0x15/0x17 [ 166.642901][T10935] should_fail+0x3c6/0x510 [ 166.647154][T10935] __should_failslab+0xa4/0xe0 [ 166.651751][T10935] ? __alloc_skb+0xbe/0x550 [ 166.656091][T10935] should_failslab+0x9/0x20 [ 166.660430][T10935] slab_pre_alloc_hook+0x37/0xd0 [ 166.665206][T10935] ? __alloc_skb+0xbe/0x550 [ 166.669545][T10935] kmem_cache_alloc+0x44/0x200 [ 166.674144][T10935] __alloc_skb+0xbe/0x550 [ 166.678310][T10935] alloc_skb_with_frags+0xa6/0x680 [ 166.683259][T10935] ? is_bpf_text_address+0x172/0x190 [ 166.688378][T10935] ? stack_trace_save+0x1c0/0x1c0 [ 166.693237][T10935] sock_alloc_send_pskb+0x915/0xa50 [ 166.698275][T10935] ? sock_kzfree_s+0x60/0x60 [ 166.702696][T10935] ? bpf_bprintf_prepare+0x11b4/0x1450 [ 166.707991][T10935] ? bstr_printf+0x1020/0x10c0 [ 166.712594][T10935] tun_get_user+0xf1b/0x3aa0 [ 166.717020][T10935] ? memcpy+0x30/0x70 [ 166.720839][T10935] ? _kstrtoull+0x3a0/0x4a0 [ 166.725179][T10935] ? tun_do_read+0x1ef0/0x1ef0 [ 166.729777][T10935] ? kstrtouint_from_user+0x20a/0x2a0 [ 166.734986][T10935] ? kstrtol_from_user+0x310/0x310 [ 166.739933][T10935] ? bpf_trace_run3+0x123/0x250 [ 166.744619][T10935] ? avc_policy_seqno+0x1b/0x70 [ 166.749306][T10935] ? selinux_file_permission+0x2c4/0x570 [ 166.754774][T10935] tun_chr_write_iter+0x1e1/0x2e0 [ 166.759634][T10935] vfs_write+0xd5d/0x1110 [ 166.763803][T10935] ? kmem_cache_free+0x2c3/0x2e0 [ 166.768574][T10935] ? file_end_write+0x1c0/0x1c0 [ 166.773262][T10935] ? __fdget_pos+0x209/0x3a0 [ 166.777685][T10935] ? ksys_write+0x77/0x2c0 [ 166.781938][T10935] ksys_write+0x199/0x2c0 [ 166.786108][T10935] ? __ia32_sys_read+0x90/0x90 [ 166.790705][T10935] ? debug_smp_processor_id+0x17/0x20 [ 166.795911][T10935] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 166.801813][T10935] __x64_sys_write+0x7b/0x90 [ 166.806250][T10935] do_syscall_64+0x3d/0xb0 [ 166.810502][T10935] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 166.816223][T10935] RIP: 0033:0x7f422e313f19 [ 166.820478][T10935] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 166.839917][T10935] RSP: 002b:00007f422cf95048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 166.848161][T10935] RAX: ffffffffffffffda RBX: 00007f422e4a3f60 RCX: 00007f422e313f19 [ 166.855971][T10935] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 166.863781][T10935] RBP: 00007f422cf950a0 R08: 0000000000000000 R09: 0000000000000000 [ 166.871596][T10935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 166.879405][T10935] R13: 000000000000000b R14: 00007f422e4a3f60 R15: 00007ffc0a0ec658 [ 166.887219][T10935] [ 166.952344][T10947] device veth0_vlan left promiscuous mode [ 166.959328][T10947] device veth0_vlan entered promiscuous mode [ 166.967213][T10964] device pim6reg1 entered promiscuous mode [ 167.123218][T11001] device veth0_vlan left promiscuous mode [ 167.129387][T11001] device veth0_vlan entered promiscuous mode [ 167.135596][T11009] FAULT_INJECTION: forcing a failure. [ 167.135596][T11009] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 167.148665][T11009] CPU: 1 PID: 11009 Comm: syz.0.4580 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 167.151506][T11013] device pim6reg1 entered promiscuous mode [ 167.158459][T11009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 167.158473][T11009] Call Trace: [ 167.158478][T11009] [ 167.158485][T11009] dump_stack_lvl+0x151/0x1b7 [ 167.158507][T11009] ? io_uring_drop_tctx_refs+0x190/0x190 [ 167.158522][T11009] ? kmem_cache_free+0x116/0x2e0 [ 167.158541][T11009] dump_stack+0x15/0x17 [ 167.158556][T11009] should_fail+0x3c6/0x510 [ 167.158573][T11009] should_fail_usercopy+0x1a/0x20 [ 167.158589][T11009] _copy_from_user+0x20/0xd0 [ 167.212185][T11009] __copy_msghdr_from_user+0xaf/0x7c0 [ 167.217388][T11009] ? __ia32_sys_shutdown+0x70/0x70 [ 167.222337][T11009] ___sys_sendmsg+0x166/0x2e0 [ 167.226847][T11009] ? __sys_sendmsg+0x260/0x260 [ 167.231456][T11009] ? __fdget+0x1bc/0x240 [ 167.235527][T11009] __se_sys_sendmsg+0x19a/0x260 [ 167.240215][T11009] ? __x64_sys_sendmsg+0x90/0x90 [ 167.244988][T11009] ? ksys_write+0x260/0x2c0 [ 167.249330][T11009] ? debug_smp_processor_id+0x17/0x20 [ 167.254536][T11009] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 167.260437][T11009] __x64_sys_sendmsg+0x7b/0x90 [ 167.265036][T11009] do_syscall_64+0x3d/0xb0 [ 167.269289][T11009] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 167.275019][T11009] RIP: 0033:0x7f422e313f19 [ 167.279274][T11009] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 167.298711][T11009] RSP: 002b:00007f422cf95048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 167.306960][T11009] RAX: ffffffffffffffda RBX: 00007f422e4a3f60 RCX: 00007f422e313f19 [ 167.314782][T11009] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000007 [ 167.322578][T11009] RBP: 00007f422cf950a0 R08: 0000000000000000 R09: 0000000000000000 [ 167.330564][T11009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 167.338374][T11009] R13: 000000000000000b R14: 00007f422e4a3f60 R15: 00007ffc0a0ec658 [ 167.346190][T11009] [ 167.458784][T11049] device veth0_vlan left promiscuous mode [ 167.467025][T11049] device veth0_vlan entered promiscuous mode [ 167.512021][T11081] device pim6reg1 entered promiscuous mode [ 167.529140][T11076] FAULT_INJECTION: forcing a failure. [ 167.529140][T11076] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 167.542091][T11076] CPU: 0 PID: 11076 Comm: syz.2.4610 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 167.551782][T11076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 167.561678][T11076] Call Trace: [ 167.564800][T11076] [ 167.567580][T11076] dump_stack_lvl+0x151/0x1b7 [ 167.572092][T11076] ? io_uring_drop_tctx_refs+0x190/0x190 [ 167.577563][T11076] ? __kasan_check_write+0x14/0x20 [ 167.582596][T11076] dump_stack+0x15/0x17 [ 167.586587][T11076] should_fail+0x3c6/0x510 [ 167.590841][T11076] should_fail_usercopy+0x1a/0x20 [ 167.595700][T11076] _copy_from_user+0x20/0xd0 [ 167.600389][T11076] sock_do_ioctl+0x229/0x5a0 [ 167.604814][T11076] ? sock_show_fdinfo+0xa0/0xa0 [ 167.609675][T11076] ? selinux_file_ioctl+0x3cc/0x540 [ 167.614708][T11076] sock_ioctl+0x455/0x740 [ 167.618873][T11076] ? sock_poll+0x400/0x400 [ 167.623124][T11076] ? __fget_files+0x31e/0x380 [ 167.627641][T11076] ? security_file_ioctl+0x84/0xb0 [ 167.632587][T11076] ? sock_poll+0x400/0x400 [ 167.636839][T11076] __se_sys_ioctl+0x114/0x190 [ 167.641352][T11076] __x64_sys_ioctl+0x7b/0x90 [ 167.645777][T11076] do_syscall_64+0x3d/0xb0 [ 167.650030][T11076] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 167.655759][T11076] RIP: 0033:0x7f73ccd74f19 [ 167.660016][T11076] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 167.679453][T11076] RSP: 002b:00007f73cb9f6048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 167.687696][T11076] RAX: ffffffffffffffda RBX: 00007f73ccf04f60 RCX: 00007f73ccd74f19 [ 167.695857][T11076] RDX: 0000000020000900 RSI: 0000000000008946 RDI: 0000000000000048 [ 167.704101][T11076] RBP: 00007f73cb9f60a0 R08: 0000000000000000 R09: 0000000000000000 [ 167.711913][T11076] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 167.719725][T11076] R13: 000000000000000b R14: 00007f73ccf04f60 R15: 00007fffe8c04f48 [ 167.727541][T11076] [ 167.801488][T11104] device veth0_vlan left promiscuous mode [ 167.814283][T11104] device veth0_vlan entered promiscuous mode [ 167.829216][T11113] device pim6reg1 entered promiscuous mode [ 167.848010][T11126] FAULT_INJECTION: forcing a failure. [ 167.848010][T11126] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 167.868648][T11126] CPU: 0 PID: 11126 Comm: syz.2.4634 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 167.878454][T11126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 167.888350][T11126] Call Trace: [ 167.891472][T11126] [ 167.894249][T11126] dump_stack_lvl+0x151/0x1b7 [ 167.898761][T11126] ? io_uring_drop_tctx_refs+0x190/0x190 [ 167.904234][T11126] dump_stack+0x15/0x17 [ 167.908243][T11126] should_fail+0x3c6/0x510 [ 167.912475][T11126] should_fail_usercopy+0x1a/0x20 [ 167.917335][T11126] _copy_from_user+0x20/0xd0 [ 167.921759][T11126] __sys_bpf+0x1e9/0x760 [ 167.925839][T11126] ? fput_many+0x160/0x1b0 [ 167.930092][T11126] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 167.935301][T11126] ? debug_smp_processor_id+0x17/0x20 [ 167.940506][T11126] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 167.946407][T11126] __x64_sys_bpf+0x7c/0x90 [ 167.950663][T11126] do_syscall_64+0x3d/0xb0 [ 167.954914][T11126] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 167.960641][T11126] RIP: 0033:0x7f73ccd74f19 [ 167.964896][T11126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 167.984337][T11126] RSP: 002b:00007f73cb9f6048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 167.992583][T11126] RAX: ffffffffffffffda RBX: 00007f73ccf04f60 RCX: 00007f73ccd74f19 [ 168.000390][T11126] RDX: 0000000000000070 RSI: 00000000200000c0 RDI: 0000000000000005 [ 168.008202][T11126] RBP: 00007f73cb9f60a0 R08: 0000000000000000 R09: 0000000000000000 [ 168.016015][T11126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 168.023825][T11126] R13: 000000000000000b R14: 00007f73ccf04f60 R15: 00007fffe8c04f48 [ 168.031639][T11126] [ 168.079554][T11150] device pim6reg1 entered promiscuous mode [ 168.120026][T11166] device veth0_vlan left promiscuous mode [ 168.132301][T11166] device veth0_vlan entered promiscuous mode [ 168.153784][T11182] device pim6reg1 entered promiscuous mode [ 168.180110][T11186] device pim6reg1 entered promiscuous mode [ 168.278649][T11208] device veth0_vlan left promiscuous mode [ 168.290804][T11208] device veth0_vlan entered promiscuous mode [ 168.300877][T11214] device veth0_vlan left promiscuous mode [ 168.307658][T11214] device veth0_vlan entered promiscuous mode [ 168.322158][T11226] device pim6reg1 entered promiscuous mode [ 168.368988][T11237] FAULT_INJECTION: forcing a failure. [ 168.368988][T11237] name failslab, interval 1, probability 0, space 0, times 0 [ 168.383324][T11237] CPU: 1 PID: 11237 Comm: syz.4.4683 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 168.393124][T11237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 168.403016][T11237] Call Trace: [ 168.406139][T11237] [ 168.408931][T11237] dump_stack_lvl+0x151/0x1b7 [ 168.413443][T11237] ? io_uring_drop_tctx_refs+0x190/0x190 [ 168.418902][T11237] dump_stack+0x15/0x17 [ 168.422891][T11237] should_fail+0x3c6/0x510 [ 168.427330][T11237] __should_failslab+0xa4/0xe0 [ 168.431917][T11237] should_failslab+0x9/0x20 [ 168.436265][T11237] slab_pre_alloc_hook+0x37/0xd0 [ 168.441032][T11237] __kmalloc+0x6d/0x270 [ 168.445022][T11237] ? kvmalloc_node+0x1f0/0x4d0 [ 168.449625][T11237] kvmalloc_node+0x1f0/0x4d0 [ 168.454050][T11237] ? vm_mmap+0xb0/0xb0 [ 168.457957][T11237] ? __kasan_check_write+0x14/0x20 [ 168.462907][T11237] pfifo_fast_init+0x110/0x7a0 [ 168.467501][T11237] qdisc_create_dflt+0x144/0x3e0 [ 168.472272][T11237] ? _raw_spin_lock+0xa4/0x1b0 [ 168.476873][T11237] dev_activate+0x2e0/0x1140 [ 168.481302][T11237] __dev_open+0x3bf/0x4e0 [ 168.485465][T11237] ? dev_open+0x260/0x260 [ 168.489633][T11237] ? _raw_spin_unlock_bh+0x51/0x60 [ 168.494578][T11237] ? dev_set_rx_mode+0x245/0x2e0 [ 168.499353][T11237] ? __kasan_check_read+0x11/0x20 [ 168.504213][T11237] __dev_change_flags+0x1db/0x6e0 [ 168.509071][T11237] ? avc_denied+0x1b0/0x1b0 [ 168.513415][T11237] ? dev_get_flags+0x1e0/0x1e0 [ 168.518012][T11237] ? _kstrtoull+0x3a0/0x4a0 [ 168.522351][T11237] dev_change_flags+0x8c/0x1a0 [ 168.526952][T11237] dev_ifsioc+0x147/0x10c0 [ 168.531205][T11237] ? dev_ioctl+0xe70/0xe70 [ 168.535459][T11237] ? mutex_lock+0xb6/0x1e0 [ 168.539711][T11237] ? wait_for_completion_killable_timeout+0x10/0x10 [ 168.546135][T11237] dev_ioctl+0x54d/0xe70 [ 168.550213][T11237] sock_do_ioctl+0x34f/0x5a0 [ 168.554643][T11237] ? sock_show_fdinfo+0xa0/0xa0 [ 168.559326][T11237] ? selinux_file_ioctl+0x3cc/0x540 [ 168.564359][T11237] sock_ioctl+0x455/0x740 [ 168.568526][T11237] ? sock_poll+0x400/0x400 [ 168.572777][T11237] ? __fget_files+0x31e/0x380 [ 168.577292][T11237] ? security_file_ioctl+0x84/0xb0 [ 168.582236][T11237] ? sock_poll+0x400/0x400 [ 168.586489][T11237] __se_sys_ioctl+0x114/0x190 [ 168.591051][T11237] __x64_sys_ioctl+0x7b/0x90 [ 168.595427][T11237] do_syscall_64+0x3d/0xb0 [ 168.599683][T11237] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 168.605410][T11237] RIP: 0033:0x7fc3a06dff19 [ 168.609663][T11237] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 168.629104][T11237] RSP: 002b:00007fc39f361048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 168.637358][T11237] RAX: ffffffffffffffda RBX: 00007fc3a086ff60 RCX: 00007fc3a06dff19 [ 168.645168][T11237] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 168.652972][T11237] RBP: 00007fc39f3610a0 R08: 0000000000000000 R09: 0000000000000000 [ 168.660782][T11237] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 168.668595][T11237] R13: 000000000000000b R14: 00007fc3a086ff60 R15: 00007ffe9db36ba8 [ 168.676411][T11237] [ 168.680253][T11237] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 168.695358][T11237] device pim6reg1 entered promiscuous mode [ 168.732298][T11254] device veth0_vlan left promiscuous mode [ 168.740178][T11254] device veth0_vlan entered promiscuous mode [ 168.779878][T11270] device pim6reg1 entered promiscuous mode [ 168.805745][T11259] device veth0_vlan left promiscuous mode [ 168.812160][T11259] device veth0_vlan entered promiscuous mode [ 168.829219][T11278] Â: renamed from pim6reg1 [ 168.907502][T11295] device veth0_vlan left promiscuous mode [ 168.928542][T11295] device veth0_vlan entered promiscuous mode [ 168.958172][T11306] device pim6reg1 entered promiscuous mode [ 168.989941][T11310] device pim6reg1 entered promiscuous mode [ 169.025108][T11324] device veth0_vlan left promiscuous mode [ 169.035016][T11324] device veth0_vlan entered promiscuous mode [ 169.132838][T11339] device veth0_vlan left promiscuous mode [ 169.146593][T11339] device veth0_vlan entered promiscuous mode [ 169.163691][T11348] device pim6reg1 entered promiscuous mode [ 169.295644][T11391] device veth0_vlan left promiscuous mode [ 169.303614][T11391] device veth0_vlan entered promiscuous mode [ 169.315092][T11392] bond_slave_1: mtu less than device minimum [ 169.353623][T11396] device syzkaller0 entered promiscuous mode [ 169.399674][T11401] device pim6reg1 entered promiscuous mode [ 169.671823][T11434] device veth0_vlan left promiscuous mode [ 169.679970][T11434] device veth0_vlan entered promiscuous mode [ 169.889190][T11451] device pim6reg1 entered