last executing test programs:

720.293261ms ago: executing program 3 (id=5445):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r2, 0xffff0000, 0x10, 0x0, &(0x7f00000007c0)="2b206d0748010097737ea49da2aa0771", 0x0, 0xf000, 0x720e, 0x20, 0x0, 0x0, 0x0}, 0x50)

636.620178ms ago: executing program 3 (id=5448):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181200", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22}, 0x48)
bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xd, 0x6, 0x4, 0x5, 0x0, r2}, 0x48)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)

636.325348ms ago: executing program 2 (id=5449):
bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0x8, 0x8}, 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10)
bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000080), &(0x7f0000000200)='%-010d \x00'}, 0x20)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
close(r3)
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [<r4=>0xffffffffffffffff]}}], 0x18}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="b400000000000080711137000000000016000000000000009500740000000000b402ec93b282c07873a8077854eaac347b467aff0b95b792ea215f28d0a539b1c071b2652544c7f45b83fe0a2d9481cbf5b321e17d749308e6983942ca38f2b80af1fb998fcd6e3dfca1cda87552ee6112f1d390185a"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195}, 0x22)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4)
write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef)

635.953538ms ago: executing program 3 (id=5450):
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0))
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
close(r1)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB], 0x0}, 0x90)
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10)
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [<r4=>0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033300fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef)

635.658148ms ago: executing program 2 (id=5451):
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200))
bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e63"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
close(r1)
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [<r2=>0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r2, 0x0, 0xfdef)

623.255619ms ago: executing program 0 (id=5453):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200180000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000f80)=ANY=[@ANYBLOB="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"/3112], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xf, 0xf00, &(0x7f0000000100)="b9ff0b076859268cb89e14f088a847", 0x0, 0xf00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50)

605.84119ms ago: executing program 3 (id=5454):
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r0}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], 0x0}, 0x90)
r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a5000000080000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0))
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200))
bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e63"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff})
close(r4)
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [<r5=>0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef)

604.013251ms ago: executing program 2 (id=5455):
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c)
r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4)
bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0))
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200))
bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e63"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff})
close(r5)
recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [<r6=>0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef)

566.638533ms ago: executing program 2 (id=5458):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r0}, &(0x7f0000000600), &(0x7f0000000640)}, 0x20)
r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10)
r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0)
ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1})
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast})

565.144634ms ago: executing program 3 (id=5460):
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0x8, 0x8}, 0x48)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000800)={{r1}, &(0x7f0000000780), &(0x7f00000007c0)}, 0x20)
r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10)
close(0xffffffffffffffff)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48)
r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0xfffffffc}, 0x48)
bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r6, r5, 0x26}, 0x10)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20)
recvmsg(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/231, 0xe7}, 0x40010140)
sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000480)='+]\'-\\\x00')

564.168094ms ago: executing program 4 (id=5461):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181200", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22}, 0x48)
bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xd, 0x6, 0x4, 0x5, 0x0, r2}, 0x48)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)

506.479378ms ago: executing program 4 (id=5462):
bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0x8, 0x8}, 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10)
bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000080), &(0x7f0000000200)='%-010d \x00'}, 0x20)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
close(r3)
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [<r4=>0xffffffffffffffff]}}], 0x18}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="b400000000000080711137000000000016000000000000009500740000000000b402ec93b282c07873a8077854eaac347b467aff0b95b792ea215f28d0a539b1c071b2652544c7f45b83fe0a2d9481cbf5b321e17d749308e6983942ca38f2b80af1fb998fcd6e3dfca1cda87552ee6112f1d390185a"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195}, 0x22)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4)
write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef)

495.36822ms ago: executing program 3 (id=5463):
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x2, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48)
r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0)
r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0)
ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101})
close(r2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500))
ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast})
r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xb, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000006020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0)
ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000280)=r4)
ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101})
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x90)
write$cgroup_devices(r5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1e0306003c5c980128846360864666702c1ffe80"], 0xffdd)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r1}, &(0x7f0000000040), &(0x7f0000000140)=r0}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r6}, 0x10)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'})
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r7=>0xffffffffffffffff})
r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90)
r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r9}, 0x10)
r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r10}, 0x10)
r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='track_foreign_dirty\x00', r11}, 0x10)
ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8922, &(0x7f0000000080))

492.38385ms ago: executing program 0 (id=5464):
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0))
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
close(r1)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0}, 0x90)
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10)
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [<r4=>0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033300fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef)

476.283911ms ago: executing program 4 (id=5465):
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200))
bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e63"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
close(r1)
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [<r2=>0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[], 0xfdef)

473.069381ms ago: executing program 2 (id=5466):
r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48)
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='percpu_alloc_percpu\x00', r3}, 0x10)
r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10)
perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000280)='sched_switch\x00', r1}, 0x10)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r6=>0xffffffffffffffff})
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x18, 0x10, &(0x7f00000004c0)=@raw=[@tail_call, @map_idx={0x18, 0x1, 0x5, 0x0, 0x6}, @exit, @ldst={0x1, 0x0, 0x1, 0xd, 0x4, 0x100, 0x8}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x6}, @ldst={0x1, 0x2, 0x5, 0x4, 0xb, 0xfffffffffffffff0}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @generic={0x8, 0x2, 0x7, 0x50c, 0xa1e}], &(0x7f00000006c0)='GPL\x00', 0x0, 0x2b, &(0x7f0000000700)=""/43, 0x20800, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000bc0)={0x2, 0xa, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c00)=[r0], &(0x7f0000000c40)=[{0x3, 0x1, 0xe, 0xb}, {0x1, 0x3, 0x4, 0x1}, {0x0, 0x5, 0x8, 0xa}, {0x5, 0x1, 0xd, 0x6}, {0x4, 0x2, 0x10, 0x1}], 0x10, 0x1}, 0x90)
ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote})
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, <r7=>0xffffffffffffffff})
ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"})
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000008000008500000006000000957076245b9f20111b348a765ba2ccc3f79777e125b35a37a8cefcf228ccd92c431f16a44ca041d8c78cebadaabf2eccdef6e5a391e1d295edbb22671e4b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90)

464.211452ms ago: executing program 4 (id=5467):
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc0189436, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x0, 0x0, 0x8}, 0x48)
r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x0, 0x7f}, 0x48)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="180800000000000000000000000000000013feff0400000018100000", @ANYRES32=r2, @ANYBLOB="00000000000000002c0006000000000018000000000095000000000000001800000006000000000000000900000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xde, &(0x7f0000000340)=""/222, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90)
close(r2)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={0x0}, 0x10)
r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48)
r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xd, 0x3, 0x4, 0x1, 0x0, r3}, 0x48)
r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x4, 0x8, 0x1}, 0x48)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xe, 0x0, 0x0, [{}]}]}}, &(0x7f0000000540)=""/252, 0x32, 0xfc, 0x1}, 0x20)
perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x3)
r6 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r6, 0x0)
r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x18, 0xa, &(0x7f0000000680)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="000000000000001f6e0000000000000018100000", @ANYRES32=r7, @ANYBLOB="0000000800000000950000000000000095000000000000008a979cd1449f428129330edd901995442a759e170842a95f03dad4fe6212543a6a30"], &(0x7f0000000000)='GPL\x00', 0x6, 0xfdcb, &(0x7f0000000340)=""/238}, 0x80)
bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000380), 0x7, r5}, 0x38)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r4}, &(0x7f0000000840), &(0x7f0000000880)=r3}, 0x20)
bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r4, &(0x7f0000000d40), 0x0}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)

432.564875ms ago: executing program 0 (id=5469):
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48)
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r1)
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [<r2=>0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef)

432.374125ms ago: executing program 1 (id=5470):
r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000"], 0x0, 0x26}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1, 0x0, 0xffffffffffffffff, 0xf5010000}, 0x6d)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0x8, 0x8}, 0x48)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10)
bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff})
close(r4)
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [<r5=>0xffffffffffffffff]}}], 0x18}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="b400000000000080711137000000000016000000000000009500740000000000b402ec93b282c07873a8077854eaac347b467aff0b95b792ea215f28d0a539b1c071b2652544c7f45b83fe0a2d9481cbf5b321e17d749308e6983942ca38f2b80af1fb998fcd6e3dfca1cda87552ee6112f1d390185a"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195}, 0x22)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10)
openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0)
write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef)

419.928936ms ago: executing program 1 (id=5471):
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r0}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], 0x0}, 0x90)
r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a5000000080000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0))
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200))
bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e63"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff})
close(r4)
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [<r5=>0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef)

419.596986ms ago: executing program 0 (id=5472):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181200", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22}, 0x48)
bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xd, 0x6, 0x4, 0x5, 0x0, r2}, 0x48)
bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0)

410.749016ms ago: executing program 1 (id=5473):
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x24, 0x60000000}, 0x2c)
r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4)
bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0))
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200))
bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e63"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff})
close(r5)
recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [<r6=>0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef)

369.2602ms ago: executing program 4 (id=5474):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0x8, 0x8}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10)
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
close(r2)
recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [<r3=>0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef)

368.432429ms ago: executing program 0 (id=5475):
bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0x8, 0x8}, 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10)
bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000080), &(0x7f0000000200)='%-010d \x00'}, 0x20)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
close(r3)
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [<r4=>0xffffffffffffffff]}}], 0x18}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="b400000000000080711137000000000016000000000000009500740000000000b402ec93b282c07873a8077854eaac347b467aff0b95b792ea215f28d0a539b1c071b2652544c7f45b83fe0a2d9481cbf5b321e17d749308e6983942ca38f2b80af1fb998fcd6e3dfca1cda87552ee6112f1d390185a"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195}, 0x22)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4)
write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef)

368.13809ms ago: executing program 4 (id=5476):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r0}, &(0x7f0000000600), &(0x7f0000000640)}, 0x20)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10)
r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0)
ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1})
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast})

367.30986ms ago: executing program 1 (id=5477):
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200))
bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e63"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
close(r1)
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [<r2=>0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[], 0xfdef)