promiscuous mode [ 169.977726][T11471] device veth0_vlan left promiscuous mode [ 169.985214][T11471] device veth0_vlan entered promiscuous mode [ 170.000105][T11479] FAULT_INJECTION: forcing a failure. [ 170.000105][T11479] name failslab, interval 1, probability 0, space 0, times 0 [ 170.012868][T11479] CPU: 1 PID: 11479 Comm: syz.0.4800 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 170.022651][T11479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 170.032550][T11479] Call Trace: [ 170.035678][T11479] [ 170.038448][T11479] dump_stack_lvl+0x151/0x1b7 [ 170.042961][T11479] ? io_uring_drop_tctx_refs+0x190/0x190 [ 170.048428][T11479] ? new_inode_pseudo+0x93/0x220 [ 170.053201][T11479] ? proc_pid_make_inode+0x27/0x1d0 [ 170.058234][T11479] ? proc_pident_instantiate+0x7a/0x2e0 [ 170.063720][T11479] ? proc_pident_lookup+0x1c4/0x260 [ 170.068750][T11479] ? path_openat+0x1194/0x2f40 [ 170.073345][T11479] ? do_filp_open+0x21c/0x460 [ 170.077860][T11479] ? do_sys_openat2+0x13f/0x830 [ 170.082548][T11479] ? __x64_sys_openat+0x243/0x290 [ 170.087408][T11479] dump_stack+0x15/0x17 [ 170.091400][T11479] should_fail+0x3c6/0x510 [ 170.095661][T11479] __should_failslab+0xa4/0xe0 [ 170.100252][T11479] ? __alloc_skb+0xbe/0x550 [ 170.104591][T11479] should_failslab+0x9/0x20 [ 170.108934][T11479] slab_pre_alloc_hook+0x37/0xd0 [ 170.113707][T11479] ? __alloc_skb+0xbe/0x550 [ 170.118045][T11479] kmem_cache_alloc+0x44/0x200 [ 170.122647][T11479] __alloc_skb+0xbe/0x550 [ 170.126813][T11479] alloc_skb_with_frags+0xa6/0x680 [ 170.131762][T11479] ? memcpy+0x56/0x70 [ 170.135576][T11479] sock_alloc_send_pskb+0x915/0xa50 [ 170.140624][T11479] ? sock_kzfree_s+0x60/0x60 [ 170.145037][T11479] ? __kasan_check_write+0x14/0x20 [ 170.149992][T11479] ? _raw_spin_lock+0xa4/0x1b0 [ 170.154587][T11479] ? _raw_spin_trylock_bh+0x190/0x190 [ 170.159795][T11479] unix_dgram_sendmsg+0x6fd/0x2090 [ 170.164839][T11479] ? unix_dgram_poll+0x710/0x710 [ 170.169609][T11479] ? kmem_cache_free+0x116/0x2e0 [ 170.174382][T11479] ? ____kasan_slab_free+0x126/0x160 [ 170.179502][T11479] ? __kasan_slab_free+0x11/0x20 [ 170.184274][T11479] ? slab_free_freelist_hook+0xbd/0x190 [ 170.189658][T11479] ? security_socket_sendmsg+0x82/0xb0 [ 170.194960][T11479] ? unix_dgram_poll+0x710/0x710 [ 170.199725][T11479] ____sys_sendmsg+0x59e/0x8f0 [ 170.204327][T11479] ? __sys_sendmsg_sock+0x40/0x40 [ 170.209188][T11479] ? import_iovec+0xe5/0x120 [ 170.213614][T11479] ___sys_sendmsg+0x252/0x2e0 [ 170.218126][T11479] ? __sys_sendmsg+0x260/0x260 [ 170.222731][T11479] ? __fdget+0x1bc/0x240 [ 170.226804][T11479] __se_sys_sendmsg+0x19a/0x260 [ 170.231491][T11479] ? __x64_sys_sendmsg+0x90/0x90 [ 170.236264][T11479] ? ksys_write+0x260/0x2c0 [ 170.240606][T11479] ? debug_smp_processor_id+0x17/0x20 [ 170.245812][T11479] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 170.251717][T11479] __x64_sys_sendmsg+0x7b/0x90 [ 170.256314][T11479] do_syscall_64+0x3d/0xb0 [ 170.260575][T11479] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 170.266294][T11479] RIP: 0033:0x7f422e313f19 [ 170.270549][T11479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 170.289990][T11479] RSP: 002b:00007f422cf95048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 170.298236][T11479] RAX: ffffffffffffffda RBX: 00007f422e4a3f60 RCX: 00007f422e313f19 [ 170.306045][T11479] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000007 [ 170.313854][T11479] RBP: 00007f422cf950a0 R08: 0000000000000000 R09: 0000000000000000 [ 170.321756][T11479] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 170.329563][T11479] R13: 000000000000000b R14: 00007f422e4a3f60 R15: 00007ffc0a0ec658 [ 170.337382][T11479] [ 170.479841][T11503] device pim6reg1 entered promiscuous mode [ 170.586258][T11506] device veth0_vlan left promiscuous mode [ 170.646267][T11506] device veth0_vlan entered promiscuous mode [ 170.778288][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 170.809684][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 170.825250][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 170.885500][T11526] FAULT_INJECTION: forcing a failure. [ 170.885500][T11526] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 170.915733][T11526] CPU: 1 PID: 11526 Comm: syz.3.4822 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 170.925541][T11526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 170.935441][T11526] Call Trace: [ 170.938649][T11526] [ 170.941422][T11526] dump_stack_lvl+0x151/0x1b7 [ 170.945941][T11526] ? io_uring_drop_tctx_refs+0x190/0x190 [ 170.951404][T11526] ? stack_trace_save+0x113/0x1c0 [ 170.956264][T11526] dump_stack+0x15/0x17 [ 170.960254][T11526] should_fail+0x3c6/0x510 [ 170.964598][T11526] should_fail_alloc_page+0x5a/0x80 [ 170.969633][T11526] prepare_alloc_pages+0x15c/0x700 [ 170.974578][T11526] ? __alloc_pages_bulk+0xe40/0xe40 [ 170.979611][T11526] ? do_syscall_64+0x3d/0xb0 [ 170.984038][T11526] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 170.989939][T11526] __alloc_pages+0x18c/0x8f0 [ 170.994365][T11526] ? prep_new_page+0x110/0x110 [ 170.999054][T11526] kmalloc_order+0x4a/0x160 [ 171.003566][T11526] kmalloc_order_trace+0x1a/0xb0 [ 171.008337][T11526] ? alloc_skb_with_frags+0xa6/0x680 [ 171.013459][T11526] __kmalloc_track_caller+0x19b/0x260 [ 171.018667][T11526] ? kmem_cache_alloc+0xf5/0x200 [ 171.023440][T11526] ? alloc_skb_with_frags+0xa6/0x680 [ 171.028566][T11526] __alloc_skb+0x10c/0x550 [ 171.032821][T11526] alloc_skb_with_frags+0xa6/0x680 [ 171.037761][T11526] ? 0xffffffffa0028000 [ 171.041751][T11526] ? is_bpf_text_address+0x172/0x190 [ 171.046875][T11526] ? stack_trace_save+0x1c0/0x1c0 [ 171.051735][T11526] sock_alloc_send_pskb+0x915/0xa50 [ 171.056771][T11526] ? sock_kzfree_s+0x60/0x60 [ 171.061195][T11526] ? bpf_bprintf_prepare+0x11b4/0x1450 [ 171.066575][T11526] ? bstr_printf+0x1020/0x10c0 [ 171.071175][T11526] tun_get_user+0xf1b/0x3aa0 [ 171.075602][T11526] ? memcpy+0x30/0x70 [ 171.079420][T11526] ? _kstrtoull+0x3a0/0x4a0 [ 171.083768][T11526] ? tun_do_read+0x1ef0/0x1ef0 [ 171.088363][T11526] ? kstrtouint_from_user+0x20a/0x2a0 [ 171.093569][T11526] ? kstrtol_from_user+0x310/0x310 [ 171.098515][T11526] ? bpf_trace_run3+0x123/0x250 [ 171.103203][T11526] ? avc_policy_seqno+0x1b/0x70 [ 171.107889][T11526] ? selinux_file_permission+0x2c4/0x570 [ 171.113357][T11526] tun_chr_write_iter+0x1e1/0x2e0 [ 171.118219][T11526] vfs_write+0xd5d/0x1110 [ 171.122380][T11526] ? kmem_cache_free+0x2c3/0x2e0 [ 171.127156][T11526] ? file_end_write+0x1c0/0x1c0 [ 171.131847][T11526] ? __fdget_pos+0x209/0x3a0 [ 171.136268][T11526] ? ksys_write+0x77/0x2c0 [ 171.140522][T11526] ksys_write+0x199/0x2c0 [ 171.144688][T11526] ? __ia32_sys_read+0x90/0x90 [ 171.149291][T11526] ? debug_smp_processor_id+0x17/0x20 [ 171.154506][T11526] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 171.160403][T11526] __x64_sys_write+0x7b/0x90 [ 171.164836][T11526] do_syscall_64+0x3d/0xb0 [ 171.169253][T11526] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 171.174979][T11526] RIP: 0033:0x7fd73780ef19 [ 171.179232][T11526] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 171.198758][T11526] RSP: 002b:00007fd736490048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 171.207002][T11526] RAX: ffffffffffffffda RBX: 00007fd73799ef60 RCX: 00007fd73780ef19 [ 171.214814][T11526] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 171.222629][T11526] RBP: 00007fd7364900a0 R08: 0000000000000000 R09: 0000000000000000 [ 171.230523][T11526] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 171.238340][T11526] R13: 000000000000000b R14: 00007fd73799ef60 R15: 00007fff1933c2e8 [ 171.246150][T11526] [ 171.298174][T11540] device pim6reg1 entered promiscuous mode [ 171.507899][T11551] device veth0_vlan left promiscuous mode [ 171.522415][T11551] device veth0_vlan entered promiscuous mode [ 171.742633][T11580] device pim6reg1 entered promiscuous mode [ 172.119422][T11591] device veth0_vlan left promiscuous mode [ 172.126821][T11591] device veth0_vlan entered promiscuous mode [ 172.200470][T11607] device pim6reg1 entered promiscuous mode [ 172.398772][T11627] device veth0_vlan left promiscuous mode [ 172.457696][T11627] device veth0_vlan entered promiscuous mode [ 172.603341][T11653] device pim6reg1 entered promiscuous mode [ 172.666649][T11659] FAULT_INJECTION: forcing a failure. [ 172.666649][T11659] name failslab, interval 1, probability 0, space 0, times 0 [ 172.811535][T11659] CPU: 0 PID: 11659 Comm: syz.1.4885 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 172.821343][T11659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 172.831321][T11659] Call Trace: [ 172.834453][T11659] [ 172.837310][T11659] dump_stack_lvl+0x151/0x1b7 [ 172.841830][T11659] ? io_uring_drop_tctx_refs+0x190/0x190 [ 172.847295][T11659] ? new_inode_pseudo+0x93/0x220 [ 172.852070][T11659] ? proc_pid_make_inode+0x27/0x1d0 [ 172.857098][T11659] ? proc_pident_instantiate+0x7a/0x2e0 [ 172.862481][T11659] ? proc_pident_lookup+0x1c4/0x260 [ 172.867517][T11659] ? path_openat+0x1194/0x2f40 [ 172.872113][T11659] ? do_filp_open+0x21c/0x460 [ 172.876631][T11659] ? do_sys_openat2+0x13f/0x830 [ 172.881328][T11659] ? __x64_sys_openat+0x243/0x290 [ 172.886176][T11659] dump_stack+0x15/0x17 [ 172.890167][T11659] should_fail+0x3c6/0x510 [ 172.894417][T11659] __should_failslab+0xa4/0xe0 [ 172.899019][T11659] ? __alloc_skb+0xbe/0x550 [ 172.903357][T11659] should_failslab+0x9/0x20 [ 172.907696][T11659] slab_pre_alloc_hook+0x37/0xd0 [ 172.912473][T11659] ? __alloc_skb+0xbe/0x550 [ 172.916812][T11659] kmem_cache_alloc+0x44/0x200 [ 172.921409][T11659] __alloc_skb+0xbe/0x550 [ 172.925575][T11659] alloc_skb_with_frags+0xa6/0x680 [ 172.930522][T11659] ? memcpy+0x56/0x70 [ 172.934345][T11659] sock_alloc_send_pskb+0x915/0xa50 [ 172.939378][T11659] ? sock_kzfree_s+0x60/0x60 [ 172.943801][T11659] ? __kasan_check_write+0x14/0x20 [ 172.948748][T11659] ? _raw_spin_lock+0xa4/0x1b0 [ 172.953349][T11659] ? _raw_spin_trylock_bh+0x190/0x190 [ 172.958564][T11659] unix_dgram_sendmsg+0x6fd/0x2090 [ 172.963507][T11659] ? unix_dgram_poll+0x710/0x710 [ 172.968277][T11659] ? kmem_cache_free+0x116/0x2e0 [ 172.973139][T11659] ? ____kasan_slab_free+0x126/0x160 [ 172.978257][T11659] ? __kasan_slab_free+0x11/0x20 [ 172.983030][T11659] ? slab_free_freelist_hook+0xbd/0x190 [ 172.988414][T11659] ? security_socket_sendmsg+0x82/0xb0 [ 172.993707][T11659] ? unix_dgram_poll+0x710/0x710 [ 172.998482][T11659] ____sys_sendmsg+0x59e/0x8f0 [ 173.003082][T11659] ? __sys_sendmsg_sock+0x40/0x40 [ 173.007944][T11659] ? import_iovec+0xe5/0x120 [ 173.012367][T11659] ___sys_sendmsg+0x252/0x2e0 [ 173.016881][T11659] ? __sys_sendmsg+0x260/0x260 [ 173.021487][T11659] ? __fdget+0x1bc/0x240 [ 173.025561][T11659] __se_sys_sendmsg+0x19a/0x260 [ 173.030246][T11659] ? __x64_sys_sendmsg+0x90/0x90 [ 173.035020][T11659] ? ksys_write+0x260/0x2c0 [ 173.039361][T11659] ? debug_smp_processor_id+0x17/0x20 [ 173.044566][T11659] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 173.050469][T11659] __x64_sys_sendmsg+0x7b/0x90 [ 173.055084][T11659] do_syscall_64+0x3d/0xb0 [ 173.059320][T11659] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 173.065049][T11659] RIP: 0033:0x7f144f92cf19 [ 173.069304][T11659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 173.088749][T11659] RSP: 002b:00007f144e5ae048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 173.097004][T11659] RAX: ffffffffffffffda RBX: 00007f144fabcf60 RCX: 00007f144f92cf19 [ 173.104840][T11659] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000007 [ 173.112612][T11659] RBP: 00007f144e5ae0a0 R08: 0000000000000000 R09: 0000000000000000 [ 173.120421][T11659] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 173.128234][T11659] R13: 000000000000000b R14: 00007f144fabcf60 R15: 00007fffb1a54d88 [ 173.136051][T11659] [ 173.290925][T11674] device veth0_vlan left promiscuous mode [ 173.310474][T11674] device veth0_vlan entered promiscuous mode [ 173.320653][T11686] device pim6reg1 entered promiscuous mode [ 173.357800][T11708] FAULT_INJECTION: forcing a failure. [ 173.357800][T11708] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 173.371371][T11708] CPU: 0 PID: 11708 Comm: syz.1.4906 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 173.381163][T11708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 173.391060][T11708] Call Trace: [ 173.394266][T11708] [ 173.397043][T11708] dump_stack_lvl+0x151/0x1b7 [ 173.401559][T11708] ? io_uring_drop_tctx_refs+0x190/0x190 [ 173.407025][T11708] dump_stack+0x15/0x17 [ 173.411013][T11708] should_fail+0x3c6/0x510 [ 173.415270][T11708] should_fail_usercopy+0x1a/0x20 [ 173.420126][T11708] _copy_from_user+0x20/0xd0 [ 173.424554][T11708] __sys_bpf+0x1e9/0x760 [ 173.428635][T11708] ? fput_many+0x160/0x1b0 [ 173.432889][T11708] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 173.438097][T11708] ? debug_smp_processor_id+0x17/0x20 [ 173.443298][T11708] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 173.449203][T11708] __x64_sys_bpf+0x7c/0x90 [ 173.453454][T11708] do_syscall_64+0x3d/0xb0 [ 173.457708][T11708] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 173.463436][T11708] RIP: 0033:0x7f144f92cf19 [ 173.467692][T11708] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 173.487128][T11708] RSP: 002b:00007f144e5ae048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 173.495374][T11708] RAX: ffffffffffffffda RBX: 00007f144fabcf60 RCX: 00007f144f92cf19 [ 173.503187][T11708] RDX: 0000000000000070 RSI: 00000000200000c0 RDI: 0000000000000005 [ 173.510996][T11708] RBP: 00007f144e5ae0a0 R08: 0000000000000000 R09: 0000000000000000 [ 173.518807][T11708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 173.526620][T11708] R13: 000000000000000b R14: 00007f144fabcf60 R15: 00007fffb1a54d88 [ 173.534522][T11708] [ 173.655661][T11744] device pim6reg1 entered promiscuous mode [ 173.678280][T11740] device veth0_vlan left promiscuous mode [ 173.684883][T11740] device veth0_vlan entered promiscuous mode [ 173.906520][T11776] device veth0_vlan left promiscuous mode [ 173.922038][T11776] device veth0_vlan entered promiscuous mode [ 173.942420][T11779] FAULT_INJECTION: forcing a failure. [ 173.942420][T11779] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 173.959648][T11779] CPU: 1 PID: 11779 Comm: syz.1.4940 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 173.969447][T11779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 173.979343][T11779] Call Trace: [ 173.982468][T11779] [ 173.985242][T11779] dump_stack_lvl+0x151/0x1b7 [ 173.989859][T11779] ? io_uring_drop_tctx_refs+0x190/0x190 [ 173.995325][T11779] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 174.001923][T11779] dump_stack+0x15/0x17 [ 174.005912][T11779] should_fail+0x3c6/0x510 [ 174.010167][T11779] should_fail_usercopy+0x1a/0x20 [ 174.015039][T11779] _copy_from_user+0x20/0xd0 [ 174.019539][T11779] dev_ethtool+0x116/0x1540 [ 174.023882][T11779] ? ethtool_get_module_eeprom_call+0x1a0/0x1a0 [ 174.029959][T11779] ? __mutex_lock_slowpath+0xe/0x10 [ 174.034989][T11779] ? mutex_lock+0x135/0x1e0 [ 174.039327][T11779] ? wait_for_completion_killable_timeout+0x10/0x10 [ 174.045751][T11779] dev_ioctl+0x2a0/0xe70 [ 174.049831][T11779] sock_do_ioctl+0x34f/0x5a0 [ 174.054255][T11779] ? sock_show_fdinfo+0xa0/0xa0 [ 174.058942][T11779] ? selinux_file_ioctl+0x3cc/0x540 [ 174.063976][T11779] sock_ioctl+0x455/0x740 [ 174.068142][T11779] ? sock_poll+0x400/0x400 [ 174.072395][T11779] ? __fget_files+0x31e/0x380 [ 174.076911][T11779] ? security_file_ioctl+0x84/0xb0 [ 174.081941][T11779] ? sock_poll+0x400/0x400 [ 174.086194][T11779] __se_sys_ioctl+0x114/0x190 [ 174.090707][T11779] __x64_sys_ioctl+0x7b/0x90 [ 174.095139][T11779] do_syscall_64+0x3d/0xb0 [ 174.099397][T11779] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 174.105115][T11779] RIP: 0033:0x7f144f92cf19 [ 174.109370][T11779] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 174.128813][T11779] RSP: 002b:00007f144e5ae048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 174.137053][T11779] RAX: ffffffffffffffda RBX: 00007f144fabcf60 RCX: 00007f144f92cf19 [ 174.144867][T11779] RDX: 0000000020000900 RSI: 0000000000008946 RDI: 0000000000000048 [ 174.152677][T11779] RBP: 00007f144e5ae0a0 R08: 0000000000000000 R09: 0000000000000000 [ 174.160486][T11779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 174.168301][T11779] R13: 000000000000000b R14: 00007f144fabcf60 R15: 00007fffb1a54d88 [ 174.176114][T11779] [ 174.484047][T11814] device pim6reg1 entered promiscuous mode [ 174.490304][T11810] device veth0_vlan left promiscuous mode [ 174.497246][T11810] device veth0_vlan entered promiscuous mode [ 174.504676][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 174.513828][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 174.521242][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 174.552372][T11820] device veth0_vlan left promiscuous mode [ 174.559587][T11820] device veth0_vlan entered promiscuous mode [ 174.621468][T11846] FAULT_INJECTION: forcing a failure. [ 174.621468][T11846] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 174.634415][T11846] CPU: 1 PID: 11846 Comm: syz.3.4970 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 174.644123][T11846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 174.654016][T11846] Call Trace: [ 174.657137][T11846] [ 174.659916][T11846] dump_stack_lvl+0x151/0x1b7 [ 174.664430][T11846] ? io_uring_drop_tctx_refs+0x190/0x190 [ 174.669908][T11846] ? kstrtouint_from_user+0x20a/0x2a0 [ 174.675107][T11846] ? kstrtol_from_user+0x310/0x310 [ 174.680051][T11846] ? avc_has_perm_noaudit+0x348/0x430 [ 174.685260][T11846] dump_stack+0x15/0x17 [ 174.689250][T11846] should_fail+0x3c6/0x510 [ 174.693503][T11846] should_fail_usercopy+0x1a/0x20 [ 174.698370][T11846] strncpy_from_user+0x24/0x2d0 [ 174.703051][T11846] bpf_prog_load+0x185/0x1b50 [ 174.707564][T11846] ? map_freeze+0x370/0x370 [ 174.711906][T11846] ? selinux_bpf+0xcb/0x100 [ 174.716242][T11846] ? security_bpf+0x82/0xb0 [ 174.720586][T11846] __sys_bpf+0x4bc/0x760 [ 174.724663][T11846] ? fput_many+0x160/0x1b0 [ 174.728914][T11846] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 174.734123][T11846] ? debug_smp_processor_id+0x17/0x20 [ 174.739339][T11846] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 174.745234][T11846] __x64_sys_bpf+0x7c/0x90 [ 174.749486][T11846] do_syscall_64+0x3d/0xb0 [ 174.753743][T11846] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 174.759466][T11846] RIP: 0033:0x7fd73780ef19 [ 174.763717][T11846] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 174.783163][T11846] RSP: 002b:00007fd736490048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 174.791409][T11846] RAX: ffffffffffffffda RBX: 00007fd73799ef60 RCX: 00007fd73780ef19 [ 174.799219][T11846] RDX: 0000000000000070 RSI: 00000000200000c0 RDI: 0000000000000005 [ 174.807029][T11846] RBP: 00007fd7364900a0 R08: 0000000000000000 R09: 0000000000000000 [ 174.814837][T11846] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 174.822648][T11846] R13: 000000000000000b R14: 00007fd73799ef60 R15: 00007fff1933c2e8 [ 174.830466][T11846] [ 174.838867][T11851] device veth0_vlan left promiscuous mode [ 174.844964][T11851] device veth0_vlan entered promiscuous mode [ 174.868375][T11856] device syzkaller0 entered promiscuous mode [ 174.881095][T11858] device pim6reg1 entered promiscuous mode [ 174.954544][T11873] device veth0_vlan left promiscuous mode [ 174.968872][T11873] device veth0_vlan entered promiscuous mode [ 174.982301][T11881] device pim6reg1 entered promiscuous mode [ 175.001135][T11885] device veth0_vlan left promiscuous mode [ 175.008698][T11885] device veth0_vlan entered promiscuous mode [ 175.018753][T11887] FAULT_INJECTION: forcing a failure. [ 175.018753][T11887] name failslab, interval 1, probability 0, space 0, times 0 [ 175.031368][T11887] CPU: 1 PID: 11887 Comm: syz.1.4987 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 175.041160][T11887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 175.051220][T11887] Call Trace: [ 175.054344][T11887] [ 175.057213][T11887] dump_stack_lvl+0x151/0x1b7 [ 175.061720][T11887] ? io_uring_drop_tctx_refs+0x190/0x190 [ 175.067186][T11887] dump_stack+0x15/0x17 [ 175.071176][T11887] should_fail+0x3c6/0x510 [ 175.075431][T11887] __should_failslab+0xa4/0xe0 [ 175.080029][T11887] should_failslab+0x9/0x20 [ 175.084374][T11887] slab_pre_alloc_hook+0x37/0xd0 [ 175.089146][T11887] __kmalloc+0x6d/0x270 [ 175.093133][T11887] ? kvmalloc_node+0x1f0/0x4d0 [ 175.097734][T11887] kvmalloc_node+0x1f0/0x4d0 [ 175.102160][T11887] ? vm_mmap+0xb0/0xb0 [ 175.106066][T11887] ? __kasan_check_write+0x14/0x20 [ 175.111012][T11887] pfifo_fast_init+0x25e/0x7a0 [ 175.115617][T11887] qdisc_create_dflt+0x144/0x3e0 [ 175.120388][T11887] ? _raw_spin_lock+0xa4/0x1b0 [ 175.124987][T11887] dev_activate+0x2e0/0x1140 [ 175.129417][T11887] __dev_open+0x3bf/0x4e0 [ 175.133580][T11887] ? dev_open+0x260/0x260 [ 175.137747][T11887] ? _raw_spin_unlock_bh+0x51/0x60 [ 175.142692][T11887] ? dev_set_rx_mode+0x245/0x2e0 [ 175.147465][T11887] ? __kasan_check_read+0x11/0x20 [ 175.152423][T11887] __dev_change_flags+0x1db/0x6e0 [ 175.157274][T11887] ? avc_denied+0x1b0/0x1b0 [ 175.161613][T11887] ? dev_get_flags+0x1e0/0x1e0 [ 175.166212][T11887] ? _kstrtoull+0x3a0/0x4a0 [ 175.170555][T11887] dev_change_flags+0x8c/0x1a0 [ 175.175161][T11887] dev_ifsioc+0x147/0x10c0 [ 175.179492][T11887] ? dev_ioctl+0xe70/0xe70 [ 175.183743][T11887] ? mutex_lock+0xb6/0x1e0 [ 175.187997][T11887] ? wait_for_completion_killable_timeout+0x10/0x10 [ 175.194430][T11887] dev_ioctl+0x54d/0xe70 [ 175.198500][T11887] sock_do_ioctl+0x34f/0x5a0 [ 175.202926][T11887] ? sock_show_fdinfo+0xa0/0xa0 [ 175.207617][T11887] ? selinux_file_ioctl+0x3cc/0x540 [ 175.212646][T11887] sock_ioctl+0x455/0x740 [ 175.216813][T11887] ? sock_poll+0x400/0x400 [ 175.221063][T11887] ? __fget_files+0x31e/0x380 [ 175.225579][T11887] ? security_file_ioctl+0x84/0xb0 [ 175.230526][T11887] ? sock_poll+0x400/0x400 [ 175.234777][T11887] __se_sys_ioctl+0x114/0x190 [ 175.239296][T11887] __x64_sys_ioctl+0x7b/0x90 [ 175.243726][T11887] do_syscall_64+0x3d/0xb0 [ 175.247974][T11887] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 175.253711][T11887] RIP: 0033:0x7f144f92cf19 [ 175.257954][T11887] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 175.277481][T11887] RSP: 002b:00007f144e5ae048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 175.285724][T11887] RAX: ffffffffffffffda RBX: 00007f144fabcf60 RCX: 00007f144f92cf19 [ 175.293536][T11887] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 175.301347][T11887] RBP: 00007f144e5ae0a0 R08: 0000000000000000 R09: 0000000000000000 [ 175.309159][T11887] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 175.316972][T11887] R13: 000000000000000b R14: 00007f144fabcf60 R15: 00007fffb1a54d88 [ 175.324790][T11887] [ 175.330990][T11887] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 175.339105][T11887] device pim6reg1 entered promiscuous mode [ 175.375110][T11897] device pim6reg1 entered promiscuous mode [ 175.472073][T11912] device veth0_vlan left promiscuous mode [ 175.482852][T11912] device veth0_vlan entered promiscuous mode [ 175.492083][T11909] device veth0_vlan left promiscuous mode [ 175.501932][T11909] device veth0_vlan entered promiscuous mode [ 175.517033][ T5204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 175.528121][ T5204] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 175.537854][ T5204] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 175.602194][T11934] device pim6reg1 entered promiscuous mode [ 175.665272][T11948] device veth0_vlan left promiscuous mode [ 175.671245][T11948] device veth0_vlan entered promiscuous mode [ 175.829285][T11978] device pim6reg1 entered promiscuous mode [ 175.853053][T11972] device syzkaller0 entered promiscuous mode [ 175.859403][T11976] device veth0_vlan left promiscuous mode [ 175.865412][T11976] device veth0_vlan entered promiscuous mode [ 175.983348][T12004] device veth0_vlan left promiscuous mode [ 175.992371][T12004] device veth0_vlan entered promiscuous mode [ 176.003738][T12009] device pim6reg1 entered promiscuous mode [ 176.056796][T12021] FAULT_INJECTION: forcing a failure. [ 176.056796][T12021] name failslab, interval 1, probability 0, space 0, times 0 [ 176.071912][T12021] CPU: 0 PID: 12021 Comm: syz.3.5052 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 176.081846][T12021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 176.091817][T12021] Call Trace: [ 176.094940][T12021] [ 176.097717][T12021] dump_stack_lvl+0x151/0x1b7 [ 176.102230][T12021] ? io_uring_drop_tctx_refs+0x190/0x190 [ 176.107700][T12021] dump_stack+0x15/0x17 [ 176.111699][T12021] should_fail+0x3c6/0x510 [ 176.116031][T12021] __should_failslab+0xa4/0xe0 [ 176.120631][T12021] should_failslab+0x9/0x20 [ 176.124969][T12021] slab_pre_alloc_hook+0x37/0xd0 [ 176.129751][T12021] ? alloc_skb_with_frags+0xa6/0x680 [ 176.134867][T12021] __kmalloc_track_caller+0x6c/0x260 [ 176.139986][T12021] ? alloc_skb_with_frags+0xa6/0x680 [ 176.145109][T12021] ? alloc_skb_with_frags+0xa6/0x680 [ 176.150420][T12021] __alloc_skb+0x10c/0x550 [ 176.154661][T12021] alloc_skb_with_frags+0xa6/0x680 [ 176.159615][T12021] ? memcpy+0x56/0x70 [ 176.163436][T12021] sock_alloc_send_pskb+0x915/0xa50 [ 176.168467][T12021] ? sock_kzfree_s+0x60/0x60 [ 176.172906][T12021] ? __kasan_check_write+0x14/0x20 [ 176.177924][T12021] ? _raw_spin_lock+0xa4/0x1b0 [ 176.182519][T12021] ? _raw_spin_trylock_bh+0x190/0x190 [ 176.187814][T12021] unix_dgram_sendmsg+0x6fd/0x2090 [ 176.192764][T12021] ? unix_dgram_poll+0x710/0x710 [ 176.197531][T12021] ? kmem_cache_free+0x116/0x2e0 [ 176.202318][T12021] ? ____kasan_slab_free+0x126/0x160 [ 176.207532][T12021] ? __kasan_slab_free+0x11/0x20 [ 176.212288][T12021] ? slab_free_freelist_hook+0xbd/0x190 [ 176.217672][T12021] ? security_socket_sendmsg+0x82/0xb0 [ 176.222964][T12021] ? unix_dgram_poll+0x710/0x710 [ 176.227743][T12021] ____sys_sendmsg+0x59e/0x8f0 [ 176.232339][T12021] ? __sys_sendmsg_sock+0x40/0x40 [ 176.237197][T12021] ? import_iovec+0xe5/0x120 [ 176.241624][T12021] ___sys_sendmsg+0x252/0x2e0 [ 176.246138][T12021] ? __sys_sendmsg+0x260/0x260 [ 176.250745][T12021] ? __fdget+0x1bc/0x240 [ 176.254816][T12021] __se_sys_sendmsg+0x19a/0x260 [ 176.259503][T12021] ? __x64_sys_sendmsg+0x90/0x90 [ 176.264275][T12021] ? ksys_write+0x260/0x2c0 [ 176.268621][T12021] ? debug_smp_processor_id+0x17/0x20 [ 176.273823][T12021] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 176.279725][T12021] __x64_sys_sendmsg+0x7b/0x90 [ 176.284324][T12021] do_syscall_64+0x3d/0xb0 [ 176.288578][T12021] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 176.294306][T12021] RIP: 0033:0x7fd73780ef19 [ 176.298560][T12021] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 176.317998][T12021] RSP: 002b:00007fd736490048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 176.326246][T12021] RAX: ffffffffffffffda RBX: 00007fd73799ef60 RCX: 00007fd73780ef19 [ 176.334056][T12021] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000007 [ 176.341866][T12021] RBP: 00007fd7364900a0 R08: 0000000000000000 R09: 0000000000000000 [ 176.349678][T12021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 176.357489][T12021] R13: 000000000000000b R14: 00007fd73799ef60 R15: 00007fff1933c2e8 [ 176.365305][T12021] [ 176.460873][T12040] device veth0_vlan left promiscuous mode [ 176.467410][T12040] device veth0_vlan entered promiscuous mode [ 176.478377][T12046] device pim6reg1 entered promiscuous mode [ 176.610854][T12076] device veth0_vlan left promiscuous mode [ 176.617345][T12076] device veth0_vlan entered promiscuous mode [ 176.666812][T12080] FAULT_INJECTION: forcing a failure. [ 176.666812][T12080] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 176.680424][T12080] CPU: 1 PID: 12080 Comm: syz.2.5076 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 176.690336][T12080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 176.700223][T12080] Call Trace: [ 176.703346][T12080] [ 176.706126][T12080] dump_stack_lvl+0x151/0x1b7 [ 176.710637][T12080] ? io_uring_drop_tctx_refs+0x190/0x190 [ 176.716104][T12080] ? __kasan_check_write+0x14/0x20 [ 176.721049][T12080] ? __alloc_skb+0x355/0x550 [ 176.725493][T12080] dump_stack+0x15/0x17 [ 176.729475][T12080] should_fail+0x3c6/0x510 [ 176.733723][T12080] should_fail_usercopy+0x1a/0x20 [ 176.738949][T12080] _copy_from_iter+0x22f/0xdc0 [ 176.743546][T12080] ? copy_mc_pipe_to_iter+0x760/0x760 [ 176.748757][T12080] ? __check_object_size+0x2ec/0x3d0 [ 176.754062][T12080] skb_copy_datagram_from_iter+0x100/0x6d0 [ 176.759609][T12080] tun_get_user+0x112d/0x3aa0 [ 176.764115][T12080] ? kasan_set_track+0x4b/0x70 [ 176.768726][T12080] ? kasan_set_free_info+0x23/0x40 [ 176.773667][T12080] ? _kstrtoull+0x3a0/0x4a0 [ 176.778004][T12080] ? tun_do_read+0x1ef0/0x1ef0 [ 176.782602][T12080] ? kstrtouint_from_user+0x20a/0x2a0 [ 176.787944][T12080] ? kstrtol_from_user+0x310/0x310 [ 176.792898][T12080] ? prandom_u32_state+0x1f/0x180 [ 176.797748][T12080] ? avc_policy_seqno+0x1b/0x70 [ 