357.429781ms ago: executing program 2 (id=5478):
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0)
r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000002c0)={&(0x7f0000000080)="94576282d4cceb90cb5c19e64a75df932ec16f370526b4e7742e6e36c2d87abb6e858aa2e07e918d4e3a8b75003d7355c60a4401e956551ba5fef376edfce0ddd1a247a10874605eee69911683f94b0ccdbb255fb31440c0ddb5320c29d7bd141cb1f7cd2c7c76767ea78c88a2a77ce8efb8c7783a0007aa6f6a2b803e0b0b90a1974a81de2874381cb39347a3", &(0x7f0000000140)=""/66, &(0x7f00000001c0)="c6f6dbcf3cb65ccfddd1868c5d308cee56bb63253a419f17b43ff6a0cc50f4a3ed70bde0b09817d2c795e1c8b36a7ad76b35c73d9e081520cf3039fd9059408cd2b0b6b21c9638134f9401ef9f54611fb9ac0d1fed575a5889f29c3ed39cb053aa69fd68a829b0224603b4fe31ba0bc5cc53e9ecf30501d0a198eb31cd142ac8d53196c5db5a2dc6938cfb64d96bcf292f617b8512bc3e28053a78901d03", &(0x7f0000000280)="4ccad79b6ff08d91e2ca2ba6554029c01d691215b2a0f3e67c8167503b6d850eb509a5fd637b3e359d519ebf9a49a90553a15e3ab190", 0x1, r1}, 0x38)
bpf$PROG_BIND_MAP(0x23, &(0x7f0000000300)={r1, r1}, 0xc)
perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x2, 0x10, 0x7, 0x97, 0x0, 0xa, 0x9adcacf70653211d, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000340), 0x1}, 0x800, 0x1000, 0x6, 0x9, 0x3, 0x7, 0x0, 0x0, 0x6, 0x0, 0xb0}, r0, 0x5, 0xffffffffffffffff, 0xe)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000480)={{r1, <r2=>0xffffffffffffffff}, &(0x7f0000000400), &(0x7f0000000440)}, 0x20)
r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0), 0x4)
r4 = openat$cgroup_ro(r0, &(0x7f0000000500)='memory.numa_stat\x00', 0x0, 0x0)
recvmsg(r1, &(0x7f00000018c0)={&(0x7f0000000540)=@hci, 0x80, &(0x7f0000001880)=[{&(0x7f00000005c0)=""/216, 0xd8}, {&(0x7f00000006c0)=""/188, 0xbc}, {&(0x7f0000000780)=""/207, 0xcf}, {&(0x7f0000000880)=""/4096, 0x1000}], 0x4}, 0x40012140)
r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001900)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0xfffffffe, '\x00', 0x0, r1, 0x2, 0x2, 0x4}, 0x48)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001c40)={r4, 0xe0, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000001980)=[0x0, 0x0, 0x0, 0x0], ""/16, <r6=>0x0, 0x0, 0x0, 0x0, 0x3, 0x7, &(0x7f00000019c0)=[0x0, 0x0, 0x0], &(0x7f0000001a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], <r7=>0x0, 0xa0, &(0x7f0000001a40)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000001a80), &(0x7f0000001ac0), 0x8, 0xcd, 0x8, 0x8, &(0x7f0000001b00)}}, 0x10)
bpf$MAP_CREATE(0x0, &(0x7f0000001c80)=@bloom_filter={0x1e, 0x401, 0x8, 0x7, 0x802, r5, 0x6, '\x00', r6, r1, 0x1, 0x2, 0x3, 0x2}, 0x48)
write$cgroup_subtree(r1, &(0x7f0000001d00)={[{0x2d, 'rdma'}, {0x2b, 'pids'}, {0x2b, 'devices'}, {0x2d, 'rlimit'}, {0x2d, 'blkio'}, {0x2d, 'devices'}, {0x2d, 'rlimit'}, {0x2d, 'cpu'}, {0x2b, 'net_prio'}]}, 0x44)
bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001dc0)=@generic={&(0x7f0000001d80)='./file0\x00', r1}, 0x18)
r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001e00)='./cgroup.net/syz1\x00', 0x200002, 0x0)
r9 = openat$cgroup_ro(r8, &(0x7f0000001e40)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0)
r10 = openat$cgroup_ro(r4, &(0x7f0000001f00)='memory.stat\x00', 0x0, 0x0)
r11 = perf_event_open$cgroup(&(0x7f0000001f80)={0x1, 0x80, 0x3, 0x7f, 0xe, 0x5, 0x0, 0x1000, 0x80, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x46ec0d0f, 0x4, @perf_bp={&(0x7f0000001f40), 0x9}, 0x20, 0xc, 0x8, 0x1, 0x51, 0x83ed, 0x6, 0x0, 0x5}, r4, 0x0, 0xffffffffffffffff, 0xa)
perf_event_open$cgroup(&(0x7f0000001e80)={0x2, 0x80, 0x6, 0xf7, 0x46, 0x3, 0x0, 0x8, 0x1180, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xaf3, 0x2, @perf_config_ext={0x2, 0x9}, 0x15000, 0x5, 0x5, 0x2, 0xff, 0xe00, 0x9, 0x0, 0x68000, 0x0, 0x2}, r10, 0x3, r11, 0x1)
close(r3)
r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000002000)={0x1b, 0x0, 0x0, 0x7, 0x0, r2, 0x3, '\x00', r6, r9, 0x4, 0x1, 0x4}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x1, 0x15, &(0x7f0000002080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@btf_id={0x18, 0x7, 0x3, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x4e}, @jmp={0x5, 0x0, 0x0, 0x3, 0x7, 0x1, 0x1}, @map_fd={0x18, 0x8, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000002140)='GPL\x00', 0x1000, 0xb8, &(0x7f0000002180)=""/184, 0x0, 0x0, '\x00', r6, 0xe, r10, 0x8, &(0x7f0000002240)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002280)={0x1, 0x8, 0xffff, 0x5}, 0x10, r7, r9, 0x9, &(0x7f00000022c0)=[r2], &(0x7f0000002300)=[{0x1, 0x5, 0xf, 0xa}, {0x2, 0x2, 0xb, 0xa}, {0x3, 0x1, 0x10, 0x1}, {0x1, 0x4, 0xa, 0xb}, {0x5, 0x1, 0xc, 0x2}, {0x2, 0x3, 0x8, 0x7}, {0x4, 0x1, 0x10, 0x7}, {0x1, 0x3, 0xf, 0x8}, {0x3, 0x2, 0xd, 0x7}], 0x10, 0xa}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002540)={&(0x7f0000002480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@int={0x9, 0x0, 0x0, 0x1, 0x0, 0x52, 0x0, 0x80}, @restrict={0xf, 0x0, 0x0, 0xb, 0x1}, @func={0x10, 0x0, 0x0, 0xc, 0x1}]}, {0x0, [0x2e, 0x61, 0x61]}}, &(0x7f0000002500), 0x45, 0x0, 0x1, 0x7fffffff}, 0x20)
openat$cgroup_freezer_state(r9, &(0x7f0000002580), 0x2, 0x0)
perf_event_open(&(0x7f00000025c0)={0x0, 0x80, 0x80, 0x3, 0x38, 0xc, 0x0, 0x8001, 0x0, 0x13, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffff8001, 0x0, @perf_config_ext={0x5f65, 0x1}, 0x10, 0x7, 0xfffffffa, 0x3, 0xf6a, 0x7, 0x9, 0x0, 0x4, 0x0, 0x4}, 0xffffffffffffffff, 0xe, r4, 0x1)
r13 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000002640)='cgroup.threads\x00', 0x2, 0x0)
r14 = getpid()
write$cgroup_pid(r13, &(0x7f0000002680)=r14, 0x12)
sendmsg$inet(r4, &(0x7f0000003940)={0x0, 0x0, &(0x7f0000003740)=[{&(0x7f00000026c0)="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", 0x1000}, {&(0x7f00000036c0)="c15d0416a16c8adec9ce7b371d1a198ae23a160ea051292975793516f879cfdf73d9fa52cc45f7b88c0b695e7652e5a9d58fbbb0093d2a719b2b182f439b5dbef64e05aa43ea0136fe41f75745ea", 0x4e}], 0x2, &(0x7f0000003780)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_tos_int={{0x14}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @empty, @multicast2}}}, @ip_retopts={{0x12c, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x3e, 0x0, 0x5, [0x80, 0xb, 0x3, 0xbe, 0x46cd4e7c]}, @timestamp_prespec={0x44, 0x4, 0x25, 0x3, 0x2}, @ssrr={0x89, 0x13, 0x34, [@empty, @dev={0xac, 0x14, 0x14, 0x24}, @dev={0xac, 0x14, 0x14, 0x1a}, @local]}, @cipso={0x86, 0x22, 0x2, [{0x2, 0xe, "873f8dc763fba80c3e207d97"}, {0x1, 0x4, "9961"}, {0x2, 0xa, "9b559f6e03683d47"}]}, @cipso={0x86, 0x4a, 0x1, [{0x6, 0xc, "c82f58c0770d4cdf1ffe"}, {0x5, 0x3, "f0"}, {0x5, 0x8, "a8480596ca1a"}, {0x5, 0x6, "e04181aa"}, {0x3, 0x3, 't'}, {0x2, 0x8, "5c0b8c5c979b"}, {0x0, 0x11, "6e6e0d9eee6200590079508679a634"}, {0x7, 0xb, "4bc80d5fd103fed3ef"}]}, @timestamp={0x44, 0x10, 0xa5, 0x0, 0x3, [0x1, 0x0, 0x1]}, @cipso={0x86, 0x45, 0xffffffffffffffff, [{0x7, 0x6, "ef0090cb"}, {0x0, 0x7, "dba1b236cb"}, {0x1, 0xe, "0a35b4cc844116b96d037f7c"}, {0x5, 0xe, "8f9a325f9cc84ccad9242ad8"}, {0x0, 0x9, "99b137606f8da2"}, {0x1, 0xd, "889e208793d83252881957"}]}, @timestamp_addr={0x44, 0x2c, 0x39, 0x1, 0x1, [{@local, 0x2}, {@broadcast, 0x4}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2da000}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x8}, {@empty, 0x6}]}]}}}], 0x1b0}, 0x24040014)
bpf$MAP_CREATE(0x0, &(0x7f0000003980)=@bloom_filter={0x1e, 0x9, 0x2, 0x9, 0xa0, r5, 0xbcfb, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x1, 0xb}, 0x48)

350.554051ms ago: executing program 0 (id=5479):
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0x8, 0x8}, 0x48)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000800)={{r1}, &(0x7f0000000780), &(0x7f00000007c0)}, 0x20)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10)
close(r0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48)
r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48)
bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r5, r4, 0x26}, 0x10)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r5}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20)
sendmsg$inet(r3, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) (fail_nth: 5)

350.193701ms ago: executing program 1 (id=5480):
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0))
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
close(r1)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0}, 0x90)
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10)
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [<r4=>0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033300fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef)

0s ago: executing program 1 (id=5481):
r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000"], 0x0, 0x26}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1, 0x0, 0xffffffffffffffff, 0xf5010000}, 0x6d)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0x8, 0x8}, 0x48)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10)
bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff})
close(r4)
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [<r5=>0xffffffffffffffff]}}], 0x18}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="b400000000000080711137000000000016000000000000009500740000000000b402ec93b282c07873a8077854eaac347b467aff0b95b792ea215f28d0a539b1c071b2652544c7f45b83fe0a2d9481cbf5b321e17d749308e6983942ca38f2b80af1fb998fcd6e3dfca1cda87552ee6112f1d390185a"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195}, 0x22)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10)
openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0)
write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef)

kernel console output (not intermixed with test programs):