176.802435][T12080] ? selinux_file_permission+0x2c4/0x570 [ 176.807905][T12080] tun_chr_write_iter+0x1e1/0x2e0 [ 176.812764][T12080] vfs_write+0xd5d/0x1110 [ 176.816930][T12080] ? kmem_cache_free+0x2c3/0x2e0 [ 176.821703][T12080] ? file_end_write+0x1c0/0x1c0 [ 176.826390][T12080] ? __fdget_pos+0x209/0x3a0 [ 176.830815][T12080] ? ksys_write+0x77/0x2c0 [ 176.835080][T12080] ksys_write+0x199/0x2c0 [ 176.839236][T12080] ? __ia32_sys_read+0x90/0x90 [ 176.843833][T12080] ? debug_smp_processor_id+0x17/0x20 [ 176.849048][T12080] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 176.854948][T12080] __x64_sys_write+0x7b/0x90 [ 176.859373][T12080] do_syscall_64+0x3d/0xb0 [ 176.863623][T12080] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 176.869352][T12080] RIP: 0033:0x7f73ccd74f19 [ 176.873611][T12080] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 176.893048][T12080] RSP: 002b:00007f73cb9f6048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 176.901378][T12080] RAX: ffffffffffffffda RBX: 00007f73ccf04f60 RCX: 00007f73ccd74f19 [ 176.909189][T12080] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 176.917005][T12080] RBP: 00007f73cb9f60a0 R08: 0000000000000000 R09: 0000000000000000 [ 176.924814][T12080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 176.932625][T12080] R13: 000000000000000b R14: 00007f73ccf04f60 R15: 00007fffe8c04f48 [ 176.940442][T12080] [ 176.979711][T12088] device pim6reg1 entered promiscuous mode [ 177.141377][T12102] device veth0_vlan left promiscuous mode [ 177.147640][T12102] device veth0_vlan entered promiscuous mode [ 177.183092][T12104] FAULT_INJECTION: forcing a failure. [ 177.183092][T12104] name failslab, interval 1, probability 0, space 0, times 0 [ 177.195612][T12104] CPU: 0 PID: 12104 Comm: syz.2.5088 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 177.205410][T12104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 177.215291][T12104] Call Trace: [ 177.218415][T12104] [ 177.221192][T12104] dump_stack_lvl+0x151/0x1b7 [ 177.225711][T12104] ? io_uring_drop_tctx_refs+0x190/0x190 [ 177.231177][T12104] dump_stack+0x15/0x17 [ 177.235165][T12104] should_fail+0x3c6/0x510 [ 177.239436][T12104] __should_failslab+0xa4/0xe0 [ 177.244021][T12104] ? __alloc_skb+0xbe/0x550 [ 177.248357][T12104] should_failslab+0x9/0x20 [ 177.252789][T12104] slab_pre_alloc_hook+0x37/0xd0 [ 177.257557][T12104] ? __alloc_skb+0xbe/0x550 [ 177.261894][T12104] kmem_cache_alloc+0x44/0x200 [ 177.266497][T12104] __alloc_skb+0xbe/0x550 [ 177.270663][T12104] alloc_skb_with_frags+0xa6/0x680 [ 177.275625][T12104] ? 0xffffffffa0028000 [ 177.279601][T12104] ? is_bpf_text_address+0x172/0x190 [ 177.284722][T12104] ? stack_trace_save+0x1c0/0x1c0 [ 177.289585][T12104] sock_alloc_send_pskb+0x915/0xa50 [ 177.294623][T12104] ? sock_kzfree_s+0x60/0x60 [ 177.299043][T12104] ? stack_trace_snprint+0xf0/0xf0 [ 177.303994][T12104] ? __stack_depot_save+0x34/0x470 [ 177.308938][T12104] tun_get_user+0xf1b/0x3aa0 [ 177.313725][T12104] ? kasan_set_track+0x4b/0x70 [ 177.318669][T12104] ? kasan_set_free_info+0x23/0x40 [ 177.323634][T12104] ? _kstrtoull+0x3a0/0x4a0 [ 177.327948][T12104] ? tun_do_read+0x1ef0/0x1ef0 [ 177.332811][T12104] ? kstrtouint_from_user+0x20a/0x2a0 [ 177.338013][T12104] ? kstrtol_from_user+0x310/0x310 [ 177.342961][T12104] ? avc_policy_seqno+0x1b/0x70 [ 177.347742][T12104] ? selinux_file_permission+0x2c4/0x570 [ 177.353292][T12104] tun_chr_write_iter+0x1e1/0x2e0 [ 177.358337][T12104] vfs_write+0xd5d/0x1110 [ 177.362488][T12104] ? kmem_cache_free+0x116/0x2e0 [ 177.367264][T12104] ? file_end_write+0x1c0/0x1c0 [ 177.371951][T12104] ? __fdget_pos+0x209/0x3a0 [ 177.376376][T12104] ? ksys_write+0x77/0x2c0 [ 177.380715][T12104] ksys_write+0x199/0x2c0 [ 177.384980][T12104] ? __ia32_sys_read+0x90/0x90 [ 177.389572][T12104] ? debug_smp_processor_id+0x17/0x20 [ 177.394787][T12104] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 177.400678][T12104] __x64_sys_write+0x7b/0x90 [ 177.405123][T12104] do_syscall_64+0x3d/0xb0 [ 177.409354][T12104] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 177.415102][T12104] RIP: 0033:0x7f73ccd74f19 [ 177.419398][T12104] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 177.438781][T12104] RSP: 002b:00007f73cb9f6048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 177.447021][T12104] RAX: ffffffffffffffda RBX: 00007f73ccf04f60 RCX: 00007f73ccd74f19 [ 177.454832][T12104] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 177.462646][T12104] RBP: 00007f73cb9f60a0 R08: 0000000000000000 R09: 0000000000000000 [ 177.470453][T12104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 177.478272][T12104] R13: 000000000000000b R14: 00007f73ccf04f60 R15: 00007fffe8c04f48 [ 177.486092][T12104] [ 177.518916][T12112] device pim6reg1 entered promiscuous mode [ 177.611240][T12128] device veth0_vlan left promiscuous mode [ 177.617738][T12128] device veth0_vlan entered promiscuous mode [ 177.681826][T12131] device veth0_vlan left promiscuous mode [ 177.695477][T12131] device veth0_vlan entered promiscuous mode [ 177.723351][T12153] device pim6reg1 entered promiscuous mode [ 177.752130][T12157] device veth0_vlan left promiscuous mode [ 177.758489][T12157] device veth0_vlan entered promiscuous mode [ 177.845923][T12179] FAULT_INJECTION: forcing a failure. [ 177.845923][T12179] name failslab, interval 1, probability 0, space 0, times 0 [ 177.871011][T12179] CPU: 1 PID: 12179 Comm: syz.0.5123 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 177.880823][T12179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 177.890716][T12179] Call Trace: [ 177.893841][T12179] [ 177.896618][T12179] dump_stack_lvl+0x151/0x1b7 [ 177.901129][T12179] ? io_uring_drop_tctx_refs+0x190/0x190 [ 177.906599][T12179] dump_stack+0x15/0x17 [ 177.910589][T12179] should_fail+0x3c6/0x510 [ 177.914842][T12179] __should_failslab+0xa4/0xe0 [ 177.919447][T12179] should_failslab+0x9/0x20 [ 177.923783][T12179] slab_pre_alloc_hook+0x37/0xd0 [ 177.928556][T12179] ? alloc_skb_with_frags+0xa6/0x680 [ 177.933677][T12179] __kmalloc_track_caller+0x6c/0x260 [ 177.938796][T12179] ? alloc_skb_with_frags+0xa6/0x680 [ 177.943928][T12179] ? alloc_skb_with_frags+0xa6/0x680 [ 177.949047][T12179] __alloc_skb+0x10c/0x550 [ 177.953294][T12179] alloc_skb_with_frags+0xa6/0x680 [ 177.958239][T12179] ? memcpy+0x56/0x70 [ 177.962057][T12179] sock_alloc_send_pskb+0x915/0xa50 [ 177.967096][T12179] ? sock_kzfree_s+0x60/0x60 [ 177.971516][T12179] ? __kasan_check_write+0x14/0x20 [ 177.976475][T12179] ? _raw_spin_lock+0xa4/0x1b0 [ 177.981067][T12179] ? _raw_spin_trylock_bh+0x190/0x190 [ 177.986275][T12179] unix_dgram_sendmsg+0x6fd/0x2090 [ 177.991233][T12179] ? unix_dgram_poll+0x710/0x710 [ 177.995993][T12179] ? kmem_cache_free+0x116/0x2e0 [ 178.000765][T12179] ? ____kasan_slab_free+0x126/0x160 [ 178.005887][T12179] ? __kasan_slab_free+0x11/0x20 [ 178.010667][T12179] ? slab_free_freelist_hook+0xbd/0x190 [ 178.016043][T12179] ? security_socket_sendmsg+0x82/0xb0 [ 178.021334][T12179] ? unix_dgram_poll+0x710/0x710 [ 178.026109][T12179] ____sys_sendmsg+0x59e/0x8f0 [ 178.030711][T12179] ? __sys_sendmsg_sock+0x40/0x40 [ 178.035571][T12179] ? import_iovec+0xe5/0x120 [ 178.039997][T12179] ___sys_sendmsg+0x252/0x2e0 [ 178.044512][T12179] ? __sys_sendmsg+0x260/0x260 [ 178.049116][T12179] ? __fdget+0x1bc/0x240 [ 178.053188][T12179] __se_sys_sendmsg+0x19a/0x260 [ 178.057877][T12179] ? __x64_sys_sendmsg+0x90/0x90 [ 178.062669][T12179] ? ksys_write+0x260/0x2c0 [ 178.066997][T12179] ? debug_smp_processor_id+0x17/0x20 [ 178.072198][T12179] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 178.078104][T12179] __x64_sys_sendmsg+0x7b/0x90 [ 178.082704][T12179] do_syscall_64+0x3d/0xb0 [ 178.086950][T12179] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 178.092679][T12179] RIP: 0033:0x7f422e313f19 [ 178.096932][T12179] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 178.116372][T12179] RSP: 002b:00007f422cf95048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 178.124708][T12179] RAX: ffffffffffffffda RBX: 00007f422e4a3f60 RCX: 00007f422e313f19 [ 178.132514][T12179] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000007 [ 178.140327][T12179] RBP: 00007f422cf950a0 R08: 0000000000000000 R09: 0000000000000000 [ 178.148138][T12179] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 178.155956][T12179] R13: 000000000000000b R14: 00007f422e4a3f60 R15: 00007ffc0a0ec658 [ 178.163777][T12179] [ 178.178387][T12185] device pim6reg1 entered promiscuous mode [ 178.190638][T12181] device veth0_vlan left promiscuous mode [ 178.196753][T12181] device veth0_vlan entered promiscuous mode [ 178.250586][T12194] device veth0_vlan left promiscuous mode [ 178.261770][T12194] device veth0_vlan entered promiscuous mode [ 178.282545][T12210] FAULT_INJECTION: forcing a failure. [ 178.282545][T12210] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 178.295479][T12210] CPU: 0 PID: 12210 Comm: syz.3.5138 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 178.305365][T12210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 178.315273][T12210] Call Trace: [ 178.318383][T12210] [ 178.321163][T12210] dump_stack_lvl+0x151/0x1b7 [ 178.325688][T12210] ? io_uring_drop_tctx_refs+0x190/0x190 [ 178.331142][T12210] ? kstrtouint_from_user+0x20a/0x2a0 [ 178.336350][T12210] ? kstrtol_from_user+0x310/0x310 [ 178.341298][T12210] ? avc_has_perm_noaudit+0x348/0x430 [ 178.346504][T12210] dump_stack+0x15/0x17 [ 178.350499][T12210] should_fail+0x3c6/0x510 [ 178.354751][T12210] should_fail_usercopy+0x1a/0x20 [ 178.359610][T12210] strncpy_from_user+0x24/0x2d0 [ 178.364300][T12210] bpf_prog_load+0x185/0x1b50 [ 178.368812][T12210] ? map_freeze+0x370/0x370 [ 178.373153][T12210] ? selinux_bpf+0xcb/0x100 [ 178.377578][T12210] ? security_bpf+0x82/0xb0 [ 178.381916][T12210] __sys_bpf+0x4bc/0x760 [ 178.385994][T12210] ? fput_many+0x160/0x1b0 [ 178.390247][T12210] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 178.395725][T12210] ? debug_smp_processor_id+0x17/0x20 [ 178.400924][T12210] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 178.406825][T12210] __x64_sys_bpf+0x7c/0x90 [ 178.411077][T12210] do_syscall_64+0x3d/0xb0 [ 178.415330][T12210] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 178.421059][T12210] RIP: 0033:0x7fd73780ef19 [ 178.425314][T12210] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 178.444751][T12210] RSP: 002b:00007fd736490048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 178.452999][T12210] RAX: ffffffffffffffda RBX: 00007fd73799ef60 RCX: 00007fd73780ef19 [ 178.460809][T12210] RDX: 0000000000000070 RSI: 00000000200000c0 RDI: 0000000000000005 [ 178.468621][T12210] RBP: 00007fd7364900a0 R08: 0000000000000000 R09: 0000000000000000 [ 178.476431][T12210] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 178.484243][T12210] R13: 000000000000000b R14: 00007fd73799ef60 R15: 00007fff1933c2e8 [ 178.492059][T12210] [ 178.551044][T12219] device pim6reg1 entered promiscuous mode [ 178.613076][T12236] device veth0_vlan left promiscuous mode [ 178.618941][T12236] device veth0_vlan entered promiscuous mode [ 178.661787][T12241] device veth0_vlan left promiscuous mode [ 178.669808][T12241] device veth0_vlan entered promiscuous mode [ 178.743860][T12260] device pim6reg1 entered promiscuous mode [ 178.801122][T12275] FAULT_INJECTION: forcing a failure. [ 178.801122][T12275] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 178.822282][T12275] CPU: 0 PID: 12275 Comm: syz.0.5169 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 178.832086][T12275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 178.841980][T12275] Call Trace: [ 178.845101][T12275] [ 178.847881][T12275] dump_stack_lvl+0x151/0x1b7 [ 178.852393][T12275] ? io_uring_drop_tctx_refs+0x190/0x190 [ 178.857949][T12275] dump_stack+0x15/0x17 [ 178.861943][T12275] should_fail+0x3c6/0x510 [ 178.866195][T12275] should_fail_usercopy+0x1a/0x20 [ 178.871054][T12275] _copy_to_user+0x20/0x90 [ 178.875306][T12275] simple_read_from_buffer+0xc7/0x150 [ 178.880515][T12275] proc_fail_nth_read+0x1a3/0x210 [ 178.885374][T12275] ? proc_fault_inject_write+0x390/0x390 [ 178.890843][T12275] ? fsnotify_perm+0x470/0x5d0 [ 178.895450][T12275] ? security_file_permission+0x86/0xb0 [ 178.900824][T12275] ? proc_fault_inject_write+0x390/0x390 [ 178.906294][T12275] vfs_read+0x27d/0xd40 [ 178.910287][T12275] ? sock_show_fdinfo+0xa0/0xa0 [ 178.914971][T12275] ? kernel_read+0x1f0/0x1f0 [ 178.919483][T12275] ? __kasan_check_write+0x14/0x20 [ 178.924429][T12275] ? mutex_lock+0xb6/0x1e0 [ 178.928683][T12275] ? wait_for_completion_killable_timeout+0x10/0x10 [ 178.935107][T12275] ? __fdget_pos+0x2e7/0x3a0 [ 178.939532][T12275] ? ksys_read+0x77/0x2c0 [ 178.943784][T12275] ksys_read+0x199/0x2c0 [ 178.947866][T12275] ? vfs_write+0x1110/0x1110 [ 178.952296][T12275] ? debug_smp_processor_id+0x17/0x20 [ 178.957500][T12275] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 178.963399][T12275] __x64_sys_read+0x7b/0x90 [ 178.967741][T12275] do_syscall_64+0x3d/0xb0 [ 178.971992][T12275] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 178.977721][T12275] RIP: 0033:0x7f422e3129fc [ 178.981975][T12275] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8c 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 1f 8d 02 00 48 [ 179.001421][T12275] RSP: 002b:00007f422cf95040 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 179.009658][T12275] RAX: ffffffffffffffda RBX: 00007f422e4a3f60 RCX: 00007f422e3129fc [ 179.017471][T12275] RDX: 000000000000000f RSI: 00007f422cf950b0 RDI: 0000000000000049 [ 179.025287][T12275] RBP: 00007f422cf950a0 R08: 0000000000000000 R09: 0000000000000000 [ 179.033093][T12275] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 179.040904][T12275] R13: 000000000000000b R14: 00007f422e4a3f60 R15: 00007ffc0a0ec658 [ 179.048727][T12275] [ 179.092402][T12287] device veth0_vlan left promiscuous mode [ 179.098708][T12287] device veth0_vlan entered promiscuous mode [ 179.123844][T12278] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.130752][T12278] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.138143][T12278] device bridge_slave_0 entered promiscuous mode [ 179.145096][T12278] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.152138][T12278] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.159680][T12278] device bridge_slave_1 entered promiscuous mode [ 179.194968][T12301] device pim6reg1 entered promiscuous mode [ 179.250556][T12278] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.257450][T12278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.264616][T12278] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.271495][T12278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.292604][T12316] FAULT_INJECTION: forcing a failure. [ 179.292604][T12316] name failslab, interval 1, probability 0, space 0, times 0 [ 179.299266][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 179.306843][T12316] CPU: 1 PID: 12316 Comm: syz.2.5187 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 179.321846][T12316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 179.331748][T12316] Call Trace: [ 179.334867][T12316] [ 179.337645][T12316] dump_stack_lvl+0x151/0x1b7 [ 179.342154][T12316] ? io_uring_drop_tctx_refs+0x190/0x190 [ 179.347624][T12316] dump_stack+0x15/0x17 [ 179.351614][T12316] should_fail+0x3c6/0x510 [ 179.355869][T12316] __should_failslab+0xa4/0xe0 [ 179.360554][T12316] should_failslab+0x9/0x20 [ 179.364895][T12316] slab_pre_alloc_hook+0x37/0xd0 [ 179.369669][T12316] kmem_cache_alloc_trace+0x48/0x210 [ 179.374874][T12316] ? __get_vm_area_node+0x117/0x360 [ 179.379907][T12316] ? do_sys_openat2+0x71c/0x830 [ 179.384874][T12316] __get_vm_area_node+0x117/0x360 [ 179.389724][T12316] __vmalloc_node_range+0xe2/0x8d0 [ 179.394669][T12316] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 179.400052][T12316] ? selinux_capset+0xf0/0xf0 [ 179.404564][T12316] ? kstrtouint_from_user+0x20a/0x2a0 [ 179.409775][T12316] ? kstrtol_from_user+0x310/0x310 [ 179.414726][T12316] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 179.420107][T12316] __vmalloc+0x7a/0x90 [ 179.424008][T12316] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 179.429389][T12316] bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 179.434600][T12316] ? bpf_prog_alloc+0x15/0x1e0 [ 179.439205][T12316] bpf_prog_alloc+0x1f/0x1e0 [ 179.443621][T12316] bpf_prog_load+0x800/0x1b50 [ 179.448136][T12316] ? map_freeze+0x370/0x370 [ 179.452479][T12316] ? selinux_bpf+0xcb/0x100 [ 179.456813][T12316] ? security_bpf+0x82/0xb0 [ 179.461325][T12316] __sys_bpf+0x4bc/0x760 [ 179.465405][T12316] ? fput_many+0x160/0x1b0 [ 179.469657][T12316] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 179.474867][T12316] ? debug_smp_processor_id+0x17/0x20 [ 179.480075][T12316] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 179.485978][T12316] __x64_sys_bpf+0x7c/0x90 [ 179.490236][T12316] do_syscall_64+0x3d/0xb0 [ 179.494486][T12316] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 179.500211][T12316] RIP: 0033:0x7f73ccd74f19 [ 179.504465][T12316] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 179.523901][T12316] RSP: 002b:00007f73cb9f6048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 179.532150][T12316] RAX: ffffffffffffffda RBX: 00007f73ccf04f60 RCX: 00007f73ccd74f19 [ 179.539958][T12316] RDX: 0000000000000070 RSI: 00000000200000c0 RDI: 0000000000000005 [ 179.547772][T12316] RBP: 00007f73cb9f60a0 R08: 0000000000000000 R09: 0000000000000000 [ 179.555582][T12316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 179.563392][T12316] R13: 000000000000000b R14: 00007f73ccf04f60 R15: 00007fffe8c04f48 [ 179.571213][T12316] [ 179.575667][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.584619][T12316] syz.2.5187: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz2,mems_allowed=0 [ 179.600728][T12316] CPU: 1 PID: 12316 Comm: syz.2.5187 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 179.600793][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.610431][T12316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 179.610441][T12316] Call Trace: [ 179.610447][T12316] [ 179.610453][T12316] dump_stack_lvl+0x151/0x1b7 [ 179.637607][T12316] ? io_uring_drop_tctx_refs+0x190/0x190 [ 179.643073][T12316] ? pr_cont_kernfs_name+0xf0/0x100 [ 179.648109][T12316] dump_stack+0x15/0x17 [ 179.652094][T12316] warn_alloc+0x21a/0x390 [ 179.656262][T12316] ? zone_watermark_ok_safe+0x270/0x270 [ 179.661642][T12316] ? kmem_cache_alloc_trace+0x115/0x210 [ 179.667370][T12316] ? __get_vm_area_node+0x117/0x360 [ 179.672411][T12316] ? __get_vm_area_node+0x347/0x360 [ 179.677440][T12316] __vmalloc_node_range+0x2c1/0x8d0 [ 179.682559][T12316] ? selinux_capset+0xf0/0xf0 [ 179.687072][T12316] ? kstrtouint_from_user+0x20a/0x2a0 [ 179.692290][T12316] ? kstrtol_from_user+0x310/0x310 [ 179.697239][T12316] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 179.702608][T12316] __vmalloc+0x7a/0x90 [ 179.706513][T12316] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 179.711893][T12316] bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 179.717186][T12316] ? bpf_prog_alloc+0x15/0x1e0 [ 179.721788][T12316] bpf_prog_alloc+0x1f/0x1e0 [ 179.726214][T12316] bpf_prog_load+0x800/0x1b50 [ 179.730730][T12316] ? map_freeze+0x370/0x370 [ 179.735080][T12316] ? selinux_bpf+0xcb/0x100 [ 179.739414][T12316] ? security_bpf+0x82/0xb0 [ 179.743746][T12316] __sys_bpf+0x4bc/0x760 [ 179.747835][T12316] ? fput_many+0x160/0x1b0 [ 179.752082][T12316] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 179.757287][T12316] ? debug_smp_processor_id+0x17/0x20 [ 179.762496][T12316] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 179.768399][T12316] __x64_sys_bpf+0x7c/0x90 [ 179.772647][T12316] do_syscall_64+0x3d/0xb0 [ 179.776902][T12316] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 179.782627][T12316] RIP: 0033:0x7f73ccd74f19 [ 179.786884][T12316] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 179.806441][T12316] RSP: 002b:00007f73cb9f6048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 179.814683][T12316] RAX: ffffffffffffffda RBX: 00007f73ccf04f60 RCX: 00007f73ccd74f19 [ 179.822493][T12316] RDX: 0000000000000070 RSI: 00000000200000c0 RDI: 0000000000000005 [ 179.830306][T12316] RBP: 00007f73cb9f60a0 R08: 0000000000000000 R09: 0000000000000000 [ 179.838115][T12316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 179.845929][T12316] R13: 000000000000000b R14: 00007f73ccf04f60 R15: 00007fffe8c04f48 [ 179.853745][T12316] [ 179.860945][T12316] Mem-Info: [ 179.864013][T12316] active_anon:92 inactive_anon:10902 isolated_anon:0 [ 179.864013][T12316] active_file:25160 inactive_file:5704 isolated_file:0 [ 179.864013][T12316] unevictable:0 dirty:556 writeback:0 [ 179.864013][T12316] slab_reclaimable:8059 slab_unreclaimable:72143 [ 179.864013][T12316] mapped:21001 shmem:154 pagetables:458 bounce:0 [ 179.864013][T12316] kernel_misc_reclaimable:0 [ 179.864013][T12316] free:1543892 free_pcp:26672 free_cma:0 [ 179.884172][T12278] device veth0_vlan entered promiscuous mode [ 179.911628][T12316] Node 0 active_anon:392kB inactive_anon:43700kB active_file:100648kB inactive_file:22816kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:84120kB dirty:2228kB writeback:0kB shmem:640kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5748kB pagetables:1884kB all_unreclaimable? no [ 179.942631][T12316] DMA32 free:2976724kB min:62592kB low:78240kB high:93888kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2981396kB mlocked:0kB bounce:0kB free_pcp:4672kB local_pcp:4672kB free_cma:0kB [ 179.977109][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 179.988393][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 179.998351][ T5205] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.005188][ T5205] bridge0: port 1(bridge_slave_0) entered forwarding state [ 180.011457][T12316] lowmem_reserve[]: 0 3941 3941 [ 180.012625][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.019412][T12316] Normal free:3198604kB min:84860kB low:106072kB high:127284kB reserved_highatomic:0KB active_anon:392kB inactive_anon:43800kB active_file:100648kB inactive_file:22816kB unevictable:0kB writepending:2228kB present:5242880kB managed:4035840kB mlocked:0kB bounce:0kB free_pcp:101720kB local_pcp:51112kB free_cma:0kB [ 180.054948][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.063017][ T5205] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.069892][ T5205] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.083221][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 180.092552][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 180.100438][T12316] lowmem_reserve[]: 0 0 0 [ 180.104776][T12316] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 4*2048kB (UM) 723*4096kB (M) = 2976724kB [ 180.108193][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 180.121053][T12316] Normal: 3115*4kB (ME) 3650*8kB (UME) 2803*16kB (UME) 2571*32kB (UME) 1299*64kB (UME) 635*128kB (UME) 441*256kB (UME) 326*512kB (UM) 231*1024kB (UME) 119*2048kB (UM) 514*4096kB (UM) = 3198604kB [ 180.130813][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 180.157450][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 180.157526][T12316] 31026 total pagecache pages [ 180.170293][T12316] 0 pages in swap cache [ 180.173079][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 180.174313][T12316] Swap cache stats: add 0, delete 0, find 0/0 [ 180.182546][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 180.188746][T12316] Free swap = 124996kB [ 180.196181][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 180.207290][T12316] Total swap = 124996kB [ 180.211321][T12316] 2097051 pages RAM [ 180.215227][T12321] device veth0_vlan left promiscuous mode [ 180.221131][T12316] 0 pages HighMem/MovableOnly [ 180.221673][T12321] device veth0_vlan entered promiscuous mode [ 180.225981][T12316] 342742 pages reserved [ 180.235515][T12316] 0 pages cma reserved [ 180.249497][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 180.259339][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 180.275619][T12278] device veth1_macvtap entered promiscuous mode [ 180.296260][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 180.304253][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 180.313407][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 180.346597][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 180.360285][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 180.378807][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 180.395213][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 180.413267][T12362] device pim6reg1 entered promiscuous mode [ 180.432934][T12372] FAULT_INJECTION: forcing a failure. [ 180.432934][T12372] name failslab, interval 1, probability 0, space 0, times 0 [ 180.447251][T12372] CPU: 0 PID: 12372 Comm: syz.0.5212 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 180.457058][T12372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 180.466952][T12372] Call Trace: [ 180.470158][T12372] [ 180.472943][T12372] dump_stack_lvl+0x151/0x1b7 [ 180.477538][T12372] ? io_uring_drop_tctx_refs+0x190/0x190 [ 180.483006][T12372] dump_stack+0x15/0x17 [ 180.486999][T12372] should_fail+0x3c6/0x510 [ 180.491278][T12372] __should_failslab+0xa4/0xe0 [ 180.495858][T12372] should_failslab+0x9/0x20 [ 180.500370][T12372] slab_pre_alloc_hook+0x37/0xd0 [ 180.505142][T12372] __kmalloc+0x6d/0x270 [ 180.509142][T12372] ? kvmalloc_node+0x1f0/0x4d0 [ 180.513737][T12372] kvmalloc_node+0x1f0/0x4d0 [ 180.518540][T12372] ? vm_mmap+0xb0/0xb0 [ 180.522537][T12372] ? __kasan_check_write+0x14/0x20 [ 180.527570][T12372] pfifo_fast_init+0x3aa/0x7a0 [ 180.532168][T12372] qdisc_create_dflt+0x144/0x3e0 [ 180.537024][T12372] ? _raw_spin_lock+0xa4/0x1b0 [ 180.541634][T12372] dev_activate+0x2e0/0x1140 [ 180.546054][T12372] __dev_open+0x3bf/0x4e0 [ 180.550223][T12372] ? dev_open+0x260/0x260 [ 180.554564][T12372] ? _raw_spin_unlock_bh+0x51/0x60 [ 180.559511][T12372] ? dev_set_rx_mode+0x245/0x2e0 [ 180.564366][T12372] ? __kasan_check_read+0x11/0x20 [ 180.569250][T12372] __dev_change_flags+0x1db/0x6e0 [ 180.574088][T12372] ? avc_denied+0x1b0/0x1b0 [ 180.578428][T12372] ? dev_get_flags+0x1e0/0x1e0 [ 180.583027][T12372] dev_change_flags+0x8c/0x1a0 [ 180.587747][T12372] dev_ifsioc+0x147/0x10c0 [ 180.592002][T12372] ? dev_ioctl+0xe70/0xe70 [ 180.596260][T12372] ? mutex_lock+0x135/0x1e0 [ 180.600847][T12372] ? wait_for_completion_killable_timeout+0x10/0x10 [ 180.607360][T12372] dev_ioctl+0x54d/0xe70 [ 180.611610][T12372] sock_do_ioctl+0x34f/0x5a0 [ 180.616557][T12372] ? sock_show_fdinfo+0xa0/0xa0 [ 180.621246][T12372] ? selinux_file_ioctl+0x3cc/0x540 [ 180.626462][T12372] sock_ioctl+0x455/0x740 [ 180.630618][T12372] ? sock_poll+0x400/0x400 [ 180.634959][T12372] ? __fget_files+0x31e/0x380 [ 180.639554][T12372] ? security_file_ioctl+0x84/0xb0 [ 180.644499][T12372] ? sock_poll+0x400/0x400 [ 180.648753][T12372] __se_sys_ioctl+0x114/0x190 [ 180.653267][T12372] __x64_sys_ioctl+0x7b/0x90 [ 180.657912][T12372] do_syscall_64+0x3d/0xb0 [ 180.662162][T12372] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 180.667889][T12372] RIP: 0033:0x7f422e313f19 [ 180.672141][T12372] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 180.691673][T12372] RSP: 002b:00007f422cf95048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 180.699921][T12372] RAX: ffffffffffffffda RBX: 00007f422e4a3f60 RCX: 00007f422e313f19 [ 180.707730][T12372] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 180.715812][T12372] RBP: 00007f422cf950a0 R08: 0000000000000000 R09: 0000000000000000 [ 180.723612][T12372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 180.731443][T12372] R13: 000000000000000b R14: 00007f422e4a3f60 R15: 00007ffc0a0ec658 [ 180.739240][T12372] [ 180.743189][T12372] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 180.750889][T12372] device pim6reg1 entered promiscuous mode [ 180.756961][T12369] device veth0_vlan left promiscuous mode [ 180.763172][T12369] device veth0_vlan entered promiscuous mode [ 180.884016][T12407] device pim6reg1 entered promiscuous mode [ 180.918379][T12405] device veth0_vlan left promiscuous mode [ 180.926402][T12405] device veth0_vlan entered promiscuous mode [ 181.161352][T12454] device veth0_vlan left promiscuous mode [ 181.169025][T12454] device veth0_vlan entered promiscuous mode [ 181.183468][T12460] bond_slave_1: mtu greater than device maximum [ 181.203923][T12462] device pim6reg1 entered promiscuous mode [ 181.268553][T12485] FAULT_INJECTION: forcing a failure. [ 181.268553][T12485] name failslab, interval 1, probability 0, space 0, times 0 [ 181.295559][T12485] CPU: 1 PID: 12485 Comm: syz.3.5265 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 181.305371][T12485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 181.315436][T12485] Call Trace: [ 181.318565][T12485] [ 181.321442][T12485] dump_stack_lvl+0x151/0x1b7 [ 181.325938][T12485] ? io_uring_drop_tctx_refs+0x190/0x190 [ 181.331417][T12485] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 181.337047][T12485] ? __skb_try_recv_datagram+0x495/0x6a0 [ 181.342514][T12485] dump_stack+0x15/0x17 [ 181.346508][T12485] should_fail+0x3c6/0x510 [ 181.350761][T12485] __should_failslab+0xa4/0xe0 [ 181.355360][T12485] ? skb_clone+0x1d1/0x360 [ 181.359613][T12485] should_failslab+0x9/0x20 [ 181.363952][T12485] slab_pre_alloc_hook+0x37/0xd0 [ 181.368728][T12485] ? skb_clone+0x1d1/0x360 [ 181.372978][T12485] kmem_cache_alloc+0x44/0x200 [ 181.377578][T12485] skb_clone+0x1d1/0x360 [ 181.381660][T12485] sk_psock_verdict_recv+0x53/0x840 [ 181.386692][T12485] ? avc_has_perm_noaudit+0x430/0x430 [ 181.391901][T12485] unix_read_sock+0x132/0x370 [ 181.396416][T12485] ? sk_psock_skb_redirect+0x440/0x440 [ 181.401715][T12485] ? unix_stream_splice_actor+0x120/0x120 [ 181.407263][T12485] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 181.412557][T12485] ? unix_stream_splice_actor+0x120/0x120 [ 181.418111][T12485] sk_psock_verdict_data_ready+0x147/0x1a0 [ 181.423752][T12485] ? sk_psock_start_verdict+0xc0/0xc0 [ 181.428961][T12485] ? _raw_spin_lock+0xa4/0x1b0 [ 181.433559][T12485] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 181.439210][T12485] ? skb_queue_tail+0xfb/0x120 [ 181.443801][T12485] unix_dgram_sendmsg+0x15fa/0x2090 [ 181.448846][T12485] ? unix_dgram_poll+0x710/0x710 [ 181.453609][T12485] ? kmem_cache_free+0x116/0x2e0 [ 181.458383][T12485] ? ____kasan_slab_free+0x126/0x160 [ 181.463502][T12485] ? __kasan_slab_free+0x11/0x20 [ 181.468276][T12485] ? slab_free_freelist_hook+0xbd/0x190 [ 181.473659][T12485] ? security_socket_sendmsg+0x82/0xb0 [ 181.478954][T12485] ? unix_dgram_poll+0x710/0x710 [ 181.483726][T12485] ____sys_sendmsg+0x59e/0x8f0 [ 181.488329][T12485] ? __sys_sendmsg_sock+0x40/0x40 [ 181.493188][T12485] ? import_iovec+0xe5/0x120 [ 181.497614][T12485] ___sys_sendmsg+0x252/0x2e0 [ 181.502128][T12485] ? __sys_sendmsg+0x260/0x260 [ 181.506733][T12485] ? __fdget+0x1bc/0x240 [ 181.510805][T12485] __se_sys_sendmsg+0x19a/0x260 [ 181.515490][T12485] ? __x64_sys_sendmsg+0x90/0x90 [ 181.520263][T12485] ? ksys_write+0x260/0x2c0 [ 181.524605][T12485] ? debug_smp_processor_id+0x17/0x20 [ 181.529810][T12485] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 181.535715][T12485] __x64_sys_sendmsg+0x7b/0x90 [ 181.540315][T12485] do_syscall_64+0x3d/0xb0 [ 181.544568][T12485] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 181.550380][T12485] RIP: 0033:0x7fd73780ef19 [ 181.554635][T12485] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 181.574077][T12485] RSP: 002b:00007fd736490048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 181.582321][T12485] RAX: ffffffffffffffda RBX: 00007fd73799ef60 RCX: 00007fd73780ef19 [ 181.590222][T12485] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000007 [ 181.598028][T12485] RBP: 00007fd7364900a0 R08: 0000000000000000 R09: 0000000000000000 [ 181.605839][T12485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 181.613653][T12485] R13: 000000000000000b R14: 00007fd73799ef60 R15: 00007fff1933c2e8 [ 181.621468][T12485] [ 181.643269][T12497] FAULT_INJECTION: forcing a failure. [ 181.643269][T12497] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 181.665136][T12497] CPU: 0 PID: 12497 Comm: syz.2.5270 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 181.674948][T12497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 181.684841][T12497] Call Trace: [ 181.687963][T12497] [ 181.690738][T12497] dump_stack_lvl+0x151/0x1b7 [ 181.695254][T12497] ? io_uring_drop_tctx_refs+0x190/0x190 [ 181.700722][T12497] ? kstrtouint_from_user+0x20a/0x2a0 [ 181.705927][T12497] dump_stack+0x15/0x17 [ 181.709956][T12497] should_fail+0x3c6/0x510 [ 181.714186][T12497] should_fail_usercopy+0x1a/0x20 [ 181.719033][T12497] _copy_to_user+0x20/0x90 [ 181.723290][T12497] simple_read_from_buffer+0xc7/0x150 [ 181.728494][T12497] proc_fail_nth_read+0x1a3/0x210 [ 181.733356][T12497] ? proc_fault_inject_write+0x390/0x390 [ 181.738823][T12497] ? fsnotify_perm+0x470/0x5d0 [ 181.743431][T12497] ? security_file_permission+0x86/0xb0 [ 181.748802][T12497] ? proc_fault_inject_write+0x390/0x390 [ 181.754269][T12497] vfs_read+0x27d/0xd40 [ 181.758263][T12497] ? kernel_read+0x1f0/0x1f0 [ 181.762692][T12497] ? __kasan_check_write+0x14/0x20 [ 181.767651][T12497] ? mutex_lock+0xb6/0x1e0 [ 181.771894][T12497] ? wait_for_completion_killable_timeout+0x10/0x10 [ 181.778314][T12497] ? __fdget_pos+0x2e7/0x3a0 [ 181.782738][T12497] ? ksys_read+0x77/0x2c0 [ 181.786907][T12497] ksys_read+0x199/0x2c0 [ 181.790984][T12497] ? vfs_write+0x1110/0x1110 [ 181.795409][T12497] ? debug_smp_processor_id+0x17/0x20 [ 181.800615][T12497] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 181.806520][T12497] __x64_sys_read+0x7b/0x90 [ 181.810861][T12497] do_syscall_64+0x3d/0xb0 [ 181.815112][T12497] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 181.821016][T12497] RIP: 0033:0x7f73ccd739fc [ 181.825265][T12497] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8c 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 1f 8d 02 00 48 [ 181.844708][T12497] RSP: 002b:00007f73cb9f6040 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 181.852951][T12497] RAX: ffffffffffffffda RBX: 00007f73ccf04f60 RCX: 00007f73ccd739fc [ 181.860763][T12497] RDX: 000000000000000f RSI: 00007f73cb9f60b0 RDI: 0000000000000006 [ 181.868576][T12497] RBP: 00007f73cb9f60a0 R08: 0000000000000000 R09: 0000000000000000 [ 181.876394][T12497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 181.884283][T12497] R13: 000000000000000b R14: 00007f73ccf04f60 R15: 00007fffe8c04f48 [ 181.892107][T12497] [ 181.906917][T12498] device veth0_vlan left promiscuous mode [ 181.912696][T12498] device veth0_vlan entered promiscuous mode [ 181.923102][ T5204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 181.932933][ T5204] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 181.944605][ T5204] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 181.952415][T12508] device pim6reg1 entered promiscuous mode [ 181.999088][T12530] FAULT_INJECTION: forcing a failure. [ 181.999088][T12530] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 182.013374][T12530] CPU: 1 PID: 12530 Comm: syz.2.5285 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 182.023261][T12530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 182.033158][T12530] Call Trace: [ 182.036276][T12530] [ 182.039054][T12530] dump_stack_lvl+0x151/0x1b7 [ 182.043606][T12530] ? io_uring_drop_tctx_refs+0x190/0x190 [ 182.049035][T12530] ? stack_trace_save+0x113/0x1c0 [ 182.053897][T12530] dump_stack+0x15/0x17 [ 182.057983][T12530] should_fail+0x3c6/0x510 [ 182.062227][T12530] should_fail_alloc_page+0x5a/0x80 [ 182.067259][T12530] prepare_alloc_pages+0x15c/0x700 [ 182.072294][T12530] ? __alloc_pages_bulk+0xe40/0xe40 [ 182.077326][T12530] ? do_syscall_64+0x3d/0xb0 [ 182.081769][T12530] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 182.087660][T12530] __alloc_pages+0x18c/0x8f0 [ 182.092084][T12530] ? prep_new_page+0x110/0x110 [ 182.096685][T12530] kmalloc_order+0x4a/0x160 [ 182.101021][T12530] kmalloc_order_trace+0x1a/0xb0 [ 182.105795][T12530] ? alloc_skb_with_frags+0xa6/0x680 [ 182.110926][T12530] __kmalloc_track_caller+0x19b/0x260 [ 182.116210][T12530] ? kmem_cache_alloc+0xf5/0x200 [ 182.120984][T12530] ? alloc_skb_with_frags+0xa6/0x680 [ 182.126103][T12530] __alloc_skb+0x10c/0x550 [ 182.130359][T12530] alloc_skb_with_frags+0xa6/0x680 [ 182.135304][T12530] ? 0xffffffffa0028000 [ 182.139297][T12530] ? is_bpf_text_address+0x172/0x190 [ 182.144417][T12530] ? stack_trace_save+0x1c0/0x1c0 [ 182.149279][T12530] sock_alloc_send_pskb+0x915/0xa50 [ 182.154321][T12530] ? sock_kzfree_s+0x60/0x60 [ 182.158749][T12530] ? stack_trace_snprint+0xf0/0xf0 [ 182.163691][T12530] ? __stack_depot_save+0x34/0x470 [ 182.168638][T12530] tun_get_user+0xf1b/0x3aa0 [ 182.173060][T12530] ? kasan_set_track+0x4b/0x70 [ 182.177675][T12530] ? kasan_set_free_info+0x23/0x40 [ 182.182610][T12530] ? _kstrtoull+0x3a0/0x4a0 [ 182.186949][T12530] ? tun_do_read+0x1ef0/0x1ef0 [ 182.191547][T12530] ? kstrtouint_from_user+0x20a/0x2a0 [ 182.196754][T12530] ? kstrtol_from_user+0x310/0x310 [ 182.201790][T12530] ? avc_policy_seqno+0x1b/0x70 [ 182.206475][T12530] ? selinux_file_permission+0x2c4/0x570 [ 182.211950][T12530] tun_chr_write_iter+0x1e1/0x2e0 [ 182.216803][T12530] vfs_write+0xd5d/0x1110 [ 182.220969][T12530] ? kmem_cache_free+0x116/0x2e0 [ 182.225745][T12530] ? file_end_write+0x1c0/0x1c0 [ 182.230448][T12530] ? __fdget_pos+0x209/0x3a0 [ 182.234855][T12530] ? ksys_write+0x77/0x2c0 [ 182.239117][T12530] ksys_write+0x199/0x2c0 [ 182.243278][T12530] ? __ia32_sys_read+0x90/0x90 [ 182.247877][T12530] ? debug_smp_processor_id+0x17/0x20 [ 182.253082][T12530] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 182.258991][T12530] __x64_sys_write+0x7b/0x90 [ 182.263410][T12530] do_syscall_64+0x3d/0xb0 [ 182.267664][T12530] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 182.273395][T12530] RIP: 0033:0x7f73ccd74f19 [ 182.277646][T12530] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 182.297344][T12530] RSP: 002b:00007f73cb9f6048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 182.305591][T12530] RAX: ffffffffffffffda RBX: 00007f73ccf04f60 RCX: 00007f73ccd74f19 [ 182.313402][T12530] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 182.321213][T12530] RBP: 00007f73cb9f60a0 R08: 0000000000000000 R09: 0000000000000000 [ 182.329024][T12530] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 182.336833][T12530] R13: 000000000000000b R14: 00007f73ccf04f60 R15: 00007fffe8c04f48 [ 182.344650][T12530] [ 182.443763][T12548] device veth0_vlan left promiscuous mode [ 182.455305][T12548] device veth0_vlan entered promiscuous mode [ 182.485128][ T347] device bridge_slave_1 left promiscuous mode [ 182.507793][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.518104][ T30] audit: type=1400 audit(1721876887.159:153): avc: denied { create } for pid=12566 comm="syz.3.5302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 182.547818][ T347] device bridge_slave_0 left promiscuous mode [ 182.575396][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.594519][ T347] device veth0_vlan left promiscuous mode [ 182.719757][T12579] device pim6reg1 entered promiscuous mode [ 182.884924][T12597] device veth0_vlan left promiscuous mode [ 182.901230][T12597] device veth0_vlan entered promiscuous mode [ 182.983876][T12612] FAULT_INJECTION: forcing a failure. [ 182.983876][T12612] name failslab, interval 1, probability 0, space 0, times 0 [ 183.023457][T12612] CPU: 0 PID: 12612 Comm: syz.4.5321 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 183.033274][T12612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 183.043254][T12612] Call Trace: [ 183.046377][T12612] [ 183.049155][T12612] dump_stack_lvl+0x151/0x1b7 [ 183.053672][T12612] ? io_uring_drop_tctx_refs+0x190/0x190 [ 183.059135][T12612] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 183.064867][T12612] ? __skb_try_recv_datagram+0x495/0x6a0 [ 183.070336][T12612] dump_stack+0x15/0x17 [ 183.074322][T12612] should_fail+0x3c6/0x510 [ 183.078591][T12612] __should_failslab+0xa4/0xe0 [ 183.083178][T12612] ? skb_clone+0x1d1/0x360 [ 183.087430][T12612] should_failslab+0x9/0x20 [ 183.091771][T12612] slab_pre_alloc_hook+0x37/0xd0 [ 183.096549][T12612] ? skb_clone+0x1d1/0x360 [ 183.100798][T12612] kmem_cache_alloc+0x44/0x200 [ 183.105398][T12612] skb_clone+0x1d1/0x360 [ 183.109481][T12612] sk_psock_verdict_recv+0x53/0x840 [ 183.114512][T12612] ? avc_has_perm_noaudit+0x430/0x430 [ 183.119722][T12612] unix_read_sock+0x132/0x370 [ 183.124234][T12612] ? sk_psock_skb_redirect+0x440/0x440 [ 183.129538][T12612] ? unix_stream_splice_actor+0x120/0x120 [ 183.135081][T12612] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 183.140384][T12612] ? unix_stream_splice_actor+0x120/0x120 [ 183.145929][T12612] sk_psock_verdict_data_ready+0x147/0x1a0 [ 183.151661][T12612] ? sk_psock_start_verdict+0xc0/0xc0 [ 183.156865][T12612] ? _raw_spin_lock+0xa4/0x1b0 [ 183.161466][T12612] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 183.167108][T12612] ? skb_queue_tail+0xfb/0x120 [ 183.171711][T12612] unix_dgram_sendmsg+0x15fa/0x2090 [ 183.176745][T12612] ? unix_dgram_poll+0x710/0x710 [ 183.181528][T12612] ? kmem_cache_free+0x116/0x2e0 [ 183.186290][T12612] ? ____kasan_slab_free+0x126/0x160 [ 183.191415][T12612] ? __kasan_slab_free+0x11/0x20 [ 183.196191][T12612] ? slab_free_freelist_hook+0xbd/0x190 [ 183.201739][T12612] ? security_socket_sendmsg+0x82/0xb0 [ 183.207043][T12612] ? unix_dgram_poll+0x710/0x710 [ 183.211891][T12612] ____sys_sendmsg+0x59e/0x8f0 [ 183.216495][T12612] ? __sys_sendmsg_sock+0x40/0x40 [ 183.221353][T12612] ? import_iovec+0xe5/0x120 [ 183.225780][T12612] ___sys_sendmsg+0x252/0x2e0 [ 183.230307][T12612] ? __sys_sendmsg+0x260/0x260 [ 183.234906][T12612] ? __fdget+0x1bc/0x240 [ 183.238973][T12612] __se_sys_sendmsg+0x19a/0x260 [ 183.243661][T12612] ? __x64_sys_sendmsg+0x90/0x90 [ 183.248509][T12612] ? ksys_write+0x260/0x2c0 [ 183.252773][T12612] ? debug_smp_processor_id+0x17/0x20 [ 183.257977][T12612] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 183.263882][T12612] __x64_sys_sendmsg+0x7b/0x90 [ 183.268480][T12612] do_syscall_64+0x3d/0xb0 [ 183.272735][T12612] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 183.278460][T12612] RIP: 0033:0x7fc3a06dff19 [ 183.282716][T12612] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 183.302155][T12612] RSP: 002b:00007fc39f361048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 183.310489][T12612] RAX: ffffffffffffffda RBX: 00007fc3a086ff60 RCX: 00007fc3a06dff19 [ 183.318295][T12612] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000007 [ 183.326109][T12612] RBP: 00007fc39f3610a0 R08: 0000000000000000 R09: 0000000000000000 [ 183.333915][T12612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 183.341728][T12612] R13: 000000000000000b R14: 00007fc3a086ff60 R15: 00007ffe9db36ba8 [ 183.349549][T12612] [ 183.432673][T12634] device veth0_vlan left promiscuous mode [ 183.444793][T12634] device veth0_vlan entered promiscuous mode [ 183.457220][T12628] device veth0_vlan left promiscuous mode [ 183.469463][T12628] device veth0_vlan entered promiscuous mode [ 183.523623][T12658] device pim6reg1 entered promiscuous mode [ 183.648947][T12679] device veth0_vlan left promiscuous mode [ 183.660990][T12679] device veth0_vlan entered promiscuous mode [ 183.748003][T12697] device pim6reg1 entered promiscuous mode [ 183.777674][T12695] device veth0_vlan left promiscuous mode [ 183.787261][T12708] FAULT_INJECTION: forcing a failure. [ 183.787261][T12708] name failslab, interval 1, probability 