ered promiscuous mode
[  158.815405][ T9548] device veth0_vlan left promiscuous mode
[  158.823860][ T9548] device veth0_vlan entered promiscuous mode
[  158.955629][ T9572] device pim6reg1 entered promiscuous mode
[  159.088209][ T9619] device pim6reg1 entered promiscuous mode
[  159.215746][ T9654] device pim6reg1 entered promiscuous mode
[  159.354477][ T9692] device pim6reg1 entered promiscuous mode
[  159.437192][ T9704] device veth0_vlan left promiscuous mode
[  159.463691][ T9704] device veth0_vlan entered promiscuous mode
[  159.537076][ T9733] device pim6reg1 entered promiscuous mode
[  159.558755][ T9736] device veth0_vlan left promiscuous mode
[  159.564894][ T9736] device veth0_vlan entered promiscuous mode
[  159.670814][ T9754] device veth0_vlan left promiscuous mode
[  159.711043][ T9754] device veth0_vlan entered promiscuous mode
[  159.746946][ T5203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  159.757971][ T5203] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  159.765418][ T5203] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  159.775145][ T9770] device veth0_vlan left promiscuous mode
[  159.783486][ T9770] device veth0_vlan entered promiscuous mode
[  159.805247][ T9775] device pim6reg1 entered promiscuous mode
[  159.841725][ T9778] device veth0_vlan left promiscuous mode
[  159.848027][ T9778] device veth0_vlan entered promiscuous mode
[  159.936870][ T9797] device veth0_vlan left promiscuous mode
[  159.971551][ T9797] device veth0_vlan entered promiscuous mode
[  160.026202][ T9816] device veth0_vlan left promiscuous mode
[  160.060336][ T9816] device veth0_vlan entered promiscuous mode
[  160.076588][ T9827] device pim6reg1 entered promiscuous mode
[  160.187084][ T9849] device veth0_vlan left promiscuous mode
[  160.235128][ T9849] device veth0_vlan entered promiscuous mode
[  160.307208][ T9866] device pim6reg1 entered promiscuous mode
[  160.372366][ T9876] device veth0_vlan left promiscuous mode
[  160.403748][ T9876] device veth0_vlan entered promiscuous mode
[  160.545777][ T9909] device veth0_vlan left promiscuous mode
[  160.642280][ T9909] device veth0_vlan entered promiscuous mode
[  160.657449][ T9934] device pim6reg1 entered promiscuous mode
[  160.670015][ T9931] device veth0_vlan left promiscuous mode
[  160.676248][ T9931] device veth0_vlan entered promiscuous mode
[  160.827095][ T9973] device veth0_vlan left promiscuous mode
[  160.833731][ T9973] device veth0_vlan entered promiscuous mode
[  160.853415][ T9959] device veth0_vlan left promiscuous mode
[  160.903576][ T9959] device veth0_vlan entered promiscuous mode
[  160.965596][ T9987] device pim6reg1 entered promiscuous mode
[  160.979485][ T9994] device veth0_vlan left promiscuous mode
[  161.013100][ T9994] device veth0_vlan entered promiscuous mode
[  161.076388][T10010] device veth0_vlan left promiscuous mode
[  161.089586][T10010] device veth0_vlan entered promiscuous mode
[  161.202122][T10038] device pim6reg1 entered promiscuous mode
[  161.243039][T10053] device veth0_vlan left promiscuous mode
[  161.249303][T10053] device veth0_vlan entered promiscuous mode
[  161.256939][T10045] device veth0_vlan left promiscuous mode
[  161.314213][T10045] device veth0_vlan entered promiscuous mode
[  161.419984][T10085] device veth0_vlan left promiscuous mode
[  161.431012][T10085] device veth0_vlan entered promiscuous mode
[  161.455332][T10096] device pim6reg1 entered promiscuous mode
[  161.511704][T10108] device veth0_vlan left promiscuous mode
[  161.602134][T10108] device veth0_vlan entered promiscuous mode
[  161.643391][T10136] device veth0_vlan left promiscuous mode
[  161.649881][T10136] device veth0_vlan entered promiscuous mode
[  161.667805][T10140] device pim6reg1 entered promiscuous mode
[  161.685384][T10133] device veth0_vlan left promiscuous mode
[  161.706336][T10133] device veth0_vlan entered promiscuous mode
[  161.713396][ T5203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  161.730447][ T5203] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  161.752805][ T5203] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  161.788625][T10163] device veth0_vlan left promiscuous mode
[  161.795436][T10163] device veth0_vlan entered promiscuous mode
[  161.859819][T10178] device veth0_vlan left promiscuous mode
[  161.874893][T10178] device veth0_vlan entered promiscuous mode
[  161.898237][   T30] audit: type=1400 audit(1721876866.539:151): avc:  denied  { ioctl } for  pid=10196 comm="syz.4.4191" path="socket:[49955]" dev="sockfs" ino=49955 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1
[  161.924449][T10193] device pim6reg1 entered promiscuous mode
[  161.939280][T10199] device pim6reg1 entered promiscuous mode
[  161.993178][T10213] device veth0_vlan left promiscuous mode
[  161.999488][T10213] device veth0_vlan entered promiscuous mode
[  162.079806][T10232] device pim6reg1 entered promiscuous mode
[  162.109708][T10230] device veth0_vlan left promiscuous mode
[  162.116676][T10230] device veth0_vlan entered promiscuous mode
[  162.128962][T10242] device pim6reg1 entered promiscuous mode
[  162.212162][T10254] device veth0_vlan left promiscuous mode
[  162.219397][T10254] device veth0_vlan entered promiscuous mode
[  162.248826][T10273] device wg2 entered promiscuous mode
[  162.327570][T10293] device pim6reg1 entered promiscuous mode
[  162.333924][T10289] device veth0_vlan left promiscuous mode
[  162.343141][T10289] device veth0_vlan entered promiscuous mode
[  162.398898][T10307] FAULT_INJECTION: forcing a failure.
[  162.398898][T10307] name failslab, interval 1, probability 0, space 0, times 0
[  162.415133][T10307] CPU: 0 PID: 10307 Comm: syz.1.4245 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  162.424942][T10307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  162.434834][T10307] Call Trace:
[  162.437969][T10307]  <TASK>
[  162.440864][T10307]  dump_stack_lvl+0x151/0x1b7
[  162.445332][T10307]  ? io_uring_drop_tctx_refs+0x190/0x190
[  162.450797][T10307]  ? avc_has_perm+0x16f/0x260
[  162.455311][T10307]  dump_stack+0x15/0x17
[  162.459304][T10307]  should_fail+0x3c6/0x510
[  162.463555][T10307]  __should_failslab+0xa4/0xe0
[  162.468156][T10307]  should_failslab+0x9/0x20
[  162.472501][T10307]  slab_pre_alloc_hook+0x37/0xd0
[  162.477270][T10307]  __kmalloc+0x6d/0x270
[  162.481268][T10307]  ? qdisc_alloc+0x75/0x770
[  162.485602][T10307]  qdisc_alloc+0x75/0x770
[  162.489766][T10307]  ? tun_device_event+0x3e5/0xf80
[  162.494626][T10307]  qdisc_create_dflt+0x6b/0x3e0
[  162.499314][T10307]  ? _raw_spin_lock+0xa4/0x1b0
[  162.504088][T10307]  dev_activate+0x2e0/0x1140
[  162.508514][T10307]  __dev_open+0x3bf/0x4e0
[  162.512680][T10307]  ? dev_open+0x260/0x260
[  162.516846][T10307]  ? _raw_spin_unlock_bh+0x51/0x60
[  162.521795][T10307]  ? dev_set_rx_mode+0x245/0x2e0
[  162.526569][T10307]  ? __kasan_check_read+0x11/0x20
[  162.531425][T10307]  __dev_change_flags+0x1db/0x6e0
[  162.536288][T10307]  ? avc_denied+0x1b0/0x1b0
[  162.540625][T10307]  ? dev_get_flags+0x1e0/0x1e0
[  162.545227][T10307]  ? _kstrtoull+0x3a0/0x4a0
[  162.549569][T10307]  dev_change_flags+0x8c/0x1a0
[  162.554166][T10307]  dev_ifsioc+0x147/0x10c0
[  162.558421][T10307]  ? dev_ioctl+0xe70/0xe70
[  162.562669][T10307]  ? mutex_lock+0xb6/0x1e0
[  162.566923][T10307]  ? wait_for_completion_killable_timeout+0x10/0x10
[  162.573347][T10307]  dev_ioctl+0x54d/0xe70
[  162.577429][T10307]  sock_do_ioctl+0x34f/0x5a0
[  162.581852][T10307]  ? sock_show_fdinfo+0xa0/0xa0
[  162.586544][T10307]  ? selinux_file_ioctl+0x3cc/0x540
[  162.591668][T10307]  sock_ioctl+0x455/0x740
[  162.595832][T10307]  ? sock_poll+0x400/0x400
[  162.600096][T10307]  ? __fget_files+0x31e/0x380
[  162.604637][T10307]  ? security_file_ioctl+0x84/0xb0
[  162.609545][T10307]  ? sock_poll+0x400/0x400
[  162.613802][T10307]  __se_sys_ioctl+0x114/0x190
[  162.618320][T10307]  __x64_sys_ioctl+0x7b/0x90
[  162.622739][T10307]  do_syscall_64+0x3d/0xb0
[  162.626990][T10307]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  162.632720][T10307] RIP: 0033:0x7f144f92cf19
[  162.636976][T10307] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  162.656412][T10307] RSP: 002b:00007f144e5ae048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  162.664659][T10307] RAX: ffffffffffffffda RBX: 00007f144fabcf60 RCX: 00007f144f92cf19
[  162.672471][T10307] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000009
[  162.680280][T10307] RBP: 00007f144e5ae0a0 R08: 0000000000000000 R09: 0000000000000000
[  162.688102][T10307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  162.695904][T10307] R13: 000000000000000b R14: 00007f144fabcf60 R15: 00007fffb1a54d88
[  162.703719][T10307]  </TASK>
[  162.707809][T10307] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue
[  162.715353][T10307] device pim6reg1 entered promiscuous mode
[  162.784791][T10332] device veth0_vlan left promiscuous mode
[  162.791244][T10332] device veth0_vlan entered promiscuous mode
[  162.818935][T10343] device pim6reg1 entered promiscuous mode
[  162.915486][T10370] device veth0_vlan left promiscuous mode
[  162.938416][T10370] device veth0_vlan entered promiscuous mode
[  162.953820][T10384] device pim6reg1 entered promiscuous mode
[  163.091632][T10418] device veth0_vlan left promiscuous mode
[  163.097848][T10418] device veth0_vlan entered promiscuous mode
[  163.151155][T10435] device pim6reg1 entered promiscuous mode
[  163.283999][T10463] device veth0_vlan left promiscuous mode
[  163.290512][T10463] device veth0_vlan entered promiscuous mode
[  163.475336][T10477] device pim6reg1 entered promiscuous mode
[  163.610641][T10487] device veth0_vlan left promiscuous mode
[  163.616790][T10487] device veth0_vlan entered promiscuous mode
[  163.872540][T10502] device pim6reg1 entered promiscuous mode
[  163.980061][T10512] device veth0_vlan left promiscuous mode
[  163.993147][T10512] device veth0_vlan entered promiscuous mode
[  164.062703][T10528] device pim6reg1 entered promiscuous mode
[  164.122573][T10552] device veth0_vlan left promiscuous mode
[  164.129141][T10552] device veth0_vlan entered promiscuous mode
[  164.160033][T10564] FAULT_INJECTION: forcing a failure.
[  164.160033][T10564] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  164.173304][T10564] CPU: 1 PID: 10564 Comm: syz.3.4366 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  164.183100][T10564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  164.192997][T10564] Call Trace:
[  164.196151][T10564]  <TASK>
[  164.198895][T10564]  dump_stack_lvl+0x151/0x1b7
[  164.203411][T10564]  ? io_uring_drop_tctx_refs+0x190/0x190
[  164.208875][T10564]  ? kstrtouint_from_user+0x20a/0x2a0
[  164.214084][T10564]  dump_stack+0x15/0x17
[  164.218349][T10564]  should_fail+0x3c6/0x510
[  164.222593][T10564]  should_fail_usercopy+0x1a/0x20
[  164.227449][T10564]  _copy_to_user+0x20/0x90
[  164.231702][T10564]  simple_read_from_buffer+0xc7/0x150
[  164.236909][T10564]  proc_fail_nth_read+0x1a3/0x210
[  164.241768][T10564]  ? proc_fault_inject_write+0x390/0x390
[  164.247237][T10564]  ? fsnotify_perm+0x470/0x5d0
[  164.251839][T10564]  ? security_file_permission+0x86/0xb0
[  164.257217][T10564]  ? proc_fault_inject_write+0x390/0x390
[  164.262685][T10564]  vfs_read+0x27d/0xd40
[  164.266678][T10564]  ? kernel_read+0x1f0/0x1f0
[  164.271105][T10564]  ? __kasan_check_write+0x14/0x20
[  164.276051][T10564]  ? mutex_lock+0xb6/0x1e0
[  164.280304][T10564]  ? wait_for_completion_killable_timeout+0x10/0x10
[  164.286728][T10564]  ? __fdget_pos+0x2e7/0x3a0
[  164.291153][T10564]  ? ksys_read+0x77/0x2c0
[  164.295320][T10564]  ksys_read+0x199/0x2c0
[  164.299399][T10564]  ? vfs_write+0x1110/0x1110
[  164.303825][T10564]  ? debug_smp_processor_id+0x17/0x20
[  164.309032][T10564]  ? fpregs_assert_state_consistent+0xb6/0xe0
[  164.315022][T10564]  __x64_sys_read+0x7b/0x90
[  164.319363][T10564]  do_syscall_64+0x3d/0xb0
[  164.323612][T10564]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  164.329344][T10564] RIP: 0033:0x7fd73780d9fc
[  164.333607][T10564] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8c 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 1f 8d 02 00 48
[  164.353036][T10564] RSP: 002b:00007fd736490040 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[  164.361281][T10564] RAX: ffffffffffffffda RBX: 00007fd73799ef60 RCX: 00007fd73780d9fc
[  164.369095][T10564] RDX: 000000000000000f RSI: 00007fd7364900b0 RDI: 0000000000000004
[  164.376940][T10564] RBP: 00007fd7364900a0 R08: 0000000000000000 R09: 0000000000000000
[  164.384713][T10564] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  164.392524][T10564] R13: 000000000000000b R14: 00007fd73799ef60 R15: 00007fff1933c2e8
[  164.400341][T10564]  </TASK>
[  164.445203][T10583] device pim6reg1 entered promiscuous mode
[  164.463974][T10587] device veth0_vlan left promiscuous mode
[  164.470675][T10587] device veth0_vlan entered promiscuous mode
[  164.578845][T10615] device veth0_vlan left promiscuous mode
[  164.588070][T10615] device veth0_vlan entered promiscuous mode
[  164.598458][T10621] device pim6reg1 entered promiscuous mode
[  164.695986][T10651] device veth0_vlan left promiscuous mode
[  164.702115][T10651] device veth0_vlan entered promiscuous mode
[  164.760190][T10667] device pim6reg1 entered promiscuous mode
[  164.823646][T10681] device veth0_vlan left promiscuous mode
[  164.829956][T10681] device veth0_vlan entered promiscuous mode
[  164.837327][T10680] device veth0_vlan left promiscuous mode
[  164.843385][T10680] device veth0_vlan entered promiscuous mode
[  164.863063][   T30] audit: type=1400 audit(1721876869.499:152): avc:  denied  { create } for  pid=10682 comm="syz.2.4423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1
[  164.874699][T10683] device sit0 entered promiscuous mode
[  165.011600][T10707] device pim6reg1 entered promiscuous mode
[  165.031792][T10709] device veth0_vlan left promiscuous mode
[  165.038234][T10709] device veth0_vlan entered promiscuous mode
[  165.129849][T10734] device veth0_vlan left promiscuous mode
[  165.136425][T10734] device veth0_vlan entered promiscuous mode
[  165.157545][T10741] device pim6reg1 entered promiscuous mode
[  165.171178][T10738] device veth0_vlan left promiscuous mode
[  165.177317][T10738] device veth0_vlan entered promiscuous mode
[  165.225396][T10745] device veth0_vlan left promiscuous mode
[  165.231725][T10745] device veth0_vlan entered promiscuous mode
[  165.300049][T10760] device veth0_vlan left promiscuous mode
[  165.306361][T10760] device veth0_vlan entered promiscuous mode
[  165.315411][T10763] device veth0_vlan left promiscuous mode
[  165.321526][T10763] device veth0_vlan entered promiscuous mode
[  165.352894][T10767] device pim6reg1 entered promiscuous mode
[  165.372936][T10769] device veth0_vlan left promiscuous mode
[  165.379363][T10769] device veth0_vlan entered promiscuous mode
[  165.462508][T10786] device veth0_vlan left promiscuous mode
[  165.469574][T10786] device veth0_vlan entered promiscuous mode
[  165.510456][T10796] device pim6reg1 entered promiscuous mode
[  165.516774][T10792] device veth0_vlan left promiscuous mode
[  165.523200][T10792] device veth0_vlan entered promiscuous mode
[  165.530127][T10794] device veth0_vlan left promiscuous mode
[  165.536334][T10794] device veth0_vlan entered promiscuous mode
[  165.619516][T10816] device veth0_vlan left promiscuous mode
[  165.625481][T10816] device veth0_vlan entered promiscuous mode
[  165.633236][T10818] device veth0_vlan left promiscuous mode
[  165.640390][T10818] device veth0_vlan entered promiscuous mode
[  165.705352][T10821] device veth0_vlan left promiscuous mode
[  165.711960][T10821] device veth0_vlan entered promiscuous mode
[  165.760551][T10835] device pim6reg1 entered promiscuous mode
[  166.051798][T10844] device veth0_vlan left promiscuous mode
[  166.059897][T10844] device veth0_vlan entered promiscuous mode
[  166.078973][T10850] device veth0_vlan left promiscuous mode
[  166.086761][T10850] device veth0_vlan entered promiscuous mode
[  166.100686][T10848] device veth0_vlan left promiscuous mode
[  166.108191][T10848] device veth0_vlan entered promiscuous mode
[  166.160362][T10866] FAULT_INJECTION: forcing a failure.
[  166.160362][T10866] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  166.166903][T10874] device pim6reg1 entered promiscuous mode
[  166.179066][T10866] CPU: 0 PID: 10866 Comm: syz.0.4512 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  166.188857][T10866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  166.198751][T10866] Call Trace:
[  166.201871][T10866]  <TASK>
[  166.204651][T10866]  dump_stack_lvl+0x151/0x1b7
[  166.209162][T10866]  ? io_uring_drop_tctx_refs+0x190/0x190
[  166.214631][T10866]  ? kmem_cache_free+0x116/0x2e0
[  166.219403][T10866]  dump_stack+0x15/0x17
[  166.223399][T10866]  should_fail+0x3c6/0x510
[  166.227650][T10866]  should_fail_usercopy+0x1a/0x20
[  166.232509][T10866]  _copy_from_user+0x20/0xd0
[  166.236936][T10866]  __copy_msghdr_from_user+0xaf/0x7c0
[  166.242147][T10866]  ? __ia32_sys_shutdown+0x70/0x70
[  166.247093][T10866]  ___sys_sendmsg+0x166/0x2e0
[  166.251690][T10866]  ? __sys_sendmsg+0x260/0x260
[  166.256314][T10866]  ? __fdget+0x1bc/0x240
[  166.260370][T10866]  __se_sys_sendmsg+0x19a/0x260
[  166.265061][T10866]  ? __x64_sys_sendmsg+0x90/0x90
[  166.269830][T10866]  ? ksys_write+0x260/0x2c0
[  166.274170][T10866]  ? debug_smp_processor_id+0x17/0x20
[  166.279375][T10866]  ? fpregs_assert_state_consistent+0xb6/0xe0
[  166.285278][T10866]  __x64_sys_sendmsg+0x7b/0x90
[  166.289878][T10866]  do_syscall_64+0x3d/0xb0
[  166.294217][T10866]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  166.299949][T10866] RIP: 0033:0x7f422e313f19
[  166.304203][T10866] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  166.324075][T10866] RSP: 002b:00007f422cf95048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  166.332320][T10866] RAX: ffffffffffffffda RBX: 00007f422e4a3f60 RCX: 00007f422e313f19
[  166.340131][T10866] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000007
[  166.347941][T10866] RBP: 00007f422cf950a0 R08: 0000000000000000 R09: 0000000000000000
[  166.355752][T10866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  166.363562][T10866] R13: 000000000000000b R14: 00007f422e4a3f60 R15: 00007ffc0a0ec658
[  166.371383][T10866]  </TASK>
[  166.430288][T10883] device veth0_vlan left promiscuous mode
[  166.437720][T10883] device veth0_vlan entered promiscuous mode
[  166.483063][T10900] device veth0_vlan left promiscuous mode
[  166.500533][T10900] device veth0_vlan entered promiscuous mode
[  166.540824][T10923] device pim6reg1 entered promiscuous mode
[  166.587052][T10935] FAULT_INJECTION: forcing a failure.
[  166.587052][T10935] name failslab, interval 1, probability 0, space 0, times 0
[  166.603243][T10935] CPU: 0 PID: 10935 Comm: syz.0.4544 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  166.613048][T10935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  166.622943][T10935] Call Trace:
[  166.626066][T10935]  <TASK>
[  166.628841][T10935]  dump_stack_lvl+0x151/0x1b7
[  166.633357][T10935]  ? io_uring_drop_tctx_refs+0x190/0x190
[  166.638910][T10935]  dump_stack+0x15/0x17
[  166.642901][T10935]  should_fail+0x3c6/0x510
[  166.647154][T10935]  __should_failslab+0xa4/0xe0
[  166.651751][T10935]  ? __alloc_skb+0xbe/0x550
[  166.656091][T10935]  should_failslab+0x9/0x20
[  166.660430][T10935]  slab_pre_alloc_hook+0x37/0xd0
[  166.665206][T10935]  ? __alloc_skb+0xbe/0x550
[  166.669545][T10935]  kmem_cache_alloc+0x44/0x200
[  166.674144][T10935]  __alloc_skb+0xbe/0x550
[  166.678310][T10935]  alloc_skb_with_frags+0xa6/0x680
[  166.683259][T10935]  ? is_bpf_text_address+0x172/0x190
[  166.688378][T10935]  ? stack_trace_save+0x1c0/0x1c0
[  166.693237][T10935]  sock_alloc_send_pskb+0x915/0xa50
[  166.698275][T10935]  ? sock_kzfree_s+0x60/0x60
[  166.702696][T10935]  ? bpf_bprintf_prepare+0x11b4/0x1450
[  166.707991][T10935]  ? bstr_printf+0x1020/0x10c0
[  166.712594][T10935]  tun_get_user+0xf1b/0x3aa0
[  166.717020][T10935]  ? memcpy+0x30/0x70
[  166.720839][T10935]  ? _kstrtoull+0x3a0/0x4a0
[  166.725179][T10935]  ? tun_do_read+0x1ef0/0x1ef0
[  166.729777][T10935]  ? kstrtouint_from_user+0x20a/0x2a0
[  166.734986][T10935]  ? kstrtol_from_user+0x310/0x310
[  166.739933][T10935]  ? bpf_trace_run3+0x123/0x250
[  166.744619][T10935]  ? avc_policy_seqno+0x1b/0x70
[  166.749306][T10935]  ? selinux_file_permission+0x2c4/0x570
[  166.754774][T10935]  tun_chr_write_iter+0x1e1/0x2e0
[  166.759634][T10935]  vfs_write+0xd5d/0x1110
[  166.763803][T10935]  ? kmem_cache_free+0x2c3/0x2e0
[  166.768574][T10935]  ? file_end_write+0x1c0/0x1c0
[  166.773262][T10935]  ? __fdget_pos+0x209/0x3a0
[  166.777685][T10935]  ? ksys_write+0x77/0x2c0
[  166.781938][T10935]  ksys_write+0x199/0x2c0
[  166.786108][T10935]  ? __ia32_sys_read+0x90/0x90
[  166.790705][T10935]  ? debug_smp_processor_id+0x17/0x20
[  166.795911][T10935]  ? fpregs_assert_state_consistent+0xb6/0xe0
[  166.801813][T10935]  __x64_sys_write+0x7b/0x90
[  166.806250][T10935]  do_syscall_64+0x3d/0xb0
[  166.810502][T10935]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  166.816223][T10935] RIP: 0033:0x7f422e313f19
[  166.820478][T10935] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  166.839917][T10935] RSP: 002b:00007f422cf95048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  166.848161][T10935] RAX: ffffffffffffffda RBX: 00007f422e4a3f60 RCX: 00007f422e313f19
[  166.855971][T10935] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8
[  166.863781][T10935] RBP: 00007f422cf950a0 R08: 0000000000000000 R09: 0000000000000000
[  166.871596][T10935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  166.879405][T10935] R13: 000000000000000b R14: 00007f422e4a3f60 R15: 00007ffc0a0ec658
[  166.887219][T10935]  </TASK>
[  166.952344][T10947] device veth0_vlan left promiscuous mode
[  166.959328][T10947] device veth0_vlan entered promiscuous mode
[  166.967213][T10964] device pim6reg1 entered promiscuous mode
[  167.123218][T11001] device veth0_vlan left promiscuous mode
[  167.129387][T11001] device veth0_vlan entered promiscuous mode
[  167.135596][T11009] FAULT_INJECTION: forcing a failure.
[  167.135596][T11009] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  167.148665][T11009] CPU: 1 PID: 11009 Comm: syz.0.4580 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  167.151506][T11013] device pim6reg1 entered promiscuous mode
[  167.158459][T11009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  167.158473][T11009] Call Trace:
[  167.158478][T11009]  <TASK>
[  167.158485][T11009]  dump_stack_lvl+0x151/0x1b7
[  167.158507][T11009]  ? io_uring_drop_tctx_refs+0x190/0x190
[  167.158522][T11009]  ? kmem_cache_free+0x116/0x2e0
[  167.158541][T11009]  dump_stack+0x15/0x17
[  167.158556][T11009]  should_fail+0x3c6/0x510
[  167.158573][T11009]  should_fail_usercopy+0x1a/0x20
[  167.158589][T11009]  _copy_from_user+0x20/0xd0
[  167.212185][T11009]  __copy_msghdr_from_user+0xaf/0x7c0
[  167.217388][T11009]  ? __ia32_sys_shutdown+0x70/0x70
[  167.222337][T11009]  ___sys_sendmsg+0x166/0x2e0
[  167.226847][T11009]  ? __sys_sendmsg+0x260/0x260
[  167.231456][T11009]  ? __fdget+0x1bc/0x240
[  167.235527][T11009]  __se_sys_sendmsg+0x19a/0x260
[  167.240215][T11009]  ? __x64_sys_sendmsg+0x90/0x90
[  167.244988][T11009]  ? ksys_write+0x260/0x2c0
[  167.249330][T11009]  ? debug_smp_processor_id+0x17/0x20
[  167.254536][T11009]  ? fpregs_assert_state_consistent+0xb6/0xe0
[  167.260437][T11009]  __x64_sys_sendmsg+0x7b/0x90
[  167.265036][T11009]  do_syscall_64+0x3d/0xb0
[  167.269289][T11009]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  167.275019][T11009] RIP: 0033:0x7f422e313f19
[  167.279274][T11009] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  167.298711][T11009] RSP: 002b:00007f422cf95048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  167.306960][T11009] RAX: ffffffffffffffda RBX: 00007f422e4a3f60 RCX: 00007f422e313f19
[  167.314782][T11009] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000007
[  167.322578][T11009] RBP: 00007f422cf950a0 R08: 0000000000000000 R09: 0000000000000000
[  167.330564][T11009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  167.338374][T11009] R13: 000000000000000b R14: 00007f422e4a3f60 R15: 00007ffc0a0ec658
[  167.346190][T11009]  </TASK>
[  167.458784][T11049] device veth0_vlan left promiscuous mode
[  167.467025][T11049] device veth0_vlan entered promiscuous mode
[  167.512021][T11081] device pim6reg1 entered promiscuous mode
[  167.529140][T11076] FAULT_INJECTION: forcing a failure.
[  167.529140][T11076] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  167.542091][T11076] CPU: 0 PID: 11076 Comm: syz.2.4610 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  167.551782][T11076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  167.561678][T11076] Call Trace:
[  167.564800][T11076]  <TASK>
[  167.567580][T11076]  dump_stack_lvl+0x151/0x1b7
[  167.572092][T11076]  ? io_uring_drop_tctx_refs+0x190/0x190
[  167.577563][T11076]  ? __kasan_check_write+0x14/0x20
[  167.582596][T11076]  dump_stack+0x15/0x17
[  167.586587][T11076]  should_fail+0x3c6/0x510
[  167.590841][T11076]  should_fail_usercopy+0x1a/0x20
[  167.595700][T11076]  _copy_from_user+0x20/0xd0
[  167.600389][T11076]  sock_do_ioctl+0x229/0x5a0
[  167.604814][T11076]  ? sock_show_fdinfo+0xa0/0xa0
[  167.609675][T11076]  ? selinux_file_ioctl+0x3cc/0x540
[  167.614708][T11076]  sock_ioctl+0x455/0x740
[  167.618873][T11076]  ? sock_poll+0x400/0x400
[  167.623124][T11076]  ? __fget_files+0x31e/0x380
[  167.627641][T11076]  ? security_file_ioctl+0x84/0xb0
[  167.632587][T11076]  ? sock_poll+0x400/0x400
[  167.636839][T11076]  __se_sys_ioctl+0x114/0x190
[  167.641352][T11076]  __x64_sys_ioctl+0x7b/0x90
[  167.645777][T11076]  do_syscall_64+0x3d/0xb0
[  167.650030][T11076]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  167.655759][T11076] RIP: 0033:0x7f73ccd74f19
[  167.660016][T11076] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  167.679453][T11076] RSP: 002b:00007f73cb9f6048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  167.687696][T11076] RAX: ffffffffffffffda RBX: 00007f73ccf04f60 RCX: 00007f73ccd74f19
[  167.695857][T11076] RDX: 0000000020000900 RSI: 0000000000008946 RDI: 0000000000000048
[  167.704101][T11076] RBP: 00007f73cb9f60a0 R08: 0000000000000000 R09: 0000000000000000
[  167.711913][T11076] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  167.719725][T11076] R13: 000000000000000b R14: 00007f73ccf04f60 R15: 00007fffe8c04f48
[  167.727541][T11076]  </TASK>
[  167.801488][T11104] device veth0_vlan left promiscuous mode
[  167.814283][T11104] device veth0_vlan entered promiscuous mode
[  167.829216][T11113] device pim6reg1 entered promiscuous mode
[  167.848010][T11126] FAULT_INJECTION: forcing a failure.
[  167.848010][T11126] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  167.868648][T11126] CPU: 0 PID: 11126 Comm: syz.2.4634 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  167.878454][T11126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  167.888350][T11126] Call Trace:
[  167.891472][T11126]  <TASK>
[  167.894249][T11126]  dump_stack_lvl+0x151/0x1b7
[  167.898761][T11126]  ? io_uring_drop_tctx_refs+0x190/0x190
[  167.904234][T11126]  dump_stack+0x15/0x17
[  167.908243][T11126]  should_fail+0x3c6/0x510
[  167.912475][T11126]  should_fail_usercopy+0x1a/0x20
[  167.917335][T11126]  _copy_from_user+0x20/0xd0
[  167.921759][T11126]  __sys_bpf+0x1e9/0x760