0, space 0, times 0 [ 183.805536][T12695] device veth0_vlan entered promiscuous mode [ 183.819383][T12708] CPU: 0 PID: 12708 Comm: syz.4.5367 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 183.829179][T12708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 183.839074][T12708] Call Trace: [ 183.842199][T12708] [ 183.844976][T12708] dump_stack_lvl+0x151/0x1b7 [ 183.849490][T12708] ? io_uring_drop_tctx_refs+0x190/0x190 [ 183.854958][T12708] dump_stack+0x15/0x17 [ 183.858950][T12708] should_fail+0x3c6/0x510 [ 183.863203][T12708] __should_failslab+0xa4/0xe0 [ 183.867803][T12708] should_failslab+0x9/0x20 [ 183.872140][T12708] slab_pre_alloc_hook+0x37/0xd0 [ 183.876917][T12708] kmem_cache_alloc_trace+0x48/0x210 [ 183.882033][T12708] ? __get_vm_area_node+0x117/0x360 [ 183.887073][T12708] ? do_sys_openat2+0x71c/0x830 [ 183.892192][T12708] __get_vm_area_node+0x117/0x360 [ 183.897050][T12708] __vmalloc_node_range+0xe2/0x8d0 [ 183.902002][T12708] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 183.907378][T12708] ? selinux_capset+0xf0/0xf0 [ 183.911901][T12708] ? kstrtouint_from_user+0x20a/0x2a0 [ 183.917098][T12708] ? kstrtol_from_user+0x310/0x310 [ 183.922045][T12708] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 183.927427][T12708] __vmalloc+0x7a/0x90 [ 183.931332][T12708] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 183.936711][T12708] bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 183.941918][T12708] ? bpf_prog_alloc+0x15/0x1e0 [ 183.946519][T12708] bpf_prog_alloc+0x1f/0x1e0 [ 183.950953][T12708] bpf_prog_load+0x800/0x1b50 [ 183.955461][T12708] ? map_freeze+0x370/0x370 [ 183.959803][T12708] ? selinux_bpf+0xcb/0x100 [ 183.964140][T12708] ? security_bpf+0x82/0xb0 [ 183.968478][T12708] __sys_bpf+0x4bc/0x760 [ 183.972558][T12708] ? fput_many+0x160/0x1b0 [ 183.976811][T12708] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 183.982021][T12708] ? debug_smp_processor_id+0x17/0x20 [ 183.987224][T12708] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 183.993126][T12708] __x64_sys_bpf+0x7c/0x90 [ 183.997379][T12708] do_syscall_64+0x3d/0xb0 [ 184.001633][T12708] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 184.007360][T12708] RIP: 0033:0x7fc3a06dff19 [ 184.011616][T12708] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 184.031141][T12708] RSP: 002b:00007fc39f361048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 184.039657][T12708] RAX: ffffffffffffffda RBX: 00007fc3a086ff60 RCX: 00007fc3a06dff19 [ 184.047467][T12708] RDX: 0000000000000070 RSI: 00000000200000c0 RDI: 0000000000000005 [ 184.055279][T12708] RBP: 00007fc39f3610a0 R08: 0000000000000000 R09: 0000000000000000 [ 184.063088][T12708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 184.070901][T12708] R13: 000000000000000b R14: 00007fc3a086ff60 R15: 00007ffe9db36ba8 [ 184.078833][T12708] [ 184.150499][T12720] device veth0_vlan left promiscuous mode [ 184.168254][T12720] device veth0_vlan entered promiscuous mode [ 184.334240][T12750] device veth0_vlan left promiscuous mode [ 184.343209][T12750] device veth0_vlan entered promiscuous mode [ 184.367453][T12761] device pim6reg1 entered promiscuous mode [ 184.389850][T12763] device veth0_vlan left promiscuous mode [ 184.397444][T12763] device veth0_vlan entered promiscuous mode [ 184.545995][T12791] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.552886][T12791] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.561732][T12791] device bridge_slave_0 entered promiscuous mode [ 184.568689][T12791] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.575582][T12791] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.582837][T12791] device bridge_slave_1 entered promiscuous mode [ 184.633176][T12799] device veth0_vlan left promiscuous mode [ 184.651306][T12799] device veth0_vlan entered promiscuous mode [ 184.661342][T12810] device pim6reg1 entered promiscuous mode [ 184.737950][T12813] device sit0 entered promiscuous mode [ 185.562442][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.571042][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.587185][ T5155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.595457][ T5155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.607907][ T5155] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.614750][ T5155] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.625591][ T5155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.633913][ T5155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.642119][ T5155] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.648979][ T5155] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.665940][ T5155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 185.679305][ T5155] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 185.694691][T12841] FAULT_INJECTION: forcing a failure. [ 185.694691][T12841] name failslab, interval 1, probability 0, space 0, times 0 [ 185.708581][T12841] CPU: 0 PID: 12841 Comm: syz.1.5424 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 185.718374][T12841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 185.728274][T12841] Call Trace: [ 185.731392][T12841] [ 185.734173][T12841] dump_stack_lvl+0x151/0x1b7 [ 185.738685][T12841] ? io_uring_drop_tctx_refs+0x190/0x190 [ 185.744152][T12841] dump_stack+0x15/0x17 [ 185.748143][T12841] should_fail+0x3c6/0x510 [ 185.752483][T12841] __should_failslab+0xa4/0xe0 [ 185.757082][T12841] should_failslab+0x9/0x20 [ 185.761430][T12841] slab_pre_alloc_hook+0x37/0xd0 [ 185.766194][T12841] __kmalloc+0x6d/0x270 [ 185.770187][T12841] ? kvmalloc_node+0x1f0/0x4d0 [ 185.774789][T12841] kvmalloc_node+0x1f0/0x4d0 [ 185.779215][T12841] ? vm_mmap+0xb0/0xb0 [ 185.783123][T12841] ? __kasan_check_write+0x14/0x20 [ 185.788069][T12841] pfifo_fast_init+0x110/0x7a0 [ 185.792666][T12841] qdisc_create_dflt+0x144/0x3e0 [ 185.797439][T12841] ? _raw_spin_lock+0xa4/0x1b0 [ 185.802042][T12841] dev_activate+0x2e0/0x1140 [ 185.806470][T12841] __dev_open+0x3bf/0x4e0 [ 185.810634][T12841] ? dev_open+0x260/0x260 [ 185.814797][T12841] ? _raw_spin_unlock_bh+0x51/0x60 [ 185.819745][T12841] ? dev_set_rx_mode+0x245/0x2e0 [ 185.824529][T12841] ? __kasan_check_read+0x11/0x20 [ 185.829383][T12841] __dev_change_flags+0x1db/0x6e0 [ 185.834242][T12841] ? __request_module+0x8e0/0x8e0 [ 185.839099][T12841] ? dev_get_flags+0x1e0/0x1e0 [ 185.843700][T12841] ? __request_module+0x3fa/0x8e0 [ 185.848560][T12841] ? capable+0x78/0xe0 [ 185.852465][T12841] dev_change_flags+0x8c/0x1a0 [ 185.857067][T12841] dev_ifsioc+0x147/0x10c0 [ 185.861322][T12841] ? dev_ioctl+0xe70/0xe70 [ 185.865572][T12841] ? mutex_lock+0x135/0x1e0 [ 185.869913][T12841] ? wait_for_completion_killable_timeout+0x10/0x10 [ 185.876334][T12841] ? security_capable+0x87/0xb0 [ 185.881031][T12841] dev_ioctl+0x54d/0xe70 [ 185.885101][T12841] sock_do_ioctl+0x34f/0x5a0 [ 185.889533][T12841] ? sock_show_fdinfo+0xa0/0xa0 [ 185.894217][T12841] ? selinux_file_ioctl+0x3cc/0x540 [ 185.899248][T12841] sock_ioctl+0x455/0x740 [ 185.903414][T12841] ? sock_poll+0x400/0x400 [ 185.907664][T12841] ? __fget_files+0x31e/0x380 [ 185.912179][T12841] ? security_file_ioctl+0x84/0xb0 [ 185.917125][T12841] ? sock_poll+0x400/0x400 [ 185.921379][T12841] __se_sys_ioctl+0x114/0x190 [ 185.925893][T12841] __x64_sys_ioctl+0x7b/0x90 [ 185.930319][T12841] do_syscall_64+0x3d/0xb0 [ 185.934572][T12841] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 185.940299][T12841] RIP: 0033:0x7f5a49982f19 [ 185.944554][T12841] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 185.963995][T12841] RSP: 002b:00007f5a485e3048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 185.972244][T12841] RAX: ffffffffffffffda RBX: 00007f5a49b13038 RCX: 00007f5a49982f19 [ 185.980050][T12841] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 185.987863][T12841] RBP: 00007f5a485e30a0 R08: 0000000000000000 R09: 0000000000000000 [ 185.995672][T12841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 186.003483][T12841] R13: 000000000000006e R14: 00007f5a49b13038 R15: 00007ffd7bfd7e68 [ 186.011301][T12841] [ 186.014614][T12841] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 186.022308][T12841] device pim6reg1 entered promiscuous mode [ 186.029762][T12843] device veth0_vlan left promiscuous mode [ 186.035966][T12843] device veth0_vlan entered promiscuous mode [ 186.055588][T12791] device veth0_vlan entered promiscuous mode [ 186.064343][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 186.072031][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 186.080028][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 186.089160][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 186.097349][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 186.105459][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 186.125181][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 186.144928][T12791] device veth1_macvtap entered promiscuous mode [ 186.164521][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 186.174643][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 186.183064][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 186.191241][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 186.199436][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 186.216159][T12861] device pim6reg1 entered promiscuous mode [ 186.231410][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 186.245602][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 186.265821][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 186.284073][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 186.305423][T12874] device veth1_macvtap left promiscuous mode [ 186.322752][T12874] device veth1_macvtap entered promiscuous mode [ 186.333298][T12874] device macsec0 entered promiscuous mode [ 186.378513][T12874] device pim6reg1 entered promiscuous mode [ 186.425279][T12888] device veth0_vlan left promiscuous mode [ 186.437855][T12888] device veth0_vlan entered promiscuous mode [ 186.570993][T12927] device pim6reg1 entered promiscuous mode [ 186.657649][T12930] device syzkaller0 entered promiscuous mode [ 186.694446][T12936] device veth0_vlan left promiscuous mode [ 186.716189][T12936] device veth0_vlan entered promiscuous mode [ 186.769046][ T347] device bridge_slave_1 left promiscuous mode [ 186.775015][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.782401][T12961] FAULT_INJECTION: forcing a failure. [ 186.782401][T12961] name failslab, interval 1, probability 0, space 0, times 0 [ 186.795112][T12961] CPU: 1 PID: 12961 Comm: syz.0.5479 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 186.804901][T12961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 186.814794][T12961] Call Trace: [ 186.817919][T12961] [ 186.820696][T12961] dump_stack_lvl+0x151/0x1b7 [ 186.825211][T12961] ? io_uring_drop_tctx_refs+0x190/0x190 [ 186.830678][T12961] dump_stack+0x15/0x17 [ 186.834668][T12961] should_fail+0x3c6/0x510 [ 186.838930][T12961] __should_failslab+0xa4/0xe0 [ 186.843521][T12961] should_failslab+0x9/0x20 [ 186.847861][T12961] slab_pre_alloc_hook+0x37/0xd0 [ 186.852635][T12961] kmem_cache_alloc_trace+0x48/0x210 [ 186.857755][T12961] ? sk_psock_skb_ingress_self+0x60/0x330 [ 186.863318][T12961] ? migrate_disable+0x190/0x190 [ 186.868086][T12961] sk_psock_skb_ingress_self+0x60/0x330 [ 186.873470][T12961] sk_psock_verdict_recv+0x66d/0x840 [ 186.878587][T12961] unix_read_sock+0x132/0x370 [ 186.883100][T12961] ? sk_psock_skb_redirect+0x440/0x440 [ 186.888394][T12961] ? unix_stream_splice_actor+0x120/0x120 [ 186.893952][T12961] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 186.899246][T12961] ? unix_stream_splice_actor+0x120/0x120 [ 186.904798][T12961] sk_psock_verdict_data_ready+0x147/0x1a0 [ 186.910440][T12961] ? sk_psock_start_verdict+0xc0/0xc0 [ 186.915749][T12961] ? _raw_spin_lock+0xa4/0x1b0 [ 186.920345][T12961] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 186.925987][T12961] ? skb_queue_tail+0xfb/0x120 [ 186.930588][T12961] unix_dgram_sendmsg+0x15fa/0x2090 [ 186.935624][T12961] ? unix_dgram_poll+0x710/0x710 [ 186.940392][T12961] ? kmem_cache_free+0x116/0x2e0 [ 186.945165][T12961] ? ____kasan_slab_free+0x126/0x160 [ 186.950285][T12961] ? __kasan_slab_free+0x11/0x20 [ 186.955060][T12961] ? slab_free_freelist_hook+0xbd/0x190 [ 186.960440][T12961] ? security_socket_sendmsg+0x82/0xb0 [ 186.965736][T12961] ? unix_dgram_poll+0x710/0x710 [ 186.970508][T12961] ____sys_sendmsg+0x59e/0x8f0 [ 186.975111][T12961] ? __sys_sendmsg_sock+0x40/0x40 [ 186.979970][T12961] ? import_iovec+0xe5/0x120 [ 186.984396][T12961] ___sys_sendmsg+0x252/0x2e0 [ 186.988908][T12961] ? __sys_sendmsg+0x260/0x260 [ 186.993515][T12961] ? __fdget+0x1bc/0x240 [ 186.997588][T12961] __se_sys_sendmsg+0x19a/0x260 [ 187.002274][T12961] ? __x64_sys_sendmsg+0x90/0x90 [ 187.007047][T12961] ? ksys_write+0x260/0x2c0 [ 187.011391][T12961] ? debug_smp_processor_id+0x17/0x20 [ 187.016592][T12961] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 187.022496][T12961] __x64_sys_sendmsg+0x7b/0x90 [ 187.027097][T12961] do_syscall_64+0x3d/0xb0 [ 187.031351][T12961] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 187.037078][T12961] RIP: 0033:0x7f9fdf301f19 [ 187.041332][T12961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 187.060805][T12961] RSP: 002b:00007f9fddf83048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 187.069105][T12961] RAX: ffffffffffffffda RBX: 00007f9fdf491f60 RCX: 00007f9fdf301f19 [ 187.076916][T12961] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000007 [ 187.085012][T12961] RBP: 00007f9fddf830a0 R08: 0000000000000000 R09: 0000000000000000 [ 187.092818][T12961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 187.100626][T12961] R13: 000000000000000b R14: 00007f9fdf491f60 R15: 00007fff7d59a368 [ 187.108444][T12961] [ 187.117252][T12959] ================================================================== [ 187.118600][ T347] device bridge_slave_0 left promiscuous mode [ 187.125133][T12959] BUG: KASAN: use-after-free in consume_skb+0x3c/0x250 [ 187.125158][T12959] Read of size 4 at addr ffff8881259e2d6c by task syz.0.5479/12959 [ 187.131228][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.137713][T12959] [ 187.137720][T12959] CPU: 0 PID: 12959 Comm: syz.0.5479 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 187.137737][T12959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 187.174268][T12959] Call Trace: [ 187.177391][T12959] [ 187.180165][T12959] dump_stack_lvl+0x151/0x1b7 [ 187.184680][T12959] ? io_uring_drop_tctx_refs+0x190/0x190 [ 187.190146][T12959] ? panic+0x751/0x751 [ 187.194065][T12959] print_address_description+0x87/0x3b0 [ 187.199434][T12959] kasan_report+0x179/0x1c0 [ 187.203771][T12959] ? consume_skb+0x3c/0x250 [ 187.208112][T12959] ? consume_skb+0x3c/0x250 [ 187.212452][T12959] kasan_check_range+0x293/0x2a0 [ 187.217227][T12959] __kasan_check_read+0x11/0x20 [ 187.221911][T12959] consume_skb+0x3c/0x250 [ 187.226078][T12959] __sk_msg_free+0x2dd/0x370 [ 187.230504][T12959] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 187.236147][T12959] sk_psock_stop+0x44c/0x4d0 [ 187.240572][T12959] ? unix_peer_get+0xe0/0xe0 [ 187.245000][T12959] sock_map_close+0x2b9/0x4c0 [ 187.249513][T12959] ? sock_map_remove_links+0x570/0x570 [ 187.254806][T12959] ? rwsem_mark_wake+0x770/0x770 [ 187.259578][T12959] ? security_file_free+0xc6/0xe0 [ 187.264440][T12959] unix_release+0x82/0xc0 [ 187.268607][T12959] sock_close+0xdf/0x270 [ 187.272687][T12959] ? sock_mmap+0xa0/0xa0 [ 187.276766][T12959] __fput+0x3fe/0x910 [ 187.280584][T12959] ____fput+0x15/0x20 [ 187.284400][T12959] task_work_run+0x129/0x190 [ 187.288833][T12959] exit_to_user_mode_loop+0xc4/0xe0 [ 187.293865][T12959] exit_to_user_mode_prepare+0x5a/0xa0 [ 187.299158][T12959] syscall_exit_to_user_mode+0x26/0x160 [ 187.304538][T12959] do_syscall_64+0x49/0xb0 [ 187.308792][T12959] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 187.314521][T12959] RIP: 0033:0x7f9fdf301f19 [ 187.318773][T12959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 187.338217][T12959] RSP: 002b:00007fff7d59a448 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 187.346461][T12959] RAX: 0000000000000000 RBX: 00007f9fdf493a60 RCX: 00007f9fdf301f19 [ 187.354272][T12959] RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 [ 187.362081][T12959] RBP: 00007f9fdf493a60 R08: 0000000000000000 R09: 0000000c7d59a76f [ 187.369891][T12959] R10: 000000000003fd88 R11: 0000000000000246 R12: 000000000002dcbd [ 187.377703][T12959] R13: 0000000000000032 R14: 00007f9fdf493a60 R15: 00007fff7d59a530 [ 187.385520][T12959] [ 187.388379][T12959] [ 187.390548][T12959] Allocated by task 12961: [ 187.394800][T12959] __kasan_slab_alloc+0xb1/0xe0 [ 187.399488][T12959] slab_post_alloc_hook+0x53/0x2c0 [ 187.404434][T12959] kmem_cache_alloc+0xf5/0x200 [ 187.409033][T12959] skb_clone+0x1d1/0x360 [ 187.413114][T12959] sk_psock_verdict_recv+0x53/0x840 [ 187.418148][T12959] unix_read_sock+0x132/0x370 [ 187.422662][T12959] sk_psock_verdict_data_ready+0x147/0x1a0 [ 187.428303][T12959] unix_dgram_sendmsg+0x15fa/0x2090 [ 187.433348][T12959] ____sys_sendmsg+0x59e/0x8f0 [ 187.437937][T12959] ___sys_sendmsg+0x252/0x2e0 [ 187.442449][T12959] __se_sys_sendmsg+0x19a/0x260 [ 187.447137][T12959] __x64_sys_sendmsg+0x7b/0x90 [ 187.451735][T12959] do_syscall_64+0x3d/0xb0 [ 187.455988][T12959] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 187.461719][T12959] [ 187.463887][T12959] Freed by task 5199: [ 187.467706][T12959] kasan_set_track+0x4b/0x70 [ 187.472132][T12959] kasan_set_free_info+0x23/0x40 [ 187.476905][T12959] ____kasan_slab_free+0x126/0x160 [ 187.481851][T12959] __kasan_slab_free+0x11/0x20 [ 187.486452][T12959] slab_free_freelist_hook+0xbd/0x190 [ 187.491661][T12959] kmem_cache_free+0x116/0x2e0 [ 187.496261][T12959] kfree_skbmem+0x104/0x170 [ 187.500601][T12959] kfree_skb+0xc2/0x360 [ 187.504593][T12959] sk_psock_backlog+0xc21/0xd90 [ 187.509279][T12959] process_one_work+0x6bb/0xc10 [ 187.513966][T12959] worker_thread+0xad5/0x12a0 [ 187.518566][T12959] kthread+0x421/0x510 [ 187.522471][T12959] ret_from_fork+0x1f/0x30 [ 187.526726][T12959] [ 187.528895][T12959] The buggy address belongs to the object at ffff8881259e2c80 [ 187.528895][T12959] which belongs to the cache skbuff_head_cache of size 248 [ 187.543574][T12959] The buggy address is located 236 bytes inside of [ 187.543574][T12959] 248-byte region [ffff8881259e2c80, ffff8881259e2d78) [ 187.556799][T12959] The buggy address belongs to the page: [ 187.562246][T12959] page:ffffea0004967880 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1259e2 [ 187.572388][T12959] flags: 0x4000000000000200(slab|zone=1) [ 187.577864][T12959] raw: 4000000000000200 ffffea000494dc00 0000000400000004 ffff888107f98780 [ 187.586278][T12959] raw: 0000000000000000 00000000000c000c 00000001ffffffff 0000000000000000 [ 187.594694][T12959] page dumped because: kasan: bad access detected [ 187.600956][T12959] page_owner tracks the page as allocated [ 187.606584][T12959] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112a20(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_HARDWALL), pid 10833, ts 165904979299, free_ts 165066878854 [ 187.624206][T12959] post_alloc_hook+0x1a3/0x1b0 [ 187.628803][T12959] prep_new_page+0x1b/0x110 [ 187.633142][T12959] get_page_from_freelist+0x3550/0x35d0 [ 187.638523][T12959] __alloc_pages+0x27e/0x8f0 [ 187.642950][T12959] new_slab+0x9a/0x4e0 [ 187.646855][T12959] ___slab_alloc+0x39e/0x830 [ 187.651369][T12959] __slab_alloc+0x4a/0x90 [ 187.655535][T12959] kmem_cache_alloc+0x134/0x200 [ 187.660396][T12959] skb_clone+0x1d1/0x360 [ 187.664646][T12959] bpf_clone_redirect+0xa6/0x390 [ 187.669420][T12959] bpf_prog_705e93932f3cc54b+0x429/0xb98 [ 187.674887][T12959] bpf_test_run+0x478/0xa10 [ 187.679229][T12959] bpf_prog_test_run_skb+0xb41/0x1420 [ 187.684435][T12959] bpf_prog_test_run+0x3b0/0x630 [ 187.689208][T12959] __sys_bpf+0x525/0x760 [ 187.693288][T12959] __x64_sys_bpf+0x7c/0x90 [ 187.697540][T12959] page last free stack trace: [ 187.702053][T12959] free_unref_page_prepare+0x7c8/0x7d0 [ 187.707350][T12959] free_unref_page+0xe8/0x750 [ 187.711860][T12959] __free_pages+0x61/0xf0 [ 187.716027][T12959] __vunmap+0x7bc/0x8f0 [ 187.720021][T12959] vfree+0x7f/0xb0 [ 187.723579][T12959] kvfree+0x26/0x40 [ 187.727222][T12959] bpf_map_area_free+0x15/0x20 [ 187.731824][T12959] array_map_free+0x162/0x1c0 [ 187.736339][T12959] bpf_map_free_deferred+0x10d/0x1e0 [ 187.741456][T12959] process_one_work+0x6bb/0xc10 [ 187.746145][T12959] worker_thread+0xad5/0x12a0 [ 187.750656][T12959] kthread+0x421/0x510 [ 187.754563][T12959] ret_from_fork+0x1f/0x30 [ 187.758815][T12959] [ 187.760984][T12959] Memory state around the buggy address: [ 187.766459][T12959] ffff8881259e2c00: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 187.774355][T12959] ffff8881259e2c80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 187.782251][T12959] >ffff8881259e2d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc [ 187.790148][T12959] ^ [ 187.797439][T12959] ffff8881259e2d80: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 187.805338][T12959] ffff8881259e2e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 187.813234][T12959] ================================================================== [ 187.821130][T12959] Disabling lock debugging due to kernel taint [ 187.827271][T12959] ================================================================== [ 187.835106][T12959] BUG: KASAN: double-free or invalid-free in kmem_cache_free+0x116/0x2e0 [ 187.843349][T12959] [ 187.845523][T12959] CPU: 0 PID: 12959 Comm: syz.0.5479 Tainted: G B 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 187.856716][T12959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 187.866611][T12959] Call Trace: [ 187.869736][T12959] [ 187.872514][T12959] dump_stack_lvl+0x151/0x1b7 [ 187.877028][T12959] ? io_uring_drop_tctx_refs+0x190/0x190 [ 187.882492][T12959] ? __wake_up_klogd+0xd5/0x110 [ 187.887181][T12959] ? panic+0x751/0x751 [ 187.891087][T12959] ? kmem_cache_free+0x116/0x2e0 [ 187.895858][T12959] print_address_description+0x87/0x3b0 [ 187.901239][T12959] ? asm_common_interrupt+0x27/0x40 [ 187.906290][T12959] ? kmem_cache_free+0x116/0x2e0 [ 187.911048][T12959] ? kmem_cache_free+0x116/0x2e0 [ 187.915822][T12959] kasan_report_invalid_free+0x6b/0xa0 [ 187.921126][T12959] ____kasan_slab_free+0x13e/0x160 [ 187.926065][T12959] __kasan_slab_free+0x11/0x20 [ 187.930666][T12959] slab_free_freelist_hook+0xbd/0x190 [ 187.935960][T12959] ? kfree_skbmem+0x104/0x170 [ 187.940559][T12959] kmem_cache_free+0x116/0x2e0 [ 187.945159][T12959] kfree_skbmem+0x104/0x170 [ 187.949499][T12959] consume_skb+0xb4/0x250 [ 187.953663][T12959] __sk_msg_free+0x2dd/0x370 [ 187.958091][T12959] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 187.963731][T12959] sk_psock_stop+0x44c/0x4d0 [ 187.968158][T12959] ? unix_peer_get+0xe0/0xe0 [ 187.972583][T12959] sock_map_close+0x2b9/0x4c0 [ 187.977096][T12959] ? sock_map_remove_links+0x570/0x570 [ 187.982391][T12959] ? rwsem_mark_wake+0x770/0x770 [ 187.987163][T12959] ? security_file_free+0xc6/0xe0 [ 187.992027][T12959] unix_release+0x82/0xc0 [ 187.996190][T12959] sock_close+0xdf/0x270 [ 188.000279][T12959] ? sock_mmap+0xa0/0xa0 [ 188.004348][T12959] __fput+0x3fe/0x910 [ 188.008173][T12959] ____fput+0x15/0x20 [ 188.011988][T12959] task_work_run+0x129/0x190 [ 188.016413][T12959] exit_to_user_mode_loop+0xc4/0xe0 [ 188.021448][T12959] exit_to_user_mode_prepare+0x5a/0xa0 [ 188.026741][T12959] syscall_exit_to_user_mode+0x26/0x160 [ 188.032122][T12959] do_syscall_64+0x49/0xb0 [ 188.036376][T12959] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 188.042108][T12959] RIP: 0033:0x7f9fdf301f19 [ 188.046358][T12959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 188.065886][T12959] RSP: 002b:00007fff7d59a448 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 188.074130][T12959] RAX: 0000000000000000 RBX: 00007f9fdf493a60 RCX: 00007f9fdf301f19 [ 188.081943][T12959] RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 [ 188.089757][T12959] RBP: 00007f9fdf493a60 R08: 0000000000000000 R09: 0000000c7d59a76f [ 188.097566][T12959] R10: 000000000003fd88 R11: 0000000000000246 R12: 000000000002dcbd [ 188.105374][T12959] R13: 0000000000000032 R14: 00007f9fdf493a60 R15: 00007fff7d59a530 [ 188.113198][T12959] [ 188.116053][T12959] [ 188.118222][T12959] Allocated by task 12961: [ 188.122649][T12959] __kasan_slab_alloc+0xb1/0xe0 [ 188.127336][T12959] slab_post_alloc_hook+0x53/0x2c0 [ 188.132280][T12959] kmem_cache_alloc+0xf5/0x200 [ 188.136879][T12959] skb_clone+0x1d1/0x360 [ 188.140961][T12959] sk_psock_verdict_recv+0x53/0x840 [ 188.145994][T12959] unix_read_sock+0x132/0x370 [ 188.150505][T12959] sk_psock_verdict_data_ready+0x147/0x1a0 [ 188.156244][T12959] unix_dgram_sendmsg+0x15fa/0x2090 [ 188.161363][T12959] ____sys_sendmsg+0x59e/0x8f0 [ 188.165970][T12959] ___sys_sendmsg+0x252/0x2e0 [ 188.170479][T12959] __se_sys_sendmsg+0x19a/0x260 [ 188.175170][T12959] __x64_sys_sendmsg+0x7b/0x90 [ 188.179765][T12959] do_syscall_64+0x3d/0xb0 [ 188.184021][T12959] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 188.189746][T12959] [ 188.191917][T12959] Freed by task 5199: [ 188.195734][T12959] kasan_set_track+0x4b/0x70 [ 188.200159][T12959] kasan_set_free_info+0x23/0x40 [ 188.204933][T12959] ____kasan_slab_free+0x126/0x160 [ 188.209880][T12959] __kasan_slab_free+0x11/0x20 [ 188.214480][T12959] slab_free_freelist_hook+0xbd/0x190 [ 188.219686][T12959] kmem_cache_free+0x116/0x2e0 [ 188.224287][T12959] kfree_skbmem+0x104/0x170 [ 188.228629][T12959] kfree_skb+0xc2/0x360 [ 188.232621][T12959] sk_psock_backlog+0xc21/0xd90 [ 188.237307][T12959] process_one_work+0x6bb/0xc10 [ 188.241994][T12959] worker_thread+0xad5/0x12a0 [ 188.246510][T12959] kthread+0x421/0x510 [ 188.250412][T12959] ret_from_fork+0x1f/0x30 [ 188.254666][T12959] [ 188.256836][T12959] The buggy address belongs to the object at ffff8881259e2c80 [ 188.256836][T12959] which belongs to the cache skbuff_head_cache of size 248 [ 188.271243][T12959] The buggy address is located 0 bytes inside of [ 188.271243][T12959] 248-byte region [ffff8881259e2c80, ffff8881259e2d78) [ 188.284175][T12959] The buggy address belongs to the page: [ 188.289645][T12959] page:ffffea0004967880 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1259e2 [ 188.299712][T12959] flags: 0x4000000000000200(slab|zone=1) [ 188.305183][T12959] raw: 4000000000000200 ffffea000494dc00 0000000400000004 ffff888107f98780 [ 188.313611][T12959] raw: 0000000000000000 00000000000c000c 00000001ffffffff 0000000000000000 [ 188.322017][T12959] page dumped because: kasan: bad access detected [ 188.328266][T12959] page_owner tracks the page as allocated [ 188.333819][T12959] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112a20(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_HARDWALL), pid 10833, ts 165904979299, free_ts 165066878854 [ 188.351353][T12959] post_alloc_hook+0x1a3/0x1b0 [ 188.355951][T12959] prep_new_page+0x1b/0x110 [ 188.360290][T12959] get_page_from_freelist+0x3550/0x35d0 [ 188.365671][T12959] __alloc_pages+0x27e/0x8f0 [ 188.370100][T12959] new_slab+0x9a/0x4e0 [ 188.374007][T12959] ___slab_alloc+0x39e/0x830 [ 188.378430][T12959] __slab_alloc+0x4a/0x90 [ 188.382597][T12959] kmem_cache_alloc+0x134/0x200 [ 188.387283][T12959] skb_clone+0x1d1/0x360 [ 188.391361][T12959] bpf_clone_redirect+0xa6/0x390 [ 188.396137][T12959] bpf_prog_705e93932f3cc54b+0x429/0xb98 [ 188.401603][T12959] bpf_test_run+0x478/0xa10 [ 188.405944][T12959] bpf_prog_test_run_skb+0xb41/0x1420 [ 188.411148][T12959] bpf_prog_test_run+0x3b0/0x630 [ 188.415924][T12959] __sys_bpf+0x525/0x760 [ 188.420003][T12959] __x64_sys_bpf+0x7c/0x90 [ 188.424256][T12959] page last free stack trace: [ 188.428769][T12959] free_unref_page_prepare+0x7c8/0x7d0 [ 188.434063][T12959] free_unref_page+0xe8/0x750 [ 188.438576][T12959] __free_pages+0x61/0xf0 [ 188.442741][T12959] __vunmap+0x7bc/0x8f0 [ 188.446823][T12959] vfree+0x7f/0xb0 [ 188.450380][T12959] kvfree+0x26/0x40 [ 188.454025][T12959] bpf_map_area_free+0x15/0x20 [ 188.458624][T12959] array_map_free+0x162/0x1c0 [ 188.463138][T12959] bpf_map_free_deferred+0x10d/0x1e0 [ 188.468260][T12959] process_one_work+0x6bb/0xc10 [ 188.472946][T12959] worker_thread+0xad5/0x12a0 [ 188.477462][T12959] kthread+0x421/0x510 [ 188.481367][T12959] ret_from_fork+0x1f/0x30 [ 188.485623][T12959] [ 188.487787][T12959] Memory state around the buggy address: [ 188.493261][T12959] ffff8881259e2b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 188.501156][T12959] ffff8881259e2c00: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 188.509229][T12959] >ffff8881259e2c80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 188.517126][T12959] ^ [ 188.521031][T12959] ffff8881259e2d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc [ 188.528930][T12959] ffff8881259e2d80: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 188.536914][T12959] ================================================================== [ 188.556395][ T347] device veth0_vlan left promiscuous mode [ 188.630138][T12958] device pim6reg1 entered promiscuous mode