[  167.925839][T11126]  ? fput_many+0x160/0x1b0
[  167.930092][T11126]  ? bpf_link_show_fdinfo+0x2d0/0x2d0
[  167.935301][T11126]  ? debug_smp_processor_id+0x17/0x20
[  167.940506][T11126]  ? fpregs_assert_state_consistent+0xb6/0xe0
[  167.946407][T11126]  __x64_sys_bpf+0x7c/0x90
[  167.950663][T11126]  do_syscall_64+0x3d/0xb0
[  167.954914][T11126]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  167.960641][T11126] RIP: 0033:0x7f73ccd74f19
[  167.964896][T11126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  167.984337][T11126] RSP: 002b:00007f73cb9f6048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  167.992583][T11126] RAX: ffffffffffffffda RBX: 00007f73ccf04f60 RCX: 00007f73ccd74f19
[  168.000390][T11126] RDX: 0000000000000070 RSI: 00000000200000c0 RDI: 0000000000000005
[  168.008202][T11126] RBP: 00007f73cb9f60a0 R08: 0000000000000000 R09: 0000000000000000
[  168.016015][T11126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  168.023825][T11126] R13: 000000000000000b R14: 00007f73ccf04f60 R15: 00007fffe8c04f48
[  168.031639][T11126]  </TASK>
[  168.079554][T11150] device pim6reg1 entered promiscuous mode
[  168.120026][T11166] device veth0_vlan left promiscuous mode
[  168.132301][T11166] device veth0_vlan entered promiscuous mode
[  168.153784][T11182] device pim6reg1 entered promiscuous mode
[  168.180110][T11186] device pim6reg1 entered promiscuous mode
[  168.278649][T11208] device veth0_vlan left promiscuous mode
[  168.290804][T11208] device veth0_vlan entered promiscuous mode
[  168.300877][T11214] device veth0_vlan left promiscuous mode
[  168.307658][T11214] device veth0_vlan entered promiscuous mode
[  168.322158][T11226] device pim6reg1 entered promiscuous mode
[  168.368988][T11237] FAULT_INJECTION: forcing a failure.
[  168.368988][T11237] name failslab, interval 1, probability 0, space 0, times 0
[  168.383324][T11237] CPU: 1 PID: 11237 Comm: syz.4.4683 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  168.393124][T11237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  168.403016][T11237] Call Trace:
[  168.406139][T11237]  <TASK>
[  168.408931][T11237]  dump_stack_lvl+0x151/0x1b7
[  168.413443][T11237]  ? io_uring_drop_tctx_refs+0x190/0x190
[  168.418902][T11237]  dump_stack+0x15/0x17
[  168.422891][T11237]  should_fail+0x3c6/0x510
[  168.427330][T11237]  __should_failslab+0xa4/0xe0
[  168.431917][T11237]  should_failslab+0x9/0x20
[  168.436265][T11237]  slab_pre_alloc_hook+0x37/0xd0
[  168.441032][T11237]  __kmalloc+0x6d/0x270
[  168.445022][T11237]  ? kvmalloc_node+0x1f0/0x4d0
[  168.449625][T11237]  kvmalloc_node+0x1f0/0x4d0
[  168.454050][T11237]  ? vm_mmap+0xb0/0xb0
[  168.457957][T11237]  ? __kasan_check_write+0x14/0x20
[  168.462907][T11237]  pfifo_fast_init+0x110/0x7a0
[  168.467501][T11237]  qdisc_create_dflt+0x144/0x3e0
[  168.472272][T11237]  ? _raw_spin_lock+0xa4/0x1b0
[  168.476873][T11237]  dev_activate+0x2e0/0x1140
[  168.481302][T11237]  __dev_open+0x3bf/0x4e0
[  168.485465][T11237]  ? dev_open+0x260/0x260
[  168.489633][T11237]  ? _raw_spin_unlock_bh+0x51/0x60
[  168.494578][T11237]  ? dev_set_rx_mode+0x245/0x2e0
[  168.499353][T11237]  ? __kasan_check_read+0x11/0x20
[  168.504213][T11237]  __dev_change_flags+0x1db/0x6e0
[  168.509071][T11237]  ? avc_denied+0x1b0/0x1b0
[  168.513415][T11237]  ? dev_get_flags+0x1e0/0x1e0
[  168.518012][T11237]  ? _kstrtoull+0x3a0/0x4a0
[  168.522351][T11237]  dev_change_flags+0x8c/0x1a0
[  168.526952][T11237]  dev_ifsioc+0x147/0x10c0
[  168.531205][T11237]  ? dev_ioctl+0xe70/0xe70
[  168.535459][T11237]  ? mutex_lock+0xb6/0x1e0
[  168.539711][T11237]  ? wait_for_completion_killable_timeout+0x10/0x10
[  168.546135][T11237]  dev_ioctl+0x54d/0xe70
[  168.550213][T11237]  sock_do_ioctl+0x34f/0x5a0
[  168.554643][T11237]  ? sock_show_fdinfo+0xa0/0xa0
[  168.559326][T11237]  ? selinux_file_ioctl+0x3cc/0x540
[  168.564359][T11237]  sock_ioctl+0x455/0x740
[  168.568526][T11237]  ? sock_poll+0x400/0x400
[  168.572777][T11237]  ? __fget_files+0x31e/0x380
[  168.577292][T11237]  ? security_file_ioctl+0x84/0xb0
[  168.582236][T11237]  ? sock_poll+0x400/0x400
[  168.586489][T11237]  __se_sys_ioctl+0x114/0x190
[  168.591051][T11237]  __x64_sys_ioctl+0x7b/0x90
[  168.595427][T11237]  do_syscall_64+0x3d/0xb0
[  168.599683][T11237]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  168.605410][T11237] RIP: 0033:0x7fc3a06dff19
[  168.609663][T11237] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  168.629104][T11237] RSP: 002b:00007fc39f361048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  168.637358][T11237] RAX: ffffffffffffffda RBX: 00007fc3a086ff60 RCX: 00007fc3a06dff19
[  168.645168][T11237] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000009
[  168.652972][T11237] RBP: 00007fc39f3610a0 R08: 0000000000000000 R09: 0000000000000000
[  168.660782][T11237] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  168.668595][T11237] R13: 000000000000000b R14: 00007fc3a086ff60 R15: 00007ffe9db36ba8
[  168.676411][T11237]  </TASK>
[  168.680253][T11237] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue
[  168.695358][T11237] device pim6reg1 entered promiscuous mode
[  168.732298][T11254] device veth0_vlan left promiscuous mode
[  168.740178][T11254] device veth0_vlan entered promiscuous mode
[  168.779878][T11270] device pim6reg1 entered promiscuous mode
[  168.805745][T11259] device veth0_vlan left promiscuous mode
[  168.812160][T11259] device veth0_vlan entered promiscuous mode
[  168.829219][T11278] �: renamed from pim6reg1
[  168.907502][T11295] device veth0_vlan left promiscuous mode
[  168.928542][T11295] device veth0_vlan entered promiscuous mode
[  168.958172][T11306] device pim6reg1 entered promiscuous mode
[  168.989941][T11310] device pim6reg1 entered promiscuous mode
[  169.025108][T11324] device veth0_vlan left promiscuous mode
[  169.035016][T11324] device veth0_vlan entered promiscuous mode
[  169.132838][T11339] device veth0_vlan left promiscuous mode
[  169.146593][T11339] device veth0_vlan entered promiscuous mode
[  169.163691][T11348] device pim6reg1 entered promiscuous mode
[  169.295644][T11391] device veth0_vlan left promiscuous mode
[  169.303614][T11391] device veth0_vlan entered promiscuous mode
[  169.315092][T11392] bond_slave_1: mtu less than device minimum
[  169.353623][T11396] device syzkaller0 entered promiscuous mode
[  169.399674][T11401] device pim6reg1 entered promiscuous mode
[  169.671823][T11434] device veth0_vlan left promiscuous mode
[  169.679970][T11434] device veth0_vlan entered promiscuous mode
[  169.889190][T11451] device pim6reg1 entered promiscuous mode
[  169.977726][T11471] device veth0_vlan left promiscuous mode
[  169.985214][T11471] device veth0_vlan entered promiscuous mode
[  170.000105][T11479] FAULT_INJECTION: forcing a failure.
[  170.000105][T11479] name failslab, interval 1, probability 0, space 0, times 0
[  170.012868][T11479] CPU: 1 PID: 11479 Comm: syz.0.4800 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  170.022651][T11479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  170.032550][T11479] Call Trace:
[  170.035678][T11479]  <TASK>
[  170.038448][T11479]  dump_stack_lvl+0x151/0x1b7
[  170.042961][T11479]  ? io_uring_drop_tctx_refs+0x190/0x190
[  170.048428][T11479]  ? new_inode_pseudo+0x93/0x220
[  170.053201][T11479]  ? proc_pid_make_inode+0x27/0x1d0
[  170.058234][T11479]  ? proc_pident_instantiate+0x7a/0x2e0
[  170.063720][T11479]  ? proc_pident_lookup+0x1c4/0x260
[  170.068750][T11479]  ? path_openat+0x1194/0x2f40
[  170.073345][T11479]  ? do_filp_open+0x21c/0x460
[  170.077860][T11479]  ? do_sys_openat2+0x13f/0x830
[  170.082548][T11479]  ? __x64_sys_openat+0x243/0x290
[  170.087408][T11479]  dump_stack+0x15/0x17
[  170.091400][T11479]  should_fail+0x3c6/0x510
[  170.095661][T11479]  __should_failslab+0xa4/0xe0
[  170.100252][T11479]  ? __alloc_skb+0xbe/0x550
[  170.104591][T11479]  should_failslab+0x9/0x20
[  170.108934][T11479]  slab_pre_alloc_hook+0x37/0xd0
[  170.113707][T11479]  ? __alloc_skb+0xbe/0x550
[  170.118045][T11479]  kmem_cache_alloc+0x44/0x200
[  170.122647][T11479]  __alloc_skb+0xbe/0x550
[  170.126813][T11479]  alloc_skb_with_frags+0xa6/0x680
[  170.131762][T11479]  ? memcpy+0x56/0x70
[  170.135576][T11479]  sock_alloc_send_pskb+0x915/0xa50
[  170.140624][T11479]  ? sock_kzfree_s+0x60/0x60
[  170.145037][T11479]  ? __kasan_check_write+0x14/0x20
[  170.149992][T11479]  ? _raw_spin_lock+0xa4/0x1b0
[  170.154587][T11479]  ? _raw_spin_trylock_bh+0x190/0x190
[  170.159795][T11479]  unix_dgram_sendmsg+0x6fd/0x2090
[  170.164839][T11479]  ? unix_dgram_poll+0x710/0x710
[  170.169609][T11479]  ? kmem_cache_free+0x116/0x2e0
[  170.174382][T11479]  ? ____kasan_slab_free+0x126/0x160
[  170.179502][T11479]  ? __kasan_slab_free+0x11/0x20
[  170.184274][T11479]  ? slab_free_freelist_hook+0xbd/0x190
[  170.189658][T11479]  ? security_socket_sendmsg+0x82/0xb0
[  170.194960][T11479]  ? unix_dgram_poll+0x710/0x710
[  170.199725][T11479]  ____sys_sendmsg+0x59e/0x8f0
[  170.204327][T11479]  ? __sys_sendmsg_sock+0x40/0x40
[  170.209188][T11479]  ? import_iovec+0xe5/0x120
[  170.213614][T11479]  ___sys_sendmsg+0x252/0x2e0
[  170.218126][T11479]  ? __sys_sendmsg+0x260/0x260
[  170.222731][T11479]  ? __fdget+0x1bc/0x240
[  170.226804][T11479]  __se_sys_sendmsg+0x19a/0x260
[  170.231491][T11479]  ? __x64_sys_sendmsg+0x90/0x90
[  170.236264][T11479]  ? ksys_write+0x260/0x2c0
[  170.240606][T11479]  ? debug_smp_processor_id+0x17/0x20
[  170.245812][T11479]  ? fpregs_assert_state_consistent+0xb6/0xe0
[  170.251717][T11479]  __x64_sys_sendmsg+0x7b/0x90
[  170.256314][T11479]  do_syscall_64+0x3d/0xb0
[  170.260575][T11479]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  170.266294][T11479] RIP: 0033:0x7f422e313f19
[  170.270549][T11479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  170.289990][T11479] RSP: 002b:00007f422cf95048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  170.298236][T11479] RAX: ffffffffffffffda RBX: 00007f422e4a3f60 RCX: 00007f422e313f19
[  170.306045][T11479] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000007
[  170.313854][T11479] RBP: 00007f422cf950a0 R08: 0000000000000000 R09: 0000000000000000
[  170.321756][T11479] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  170.329563][T11479] R13: 000000000000000b R14: 00007f422e4a3f60 R15: 00007ffc0a0ec658
[  170.337382][T11479]  </TASK>
[  170.479841][T11503] device pim6reg1 entered promiscuous mode
[  170.586258][T11506] device veth0_vlan left promiscuous mode
[  170.646267][T11506] device veth0_vlan entered promiscuous mode
[  170.778288][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  170.809684][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  170.825250][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  170.885500][T11526] FAULT_INJECTION: forcing a failure.
[  170.885500][T11526] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  170.915733][T11526] CPU: 1 PID: 11526 Comm: syz.3.4822 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  170.925541][T11526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  170.935441][T11526] Call Trace:
[  170.938649][T11526]  <TASK>
[  170.941422][T11526]  dump_stack_lvl+0x151/0x1b7
[  170.945941][T11526]  ? io_uring_drop_tctx_refs+0x190/0x190
[  170.951404][T11526]  ? stack_trace_save+0x113/0x1c0
[  170.956264][T11526]  dump_stack+0x15/0x17
[  170.960254][T11526]  should_fail+0x3c6/0x510
[  170.964598][T11526]  should_fail_alloc_page+0x5a/0x80
[  170.969633][T11526]  prepare_alloc_pages+0x15c/0x700
[  170.974578][T11526]  ? __alloc_pages_bulk+0xe40/0xe40
[  170.979611][T11526]  ? do_syscall_64+0x3d/0xb0
[  170.984038][T11526]  ? entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  170.989939][T11526]  __alloc_pages+0x18c/0x8f0
[  170.994365][T11526]  ? prep_new_page+0x110/0x110
[  170.999054][T11526]  kmalloc_order+0x4a/0x160
[  171.003566][T11526]  kmalloc_order_trace+0x1a/0xb0
[  171.008337][T11526]  ? alloc_skb_with_frags+0xa6/0x680
[  171.013459][T11526]  __kmalloc_track_caller+0x19b/0x260
[  171.018667][T11526]  ? kmem_cache_alloc+0xf5/0x200
[  171.023440][T11526]  ? alloc_skb_with_frags+0xa6/0x680
[  171.028566][T11526]  __alloc_skb+0x10c/0x550
[  171.032821][T11526]  alloc_skb_with_frags+0xa6/0x680
[  171.037761][T11526]  ? 0xffffffffa0028000
[  171.041751][T11526]  ? is_bpf_text_address+0x172/0x190
[  171.046875][T11526]  ? stack_trace_save+0x1c0/0x1c0
[  171.051735][T11526]  sock_alloc_send_pskb+0x915/0xa50
[  171.056771][T11526]  ? sock_kzfree_s+0x60/0x60
[  171.061195][T11526]  ? bpf_bprintf_prepare+0x11b4/0x1450
[  171.066575][T11526]  ? bstr_printf+0x1020/0x10c0
[  171.071175][T11526]  tun_get_user+0xf1b/0x3aa0
[  171.075602][T11526]  ? memcpy+0x30/0x70
[  171.079420][T11526]  ? _kstrtoull+0x3a0/0x4a0
[  171.083768][T11526]  ? tun_do_read+0x1ef0/0x1ef0
[  171.088363][T11526]  ? kstrtouint_from_user+0x20a/0x2a0
[  171.093569][T11526]  ? kstrtol_from_user+0x310/0x310
[  171.098515][T11526]  ? bpf_trace_run3+0x123/0x250
[  171.103203][T11526]  ? avc_policy_seqno+0x1b/0x70
[  171.107889][T11526]  ? selinux_file_permission+0x2c4/0x570
[  171.113357][T11526]  tun_chr_write_iter+0x1e1/0x2e0
[  171.118219][T11526]  vfs_write+0xd5d/0x1110
[  171.122380][T11526]  ? kmem_cache_free+0x2c3/0x2e0
[  171.127156][T11526]  ? file_end_write+0x1c0/0x1c0
[  171.131847][T11526]  ? __fdget_pos+0x209/0x3a0
[  171.136268][T11526]  ? ksys_write+0x77/0x2c0
[  171.140522][T11526]  ksys_write+0x199/0x2c0
[  171.144688][T11526]  ? __ia32_sys_read+0x90/0x90
[  171.149291][T11526]  ? debug_smp_processor_id+0x17/0x20
[  171.154506][T11526]  ? fpregs_assert_state_consistent+0xb6/0xe0
[  171.160403][T11526]  __x64_sys_write+0x7b/0x90
[  171.164836][T11526]  do_syscall_64+0x3d/0xb0
[  171.169253][T11526]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  171.174979][T11526] RIP: 0033:0x7fd73780ef19
[  171.179232][T11526] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  171.198758][T11526] RSP: 002b:00007fd736490048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  171.207002][T11526] RAX: ffffffffffffffda RBX: 00007fd73799ef60 RCX: 00007fd73780ef19
[  171.214814][T11526] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8
[  171.222629][T11526] RBP: 00007fd7364900a0 R08: 0000000000000000 R09: 0000000000000000
[  171.230523][T11526] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  171.238340][T11526] R13: 000000000000000b R14: 00007fd73799ef60 R15: 00007fff1933c2e8
[  171.246150][T11526]  </TASK>
[  171.298174][T11540] device pim6reg1 entered promiscuous mode
[  171.507899][T11551] device veth0_vlan left promiscuous mode
[  171.522415][T11551] device veth0_vlan entered promiscuous mode
[  171.742633][T11580] device pim6reg1 entered promiscuous mode
[  172.119422][T11591] device veth0_vlan left promiscuous mode
[  172.126821][T11591] device veth0_vlan entered promiscuous mode
[  172.200470][T11607] device pim6reg1 entered promiscuous mode
[  172.398772][T11627] device veth0_vlan left promiscuous mode
[  172.457696][T11627] device veth0_vlan entered promiscuous mode
[  172.603341][T11653] device pim6reg1 entered promiscuous mode
[  172.666649][T11659] FAULT_INJECTION: forcing a failure.
[  172.666649][T11659] name failslab, interval 1, probability 0, space 0, times 0
[  172.811535][T11659] CPU: 0 PID: 11659 Comm: syz.1.4885 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  172.821343][T11659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  172.831321][T11659] Call Trace:
[  172.834453][T11659]  <TASK>
[  172.837310][T11659]  dump_stack_lvl+0x151/0x1b7
[  172.841830][T11659]  ? io_uring_drop_tctx_refs+0x190/0x190
[  172.847295][T11659]  ? new_inode_pseudo+0x93/0x220
[  172.852070][T11659]  ? proc_pid_make_inode+0x27/0x1d0
[  172.857098][T11659]  ? proc_pident_instantiate+0x7a/0x2e0
[  172.862481][T11659]  ? proc_pident_lookup+0x1c4/0x260
[  172.867517][T11659]  ? path_openat+0x1194/0x2f40
[  172.872113][T11659]  ? do_filp_open+0x21c/0x460
[  172.876631][T11659]  ? do_sys_openat2+0x13f/0x830
[  172.881328][T11659]  ? __x64_sys_openat+0x243/0x290
[  172.886176][T11659]  dump_stack+0x15/0x17
[  172.890167][T11659]  should_fail+0x3c6/0x510
[  172.894417][T11659]  __should_failslab+0xa4/0xe0
[  172.899019][T11659]  ? __alloc_skb+0xbe/0x550
[  172.903357][T11659]  should_failslab+0x9/0x20
[  172.907696][T11659]  slab_pre_alloc_hook+0x37/0xd0
[  172.912473][T11659]  ? __alloc_skb+0xbe/0x550
[  172.916812][T11659]  kmem_cache_alloc+0x44/0x200
[  172.921409][T11659]  __alloc_skb+0xbe/0x550
[  172.925575][T11659]  alloc_skb_with_frags+0xa6/0x680
[  172.930522][T11659]  ? memcpy+0x56/0x70
[  172.934345][T11659]  sock_alloc_send_pskb+0x915/0xa50
[  172.939378][T11659]  ? sock_kzfree_s+0x60/0x60
[  172.943801][T11659]  ? __kasan_check_write+0x14/0x20
[  172.948748][T11659]  ? _raw_spin_lock+0xa4/0x1b0
[  172.953349][T11659]  ? _raw_spin_trylock_bh+0x190/0x190
[  172.958564][T11659]  unix_dgram_sendmsg+0x6fd/0x2090
[  172.963507][T11659]  ? unix_dgram_poll+0x710/0x710
[  172.968277][T11659]  ? kmem_cache_free+0x116/0x2e0
[  172.973139][T11659]  ? ____kasan_slab_free+0x126/0x160
[  172.978257][T11659]  ? __kasan_slab_free+0x11/0x20
[  172.983030][T11659]  ? slab_free_freelist_hook+0xbd/0x190
[  172.988414][T11659]  ? security_socket_sendmsg+0x82/0xb0
[  172.993707][T11659]  ? unix_dgram_poll+0x710/0x710
[  172.998482][T11659]  ____sys_sendmsg+0x59e/0x8f0
[  173.003082][T11659]  ? __sys_sendmsg_sock+0x40/0x40
[  173.007944][T11659]  ? import_iovec+0xe5/0x120
[  173.012367][T11659]  ___sys_sendmsg+0x252/0x2e0
[  173.016881][T11659]  ? __sys_sendmsg+0x260/0x260
[  173.021487][T11659]  ? __fdget+0x1bc/0x240
[  173.025561][T11659]  __se_sys_sendmsg+0x19a/0x260
[  173.030246][T11659]  ? __x64_sys_sendmsg+0x90/0x90
[  173.035020][T11659]  ? ksys_write+0x260/0x2c0
[  173.039361][T11659]  ? debug_smp_processor_id+0x17/0x20
[  173.044566][T11659]  ? fpregs_assert_state_consistent+0xb6/0xe0
[  173.050469][T11659]  __x64_sys_sendmsg+0x7b/0x90
[  173.055084][T11659]  do_syscall_64+0x3d/0xb0
[  173.059320][T11659]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  173.065049][T11659] RIP: 0033:0x7f144f92cf19
[  173.069304][T11659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  173.088749][T11659] RSP: 002b:00007f144e5ae048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  173.097004][T11659] RAX: ffffffffffffffda RBX: 00007f144fabcf60 RCX: 00007f144f92cf19
[  173.104840][T11659] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000007
[  173.112612][T11659] RBP: 00007f144e5ae0a0 R08: 0000000000000000 R09: 0000000000000000
[  173.120421][T11659] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  173.128234][T11659] R13: 000000000000000b R14: 00007f144fabcf60 R15: 00007fffb1a54d88
[  173.136051][T11659]  </TASK>
[  173.290925][T11674] device veth0_vlan left promiscuous mode
[  173.310474][T11674] device veth0_vlan entered promiscuous mode
[  173.320653][T11686] device pim6reg1 entered promiscuous mode
[  173.357800][T11708] FAULT_INJECTION: forcing a failure.
[  173.357800][T11708] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  173.371371][T11708] CPU: 0 PID: 11708 Comm: syz.1.4906 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  173.381163][T11708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  173.391060][T11708] Call Trace:
[  173.394266][T11708]  <TASK>
[  173.397043][T11708]  dump_stack_lvl+0x151/0x1b7
[  173.401559][T11708]  ? io_uring_drop_tctx_refs+0x190/0x190
[  173.407025][T11708]  dump_stack+0x15/0x17
[  173.411013][T11708]  should_fail+0x3c6/0x510
[  173.415270][T11708]  should_fail_usercopy+0x1a/0x20
[  173.420126][T11708]  _copy_from_user+0x20/0xd0
[  173.424554][T11708]  __sys_bpf+0x1e9/0x760
[  173.428635][T11708]  ? fput_many+0x160/0x1b0
[  173.432889][T11708]  ? bpf_link_show_fdinfo+0x2d0/0x2d0
[  173.438097][T11708]  ? debug_smp_processor_id+0x17/0x20
[  173.443298][T11708]  ? fpregs_assert_state_consistent+0xb6/0xe0
[  173.449203][T11708]  __x64_sys_bpf+0x7c/0x90
[  173.453454][T11708]  do_syscall_64+0x3d/0xb0
[  173.457708][T11708]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  173.463436][T11708] RIP: 0033:0x7f144f92cf19
[  173.467692][T11708] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  173.487128][T11708] RSP: 002b:00007f144e5ae048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  173.495374][T11708] RAX: ffffffffffffffda RBX: 00007f144fabcf60 RCX: 00007f144f92cf19
[  173.503187][T11708] RDX: 0000000000000070 RSI: 00000000200000c0 RDI: 0000000000000005
[  173.510996][T11708] RBP: 00007f144e5ae0a0 R08: 0000000000000000 R09: 0000000000000000
[  173.518807][T11708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  173.526620][T11708] R13: 000000000000000b R14: 00007f144fabcf60 R15: 00007fffb1a54d88
[  173.534522][T11708]  </TASK>
[  173.655661][T11744] device pim6reg1 entered promiscuous mode
[  173.678280][T11740] device veth0_vlan left promiscuous mode
[  173.684883][T11740] device veth0_vlan entered promiscuous mode
[  173.906520][T11776] device veth0_vlan left promiscuous mode
[  173.922038][T11776] device veth0_vlan entered promiscuous mode
[  173.942420][T11779] FAULT_INJECTION: forcing a failure.
[  173.942420][T11779] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  173.959648][T11779] CPU: 1 PID: 11779 Comm: syz.1.4940 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  173.969447][T11779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  173.979343][T11779] Call Trace:
[  173.982468][T11779]  <TASK>
[  173.985242][T11779]  dump_stack_lvl+0x151/0x1b7
[  173.989859][T11779]  ? io_uring_drop_tctx_refs+0x190/0x190
[  173.995325][T11779]  ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20
[  174.001923][T11779]  dump_stack+0x15/0x17
[  174.005912][T11779]  should_fail+0x3c6/0x510
[  174.010167][T11779]  should_fail_usercopy+0x1a/0x20
[  174.015039][T11779]  _copy_from_user+0x20/0xd0
[  174.019539][T11779]  dev_ethtool+0x116/0x1540
[  174.023882][T11779]  ? ethtool_get_module_eeprom_call+0x1a0/0x1a0
[  174.029959][T11779]  ? __mutex_lock_slowpath+0xe/0x10
[  174.034989][T11779]  ? mutex_lock+0x135/0x1e0
[  174.039327][T11779]  ? wait_for_completion_killable_timeout+0x10/0x10
[  174.045751][T11779]  dev_ioctl+0x2a0/0xe70
[  174.049831][T11779]  sock_do_ioctl+0x34f/0x5a0
[  174.054255][T11779]  ? sock_show_fdinfo+0xa0/0xa0
[  174.058942][T11779]  ? selinux_file_ioctl+0x3cc/0x540
[  174.063976][T11779]  sock_ioctl+0x455/0x740
[  174.068142][T11779]  ? sock_poll+0x400/0x400
[  174.072395][T11779]  ? __fget_files+0x31e/0x380
[  174.076911][T11779]  ? security_file_ioctl+0x84/0xb0
[  174.081941][T11779]  ? sock_poll+0x400/0x400
[  174.086194][T11779]  __se_sys_ioctl+0x114/0x190
[  174.090707][T11779]  __x64_sys_ioctl+0x7b/0x90
[  174.095139][T11779]  do_syscall_64+0x3d/0xb0
[  174.099397][T11779]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  174.105115][T11779] RIP: 0033:0x7f144f92cf19
[  174.109370][T11779] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  174.128813][T11779] RSP: 002b:00007f144e5ae048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  174.137053][T11779] RAX: ffffffffffffffda RBX: 00007f144fabcf60 RCX: 00007f144f92cf19
[  174.144867][T11779] RDX: 0000000020000900 RSI: 0000000000008946 RDI: 0000000000000048
[  174.152677][T11779] RBP: 00007f144e5ae0a0 R08: 0000000000000000 R09: 0000000000000000
[  174.160486][T11779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  174.168301][T11779] R13: 000000000000000b R14: 00007f144fabcf60 R15: 00007fffb1a54d88
[  174.176114][T11779]  </TASK>
[  174.484047][T11814] device pim6reg1 entered promiscuous mode
[  174.490304][T11810] device veth0_vlan left promiscuous mode
[  174.497246][T11810] device veth0_vlan entered promiscuous mode
[  174.504676][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  174.513828][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  174.521242][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  174.552372][T11820] device veth0_vlan left promiscuous mode
[  174.559587][T11820] device veth0_vlan entered promiscuous mode
[  174.621468][T11846] FAULT_INJECTION: forcing a failure.
[  174.621468][T11846] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  174.634415][T11846] CPU: 1 PID: 11846 Comm: syz.3.4970 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  174.644123][T11846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  174.654016][T11846] Call Trace:
[  174.657137][T11846]  <TASK>
[  174.659916][T11846]  dump_stack_lvl+0x151/0x1b7
[  174.664430][T11846]  ? io_uring_drop_tctx_refs+0x190/0x190
[  174.669908][T11846]  ? kstrtouint_from_user+0x20a/0x2a0
[  174.675107][T11846]  ? kstrtol_from_user+0x310/0x310
[  174.680051][T11846]  ? avc_has_perm_noaudit+0x348/0x430
[  174.685260][T11846]  dump_stack+0x15/0x17
[  174.689250][T11846]  should_fail+0x3c6/0x510
[  174.693503][T11846]  should_fail_usercopy+0x1a/0x20
[  174.698370][T11846]  strncpy_from_user+0x24/0x2d0
[  174.703051][T11846]  bpf_prog_load+0x185/0x1b50
[  174.707564][T11846]  ? map_freeze+0x370/0x370
[  174.711906][T11846]  ? selinux_bpf+0xcb/0x100
[  174.716242][T11846]  ? security_bpf+0x82/0xb0
[  174.720586][T11846]  __sys_bpf+0x4bc/0x760
[  174.724663][T11846]  ? fput_many+0x160/0x1b0
[  174.728914][T11846]  ? bpf_link_show_fdinfo+0x2d0/0x2d0
[  174.734123][T11846]  ? debug_smp_processor_id+0x17/0x20
[  174.739339][T11846]  ? fpregs_assert_state_consistent+0xb6/0xe0
[  174.745234][T11846]  __x64_sys_bpf+0x7c/0x90
[  174.749486][T11846]  do_syscall_64+0x3d/0xb0
[  174.753743][T11846]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  174.759466][T11846] RIP: 0033:0x7fd73780ef19
[  174.763717][T11846] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  174.783163][T11846] RSP: 002b:00007fd736490048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  174.791409][T11846] RAX: ffffffffffffffda RBX: 00007fd73799ef60 RCX: 00007fd73780ef19
[  174.799219][T11846] RDX: 0000000000000070 RSI: 00000000200000c0 RDI: 0000000000000005
[  174.807029][T11846] RBP: 00007fd7364900a0 R08: 0000000000000000 R09: 0000000000000000
[  174.814837][T11846] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  174.822648][T11846] R13: 000000000000000b R14: 00007fd73799ef60 R15: 00007fff1933c2e8
[  174.830466][T11846]  </TASK>
[  174.838867][T11851] device veth0_vlan left promiscuous mode
[  174.844964][T11851] device veth0_vlan entered promiscuous mode
[  174.868375][T11856] device syzkaller0 entered promiscuous mode
[  174.881095][T11858] device pim6reg1 entered promiscuous mode
[  174.954544][T11873] device veth0_vlan left promiscuous mode
[  174.968872][T11873] device veth0_vlan entered promiscuous mode
[  174.982301][T11881] device pim6reg1 entered promiscuous mode
[  175.001135][T11885] device veth0_vlan left promiscuous mode
[  175.008698][T11885] device veth0_vlan entered promiscuous mode
[  175.018753][T11887] FAULT_INJECTION: forcing a failure.
[  175.018753][T11887] name failslab, interval 1, probability 0, space 0, times 0
[  175.031368][T11887] CPU: 1 PID: 11887 Comm: syz.1.4987 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  175.041160][T11887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  175.051220][T11887] Call Trace:
[  175.054344][T11887]  <TASK>
[  175.057213][T11887]  dump_stack_lvl+0x151/0x1b7
[  175.061720][T11887]  ? io_uring_drop_tctx_refs+0x190/0x190
[  175.067186][T11887]  dump_stack+0x15/0x17
[  175.071176][T11887]  should_fail+0x3c6/0x510
[  175.075431][T11887]  __should_failslab+0xa4/0xe0
[  175.080029][T11887]  should_failslab+0x9/0x20
[  175.084374][T11887]  slab_pre_alloc_hook+0x37/0xd0
[  175.089146][T11887]  __kmalloc+0x6d/0x270
[  175.093133][T11887]  ? kvmalloc_node+0x1f0/0x4d0
[  175.097734][T11887]  kvmalloc_node+0x1f0/0x4d0
[  175.102160][T11887]  ? vm_mmap+0xb0/0xb0
[  175.106066][T11887]  ? __kasan_check_write+0x14/0x20
[  175.111012][T11887]  pfifo_fast_init+0x25e/0x7a0
[  175.115617][T11887]  qdisc_create_dflt+0x144/0x3e0
[  175.120388][T11887]  ? _raw_spin_lock+0xa4/0x1b0
[  175.124987][T11887]  dev_activate+0x2e0/0x1140
[  175.129417][T11887]  __dev_open+0x3bf/0x4e0
[  175.133580][T11887]  ? dev_open+0x260/0x260
[  175.137747][T11887]  ? _raw_spin_unlock_bh+0x51/0x60
[  175.142692][T11887]  ? dev_set_rx_mode+0x245/0x2e0
[  175.147465][T11887]  ? __kasan_check_read+0x11/0x20
[  175.152423][T11887]  __dev_change_flags+0x1db/0x6e0
[  175.157274][T11887]  ? avc_denied+0x1b0/0x1b0
[  175.161613][T11887]  ? dev_get_flags+0x1e0/0x1e0
[  175.166212][T11887]  ? _kstrtoull+0x3a0/0x4a0
[  175.170555][T11887]  dev_change_flags+0x8c/0x1a0
[  175.175161][T11887]  dev_ifsioc+0x147/0x10c0
[  175.179492][T11887]  ? dev_ioctl+0xe70/0xe70
[  175.183743][T11887]  ? mutex_lock+0xb6/0x1e0
[  175.187997][T11887]  ? wait_for_completion_killable_timeout+0x10/0x10
[  175.194430][T11887]  dev_ioctl+0x54d/0xe70
[  175.198500][T11887]  sock_do_ioctl+0x34f/0x5a0
[  175.202926][T11887]  ? sock_show_fdinfo+0xa0/0xa0
[  175.207617][T11887]  ? selinux_file_ioctl+0x3cc/0x540
[  175.212646][T11887]  sock_ioctl+0x455/0x740
[  175.216813][T11887]  ? sock_poll+0x400/0x400
[  175.221063][T11887]  ? __fget_files+0x31e/0x380
[  175.225579][T11887]  ? security_file_ioctl+0x84/0xb0
[  175.230526][T11887]  ? sock_poll+0x400/0x400
[  175.234777][T11887]  __se_sys_ioctl+0x114/0x190
[  175.239296][T11887]  __x64_sys_ioctl+0x7b/0x90
[  175.243726][T11887]  do_syscall_64+0x3d/0xb0
[  175.247974][T11887]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  175.253711][T11887] RIP: 0033:0x7f144f92cf19
[  175.257954][T11887] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  175.277481][T11887] RSP: 002b:00007f144e5ae048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  175.285724][T11887] RAX: ffffffffffffffda RBX: 00007f144fabcf60 RCX: 00007f144f92cf19
[  175.293536][T11887] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000009
[  175.301347][T11887] RBP: 00007f144e5ae0a0 R08: 0000000000000000 R09: 0000000000000000
[  175.309159][T11887] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  175.316972][T11887] R13: 000000000000000b R14: 00007f144fabcf60 R15: 00007fffb1a54d88
[  175.324790][T11887]  </TASK>
[  175.330990][T11887] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue
[  175.339105][T11887] device pim6reg1 entered promiscuous mode
[  175.375110][T11897] device pim6reg1 entered promiscuous mode
[  175.472073][T11912] device veth0_vlan left promiscuous mode
[  175.482852][T11912] device veth0_vlan entered promiscuous mode
[  175.492083][T11909] device veth0_vlan left promiscuous mode
[  175.501932][T11909] device veth0_vlan entered promiscuous mode
[  175.517033][ T5204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  175.528121][ T5204] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  175.537854][ T5204] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  175.602194][T11934] device pim6reg1 entered promiscuous mode
[  175.665272][T11948] device veth0_vlan left promiscuous mode
[  175.671245][T11948] device veth0_vlan entered promiscuous mode
[  175.829285][T11978] device pim6reg1 entered promiscuous mode
[  175.853053][T11972] device syzkaller0 entered promiscuous mode
[  175.859403][T11976] device veth0_vlan left promiscuous mode
[  175.865412][T11976] device veth0_vlan entered promiscuous mode
[  175.983348][T12004] device veth0_vlan left promiscuous mode
[  175.992371][T12004] device veth0_vlan entered promiscuous mode
[  176.003738][T12009] device pim6reg1 entered promiscuous mode
[  176.056796][T12021] FAULT_INJECTION: forcing a failure.
[  176.056796][T12021] name failslab, interval 1, probability 0, space 0, times 0
[  176.071912][T12021] CPU: 0 PID: 12021 Comm: syz.3.5052 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  176.081846][T12021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  176.091817][T12021] Call Trace:
[  176.094940][T12021]  <TASK>
[  176.097717][T12021]  dump_stack_lvl+0x151/0x1b7
[  176.102230][T12021]  ? io_uring_drop_tctx_refs+0x190/0x190
[  176.107700][T12021]  dump_stack+0x15/0x17
[  176.111699][T12021]  should_fail+0x3c6/0x510
[  176.116031][T12021]  __should_failslab+0xa4/0xe0
[  176.120631][T12021]  should_failslab+0x9/0x20
[  176.124969][T12021]  slab_pre_alloc_hook+0x37/0xd0
[  176.129751][T12021]  ? alloc_skb_with_frags+0xa6/0x680
[  176.134867][T12021]  __kmalloc_track_caller+0x6c/0x260
[  176.139986][T12021]  ? alloc_skb_with_frags+0xa6/0x680
[  176.145109][T12021]  ? alloc_skb_with_frags+0xa6/0x680
[  176.150420][T12021]  __alloc_skb+0x10c/0x550
[  176.154661][T12021]  alloc_skb_with_frags+0xa6/0x680
[  176.159615][T12021]  ? memcpy+0x56/0x70
[  176.163436][T12021]  sock_alloc_send_pskb+0x915/0xa50
[  176.168467][T12021]  ? sock_kzfree_s+0x60/0x60
[  176.172906][T12021]  ? __kasan_check_write+0x14/0x20
[  176.177924][T12021]  ? _raw_spin_lock+0xa4/0x1b0
[  176.182519][T12021]  ? _raw_spin_trylock_bh+0x190/0x190
[  176.187814][T12021]  unix_dgram_sendmsg+0x6fd/0x2090
[  176.192764][T12021]  ? unix_dgram_poll+0x710/0x710
[  176.197531][T12021]  ? kmem_cache_free+0x116/0x2e0
[  176.202318][T12021]  ? ____kasan_slab_free+0x126/0x160
[  176.207532][T12021]  ? __kasan_slab_free+0x11/0x20
[  176.212288][T12021]  ? slab_free_freelist_hook+0xbd/0x190
[  176.217672][T12021]  ? security_socket_sendmsg+0x82/0xb0
[  176.222964][T12021]  ? unix_dgram_poll+0x710/0x710
[  176.227743][T12021]  ____sys_sendmsg+0x59e/0x8f0
[  176.232339][T12021]  ? __sys_sendmsg_sock+0x40/0x40
[  176.237197][T12021]  ? import_iovec+0xe5/0x120
[  176.241624][T12021]  ___sys_sendmsg+0x252/0x2e0
[  176.246138][T12021]  ? __sys_sendmsg+0x260/0x260
[  176.250745][T12021]  ? __fdget+0x1bc/0x240
[  176.254816][T12021]  __se_sys_sendmsg+0x19a/0x260
[  176.259503][T12021]  ? __x64_sys_sendmsg+0x90/0x90
[  176.264275][T12021]  ? ksys_write+0x260/0x2c0
[  176.268621][T12021]  ? debug_smp_processor_id+0x17/0x20
[  176.273823][T12021]  ? fpregs_assert_state_consistent+0xb6/0xe0
[  176.279725][T12021]  __x64_sys_sendmsg+0x7b/0x90
[  176.284324][T12021]  do_syscall_64+0x3d/0xb0
[  176.288578][T12021]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  176.294306][T12021] RIP: 0033:0x7fd73780ef19
[  176.298560][T12021] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  176.317998][T12021] RSP: 002b:00007fd736490048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  176.326246][T12021] RAX: ffffffffffffffda RBX: 00007fd73799ef60 RCX: 00007fd73780ef19
[  176.334056][T12021] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000007
[  176.341866][T12021] RBP: 00007fd7364900a0 R08: 0000000000000000 R09: 0000000000000000
[  176.349678][T12021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  176.357489][T12021] R13: 000000000000000b R14: 00007fd73799ef60 R15: 00007fff1933c2e8
[  176.365305][T12021]  </TASK>
[  176.460873][T12040] device veth0_vlan left promiscuous mode
[  176.467410][T12040] device veth0_vlan entered promiscuous mode
[  176.478377][T12046] device pim6reg1 entered promiscuous mode
[  176.610854][T12076] device veth0_vlan left promiscuous mode
[  176.617345][T12076] device veth0_vlan entered promiscuous mode
[  176.666812][T12080] FAULT_INJECTION: forcing a failure.
[  176.666812][T12080] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  176.680424][T12080] CPU: 1 PID: 12080 Comm: syz.2.5076 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  176.690336][T12080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  176.700223][T12080] Call Trace:
[  176.703346][T12080]  <TASK>
[  176.706126][T12080]  dump_stack_lvl+0x151/0x1b7
[  176.710637][T12080]  ? io_uring_drop_tctx_refs+0x190/0x190
[  176.716104][T12080]  ? __kasan_check_write+0x14/0x20
[  176.721049][T12080]  ? __alloc_skb+0x355/0x550
[  176.725493][T12080]  dump_stack+0x15/0x17
[  176.729475][T12080]  should_fail+0x3c6/0x510
[  176.733723][T12080]  should_fail_usercopy+0x1a/0x20
[  176.738949][T12080]  _copy_from_iter+0x22f/0xdc0
[  176.743546][T12080]  ? copy_mc_pipe_to_iter+0x760/0x760
[  176.748757][T12080]  ? __check_object_size+0x2ec/0x3d0
[  176.754062][T12080]  skb_copy_datagram_from_iter+0x100/0x6d0
[  176.759609][T12080]  tun_get_user+0x112d/0x3aa0
[  176.764115][T12080]  ? kasan_set_track+0x4b/0x70
[  176.768726][T12080]  ? kasan_set_free_info+0x23/0x40
[  176.773667][T12080]  ? _kstrtoull+0x3a0/0x4a0
[  176.778004][T12080]  ? tun_do_read+0x1ef0/0x1ef0
[  176.782602][T12080]  ? kstrtouint_from_user+0x20a/0x2a0
[  176.787944][T12080]  ? kstrtol_from_user+0x310/0x310
[  176.792898][T12080]  ? prandom_u32_state+0x1f/0x180
[  176.797748][T12080]  ? avc_policy_seqno+0x1b/0x70
[  176.802435][T12080]  ? selinux_file_permission+0x2c4/0x570
[  176.807905][T12080]  tun_chr_write_iter+0x1e1/0x2e0
[  176.812764][T12080]  vfs_write+0xd5d/0x1110
[  176.816930][T12080]  ? kmem_cache_free+0x2c3/0x2e0
[  176.821703][T12080]  ? file_end_write+0x1c0/0x1c0
[  176.826390][T12080]  ? __fdget_pos+0x209/0x3a0
[  176.830815][T12080]  ? ksys_write+0x77/0x2c0
[  176.835080][T12080]  ksys_write+0x199/0x2c0
[  176.839236][T12080]  ? __ia32_sys_read+0x90/0x90
[  176.843833][T12080]  ? debug_smp_processor_id+0x17/0x20
[  176.849048][T12080]  ? fpregs_assert_state_consistent+0xb6/0xe0
[  176.854948][T12080]  __x64_sys_write+0x7b/0x90
[  176.859373][T12080]  do_syscall_64+0x3d/0xb0
[  176.863623][T12080]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  176.869352][T12080] RIP: 0033:0x7f73ccd74f19
[  176.873611][T12080] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  176.893048][T12080] RSP: 002b:00007f73cb9f6048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  176.901378][T12080] RAX: ffffffffffffffda RBX: 00007f73ccf04f60 RCX: 00007f73ccd74f19
[  176.909189][T12080] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8
[  176.917005][T12080] RBP: 00007f73cb9f60a0 R08: 0000000000000000 R09: 0000000000000000
[  176.924814][T12080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  176.932625][T12080] R13: 000000000000000b R14: 00007f73ccf04f60 R15: 00007fffe8c04f48
[  176.940442][T12080]  </TASK>
[  176.979711][T12088] device pim6reg1 entered promiscuous mode
[  177.141377][T12102] device veth0_vlan left promiscuous mode
[  177.147640][T12102] device veth0_vlan entered promiscuous mode
[  177.183092][T12104] FAULT_INJECTION: forcing a failure.
[  177.183092][T12104] name failslab, interval 1, probability 0, space 0, times 0
[  177.195612][T12104] CPU: 0 PID: 12104 Comm: syz.2.5088 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  177.205410][T12104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  177.215291][T12104] Call Trace:
[  177.218415][T12104]  <TASK>
[  177.221192][T12104]  dump_stack_lvl+0x151/0x1b7
[  177.225711][T12104]  ? io_uring_drop_tctx_refs+0x190/0x190
[  177.231177][T12104]  dump_stack+0x15/0x17
[  177.235165][T12104]  should_fail+0x3c6/0x510
[  177.239436][T12104]  __should_failslab+0xa4/0xe0
[  177.244021][T12104]  ? __alloc_skb+0xbe/0x550
[  177.248357][T12104]  should_failslab+0x9/0x20
[  177.252789][T12104]  slab_pre_alloc_hook+0x37/0xd0
[  177.257557][T12104]  ? __alloc_skb+0xbe/0x550
[  177.261894][T12104]  kmem_cache_alloc+0x44/0x200
[  177.266497][T12104]  __alloc_skb+0xbe/0x550
[  177.270663][T12104]  alloc_skb_with_frags+0xa6/0x680
[  177.275625][T12104]  ? 0xffffffffa0028000
[  177.279601][T12104]  ? is_bpf_text_address+0x172/0x190
[  177.284722][T12104]  ? stack_trace_save+0x1c0/0x1c0
[  177.289585][T12104]  sock_alloc_send_pskb+0x915/0xa50
[  177.294623][T12104]  ? sock_kzfree_s+0x60/0x60
[  177.299043][T12104]  ? stack_trace_snprint+0xf0/0xf0
[  177.303994][T12104]  ? __stack_depot_save+0x34/0x470
[  177.308938][T12104]  tun_get_user+0xf1b/0x3aa0
[  177.313725][T12104]  ? kasan_set_track+0x4b/0x70
[  177.318669][T12104]  ? kasan_set_free_info+0x23/0x40
[  177.323634][T12104]  ? _kstrtoull+0x3a0/0x4a0
[  177.327948][T12104]  ? tun_do_read+0x1ef0/0x1ef0
[  177.332811][T12104]  ? kstrtouint_from_user+0x20a/0x2a0
[  177.338013][T12104]  ? kstrtol_from_user+0x310/0x310
[  177.342961][T12104]  ? avc_policy_seqno+0x1b/0x70
[  177.347742][T12104]  ? selinux_file_permission+0x2c4/0x570
[  177.353292][T12104]  tun_chr_write_iter+0x1e1/0x2e0
[  177.358337][T12104]  vfs_write+0xd5d/0x1110
[  177.362488][T12104]  ? kmem_cache_free+0x116/0x2e0
[  177.367264][T12104]  ? file_end_write+0x1c0/0x1c0
[  177.371951][T12104]  ? __fdget_pos+0x209/0x3a0
[  177.376376][T12104]  ? ksys_write+0x77/0x2c0
[  177.380715][T12104]  ksys_write+0x199/0x2c0
[  177.384980][T12104]  ? __ia32_sys_read+0x90/0x90
[  177.389572][T12104]  ? debug_smp_processor_id+0x17/0x20
[  177.394787][T12104]  ? fpregs_assert_state_consistent+0xb6/0xe0
[  177.400678][T12104]  __x64_sys_write+0x7b/0x90
[  177.405123][T12104]  do_syscall_64+0x3d/0xb0
[  177.409354][T12104]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  177.415102][T12104] RIP: 0033:0x7f73ccd74f19
[  177.419398][T12104] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  177.438781][T12104] RSP: 002b:00007f73cb9f6048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  177.447021][T12104] RAX: ffffffffffffffda RBX: 00007f73ccf04f60 RCX: 00007f73ccd74f19
[  177.454832][T12104] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8
[  177.462646][T12104] RBP: 00007f73cb9f60a0 R08: 0000000000000000 R09: 0000000000000000
[  177.470453][T12104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  177.478272][T12104] R13: 000000000000000b R14: 00007f73ccf04f60 R15: 00007fffe8c04f48
[  177.486092][T12104]  </TASK>
[  177.518916][T12112] device pim6reg1 entered promiscuous mode
[  177.611240][T12128] device veth0_vlan left promiscuous mode
[  177.617738][T12128] device veth0_vlan entered promiscuous mode
[  177.681826][T12131] device veth0_vlan left promiscuous mode
[  177.695477][T12131] device veth0_vlan entered promiscuous mode
[  177.723351][T12153] device pim6reg1 entered promiscuous mode
[  177.752130][T12157] device veth0_vlan left promiscuous mode
[  177.758489][T12157] device veth0_vlan entered promiscuous mode
[  177.845923][T12179] FAULT_INJECTION: forcing a failure.
[  177.845923][T12179] name failslab, interval 1, probability 0, space 0, times 0
[  177.871011][T12179] CPU: 1 PID: 12179 Comm: syz.0.5123 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  177.880823][T12179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  177.890716][T12179] Call Trace:
[  177.893841][T12179]  <TASK>
[  177.896618][T12179]  dump_stack_lvl+0x151/0x1b7
[  177.901129][T12179]  ? io_uring_drop_tctx_refs+0x190/0x190
[  177.906599][T12179]  dump_stack+0x15/0x17
[  177.910589][T12179]  should_fail+0x3c6/0x510
[  177.914842][T12179]  __should_failslab+0xa4/0xe0
[  177.919447][T12179]  should_failslab+0x9/0x20
[  177.923783][T12179]  slab_pre_alloc_hook+0x37/0xd0
[  177.928556][T12179]  ? alloc_skb_with_frags+0xa6/0x680
[  177.933677][T12179]  __kmalloc_track_caller+0x6c/0x260
[  177.938796][T12179]  ? alloc_skb_with_frags+0xa6/0x680
[  177.943928][T12179]  ? alloc_skb_with_frags+0xa6/0x680
[  177.949047][T12179]  __alloc_skb+0x10c/0x550
[  177.953294][T12179]  alloc_skb_with_frags+0xa6/0x680
[  177.958239][T12179]  ? memcpy+0x56/0x70
[  177.962057][T12179]  sock_alloc_send_pskb+0x915/0xa50
[  177.967096][T12179]  ? sock_kzfree_s+0x60/0x60
[  177.971516][T12179]  ? __kasan_check_write+0x14/0x20
[  177.976475][T12179]  ? _raw_spin_lock+0xa4/0x1b0
[  177.981067][T12179]  ? _raw_spin_trylock_bh+0x190/0x190
[  177.986275][T12179]  unix_dgram_sendmsg+0x6fd/0x2090
[  177.991233][T12179]  ? unix_dgram_poll+0x710/0x710
[  177.995993][T12179]  ? kmem_cache_free+0x116/0x2e0
[  178.000765][T12179]  ? ____kasan_slab_free+0x126/0x160
[  178.005887][T12179]  ? __kasan_slab_free+0x11/0x20
[  178.010667][T12179]  ? slab_free_freelist_hook+0xbd/0x190
[  178.016043][T12179]  ? security_socket_sendmsg+0x82/0xb0
[  178.021334][T12179]  ? unix_dgram_poll+0x710/0x710
[  178.026109][T12179]  ____sys_sendmsg+0x59e/0x8f0
[  178.030711][T12179]  ? __sys_sendmsg_sock+0x40/0x40
[  178.035571][T12179]  ? import_iovec+0xe5/0x120
[  178.039997][T12179]  ___sys_sendmsg+0x252/0x2e0
[  178.044512][T12179]  ? __sys_sendmsg+0x260/0x260
[  178.049116][T12179]  ? __fdget+0x1bc/0x240
[  178.053188][T12179]  __se_sys_sendmsg+0x19a/0x260
[  178.057877][T12179]  ? __x64_sys_sendmsg+0x90/0x90
[  178.062669][T12179]  ? ksys_write+0x260/0x2c0
[  178.066997][T12179]  ? debug_smp_processor_id+0x17/0x20
[  178.072198][T12179]  ? fpregs_assert_state_consistent+0xb6/0xe0
[  178.078104][T12179]  __x64_sys_sendmsg+0x7b/0x90
[  178.082704][T12179]  do_syscall_64+0x3d/0xb0
[  178.086950][T12179]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  178.092679][T12179] RIP: 0033:0x7f422e313f19
[  178.096932][T12179] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  178.116372][T12179] RSP: 002b:00007f422cf95048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  178.124708][T12179] RAX: ffffffffffffffda RBX: 00007f422e4a3f60 RCX: 00007f422e313f19
[  178.132514][T12179] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000007
[  178.140327][T12179] RBP: 00007f422cf950a0 R08: 0000000000000000 R09: 0000000000000000
[  178.148138][T12179] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  178.155956][T12179] R13: 000000000000000b R14: 00007f422e4a3f60 R15: 00007ffc0a0ec658
[  178.163777][T12179]  </TASK>
[  178.178387][T12185] device pim6reg1 entered promiscuous mode
[  178.190638][T12181] device veth0_vlan left promiscuous mode
[  178.196753][T12181] device veth0_vlan entered promiscuous mode
[  178.250586][T12194] device veth0_vlan left promiscuous mode
[  178.261770][T12194] device veth0_vlan entered promiscuous mode
[  178.282545][T12210] FAULT_INJECTION: forcing a failure.
[  178.282545][T12210] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  178.295479][T12210] CPU: 0 PID: 12210 Comm: syz.3.5138 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  178.305365][T12210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  178.315273][T12210] Call Trace:
[  178.318383][T12210]  <TASK>
[  178.321163][T12210]  dump_stack_lvl+0x151/0x1b7
[  178.325688][T12210]  ? io_uring_drop_tctx_refs+0x190/0x190
[  178.331142][T12210]  ? kstrtouint_from_user+0x20a/0x2a0
[  178.336350][T12210]  ? kstrtol_from_user+0x310/0x310
[  178.341298][T12210]  ? avc_has_perm_noaudit+0x348/0x430
[  178.346504][T12210]  dump_stack+0x15/0x17
[  178.350499][T12210]  should_fail+0x3c6/0x510
[  178.354751][T12210]  should_fail_usercopy+0x1a/0x20
[  178.359610][T12210]  strncpy_from_user+0x24/0x2d0
[  178.364300][T12210]  bpf_prog_load+0x185/0x1b50
[  178.368812][T12210]  ? map_freeze+0x370/0x370
[  178.373153][T12210]  ? selinux_bpf+0xcb/0x100
[  178.377578][T12210]  ? security_bpf+0x82/0xb0
[  178.381916][T12210]  __sys_bpf+0x4bc/0x760
[  178.385994][T12210]  ? fput_many+0x160/0x1b0
[  178.390247][T12210]  ? bpf_link_show_fdinfo+0x2d0/0x2d0
[  178.395725][T12210]  ? debug_smp_processor_id+0x17/0x20
[  178.400924][T12210]  ? fpregs_assert_state_consistent+0xb6/0xe0
[  178.406825][T12210]  __x64_sys_bpf+0x7c/0x90
[  178.411077][T12210]  do_syscall_64+0x3d/0xb0
[  178.415330][T12210]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  178.421059][T12210] RIP: 0033:0x7fd73780ef19
[  178.425314][T12210] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  178.444751][T12210] RSP: 002b:00007fd736490048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  178.452999][T12210] RAX: ffffffffffffffda RBX: 00007fd73799ef60 RCX: 00007fd73780ef19
[  178.460809][T12210] RDX: 0000000000000070 RSI: 00000000200000c0 RDI: 0000000000000005
[  178.468621][T12210] RBP: 00007fd7364900a0 R08: 0000000000000000 R09: 0000000000000000
[  178.476431][T12210] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  178.484243][T12210] R13: 000000000000000b R14: 00007fd73799ef60 R15: 00007fff1933c2e8
[  178.492059][T12210]  </TASK>
[  178.551044][T12219] device pim6reg1 entered promiscuous mode
[  178.613076][T12236] device veth0_vlan left promiscuous mode
[  178.618941][T12236] device veth0_vlan entered promiscuous mode
[  178.661787][T12241] device veth0_vlan left promiscuous mode
[  178.669808][T12241] device veth0_vlan entered promiscuous mode
[  178.743860][T12260] device pim6reg1 entered promiscuous mode
[  178.801122][T12275] FAULT_INJECTION: forcing a failure.
[  178.801122][T12275] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  178.822282][T12275] CPU: 0 PID: 12275 Comm: syz.0.5169 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  178.832086][T12275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  178.841980][T12275] Call Trace:
[  178.845101][T12275]  <TASK>
[  178.847881][T12275]  dump_stack_lvl+0x151/0x1b7
[  178.852393][T12275]  ? io_uring_drop_tctx_refs+0x190/0x190
[  178.857949][T12275]  dump_stack+0x15/0x17
[  178.861943][T12275]  should_fail+0x3c6/0x510
[  178.866195][T12275]  should_fail_usercopy+0x1a/0x20
[  178.871054][T12275]  _copy_to_user+0x20/0x90
[  178.875306][T12275]  simple_read_from_buffer+0xc7/0x150
[  178.880515][T12275]  proc_fail_nth_read+0x1a3/0x210
[  178.885374][T12275]  ? proc_fault_inject_write+0x390/0x390
[  178.890843][T12275]  ? fsnotify_perm+0x470/0x5d0
[  178.895450][T12275]  ? security_file_permission+0x86/0xb0
[  178.900824][T12275]  ? proc_fault_inject_write+0x390/0x390
[  178.906294][T12275]  vfs_read+0x27d/0xd40
[  178.910287][T12275]  ? sock_show_fdinfo+0xa0/0xa0
[  178.914971][T12275]  ? kernel_read+0x1f0/0x1f0
[  178.919483][T12275]  ? __kasan_check_write+0x14/0x20
[  178.924429][T12275]  ? mutex_lock+0xb6/0x1e0
[  178.928683][T12275]  ? wait_for_completion_killable_timeout+0x10/0x10
[  178.935107][T12275]  ? __fdget_pos+0x2e7/0x3a0
[  178.939532][T12275]  ? ksys_read+0x77/0x2c0
[  178.943784][T12275]  ksys_read+0x199/0x2c0
[  178.947866][T12275]  ? vfs_write+0x1110/0x1110
[  178.952296][T12275]  ? debug_smp_processor_id+0x17/0x20
[  178.957500][T12275]  ? fpregs_assert_state_consistent+0xb6/0xe0
[  178.963399][T12275]  __x64_sys_read+0x7b/0x90
[  178.967741][T12275]  do_syscall_64+0x3d/0xb0
[  178.971992][T12275]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  178.977721][T12275] RIP: 0033:0x7f422e3129fc
[  178.981975][T12275] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8c 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 1f 8d 02 00 48
[  179.001421][T12275] RSP: 002b:00007f422cf95040 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[  179.009658][T12275] RAX: ffffffffffffffda RBX: 00007f422e4a3f60 RCX: 00007f422e3129fc
[  179.017471][T12275] RDX: 000000000000000f RSI: 00007f422cf950b0 RDI: 0000000000000049
[  179.025287][T12275] RBP: 00007f422cf950a0 R08: 0000000000000000 R09: 0000000000000000
[  179.033093][T12275] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  179.040904][T12275] R13: 000000000000000b R14: 00007f422e4a3f60 R15: 00007ffc0a0ec658
[  179.048727][T12275]  </TASK>
[  179.092402][T12287] device veth0_vlan left promiscuous mode
[  179.098708][T12287] device veth0_vlan entered promiscuous mode
[  179.123844][T12278] bridge0: port 1(bridge_slave_0) entered blocking state
[  179.130752][T12278] bridge0: port 1(bridge_slave_0) entered disabled state
[  179.138143][T12278] device bridge_slave_0 entered promiscuous mode
[  179.145096][T12278] bridge0: port 2(bridge_slave_1) entered blocking state
[  179.152138][T12278] bridge0: port 2(bridge_slave_1) entered disabled state
[  179.159680][T12278] device bridge_slave_1 entered promiscuous mode
[  179.194968][T12301] device pim6reg1 entered promiscuous mode
[  179.250556][T12278] bridge0: port 2(bridge_slave_1) entered blocking state
[  179.257450][T12278] bridge0: port 2(bridge_slave_1) entered forwarding state
[  179.264616][T12278] bridge0: port 1(bridge_slave_0) entered blocking state
[  179.271495][T12278] bridge0: port 1(bridge_slave_0) entered forwarding state
[  179.292604][T12316] FAULT_INJECTION: forcing a failure.
[  179.292604][T12316] name failslab, interval 1, probability 0, space 0, times 0
[  179.299266][  T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  179.306843][T12316] CPU: 1 PID: 12316 Comm: syz.2.5187 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  179.321846][T12316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  179.331748][T12316] Call Trace:
[  179.334867][T12316]  <TASK>
[  179.337645][T12316]  dump_stack_lvl+0x151/0x1b7
[  179.342154][T12316]  ? io_uring_drop_tctx_refs+0x190/0x190
[  179.347624][T12316]  dump_stack+0x15/0x17
[  179.351614][T12316]  should_fail+0x3c6/0x510
[  179.355869][T12316]  __should_failslab+0xa4/0xe0
[  179.360554][T12316]  should_failslab+0x9/0x20
[  179.364895][T12316]  slab_pre_alloc_hook+0x37/0xd0
[  179.369669][T12316]  kmem_cache_alloc_trace+0x48/0x210
[  179.374874][T12316]  ? __get_vm_area_node+0x117/0x360
[  179.379907][T12316]  ? do_sys_openat2+0x71c/0x830
[  179.384874][T12316]  __get_vm_area_node+0x117/0x360
[  179.389724][T12316]  __vmalloc_node_range+0xe2/0x8d0
[  179.394669][T12316]  ? bpf_prog_alloc_no_stats+0x3b/0x2f0
[  179.400052][T12316]  ? selinux_capset+0xf0/0xf0
[  179.404564][T12316]  ? kstrtouint_from_user+0x20a/0x2a0
[  179.409775][T12316]  ? kstrtol_from_user+0x310/0x310
[  179.414726][T12316]  ? bpf_prog_alloc_no_stats+0x3b/0x2f0
[  179.420107][T12316]  __vmalloc+0x7a/0x90
[  179.424008][T12316]  ? bpf_prog_alloc_no_stats+0x3b/0x2f0
[  179.429389][T12316]  bpf_prog_alloc_no_stats+0x3b/0x2f0
[  179.434600][T12316]  ? bpf_prog_alloc+0x15/0x1e0
[  179.439205][T12316]  bpf_prog_alloc+0x1f/0x1e0
[  179.443621][T12316]  bpf_prog_load+0x800/0x1b50
[  179.448136][T12316]  ? map_freeze+0x370/0x370
[  179.452479][T12316]  ? selinux_bpf+0xcb/0x100
[  179.456813][T12316]  ? security_bpf+0x82/0xb0
[  179.461325][T12316]  __sys_bpf+0x4bc/0x760
[  179.465405][T12316]  ? fput_many+0x160/0x1b0
[  179.469657][T12316]  ? bpf_link_show_fdinfo+0x2d0/0x2d0
[  179.474867][T12316]  ? debug_smp_processor_id+0x17/0x20
[  179.480075][T12316]  ? fpregs_assert_state_consistent+0xb6/0xe0
[  179.485978][T12316]  __x64_sys_bpf+0x7c/0x90
[  179.490236][T12316]  do_syscall_64+0x3d/0xb0
[  179.494486][T12316]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  179.500211][T12316] RIP: 0033:0x7f73ccd74f19
[  179.504465][T12316] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  179.523901][T12316] RSP: 002b:00007f73cb9f6048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  179.532150][T12316] RAX: ffffffffffffffda RBX: 00007f73ccf04f60 RCX: 00007f73ccd74f19
[  179.539958][T12316] RDX: 0000000000000070 RSI: 00000000200000c0 RDI: 0000000000000005
[  179.547772][T12316] RBP: 00007f73cb9f60a0 R08: 0000000000000000 R09: 0000000000000000
[  179.555582][T12316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  179.563392][T12316] R13: 000000000000000b R14: 00007f73ccf04f60 R15: 00007fffe8c04f48
[  179.571213][T12316]  </TASK>
[  179.575667][  T311] bridge0: port 1(bridge_slave_0) entered disabled state
[  179.584619][T12316] syz.2.5187: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz2,mems_allowed=0
[  179.600728][T12316] CPU: 1 PID: 12316 Comm: syz.2.5187 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  179.600793][  T311] bridge0: port 2(bridge_slave_1) entered disabled state
[  179.610431][T12316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  179.610441][T12316] Call Trace:
[  179.610447][T12316]  <TASK>
[  179.610453][T12316]  dump_stack_lvl+0x151/0x1b7
[  179.637607][T12316]  ? io_uring_drop_tctx_refs+0x190/0x190
[  179.643073][T12316]  ? pr_cont_kernfs_name+0xf0/0x100
[  179.648109][T12316]  dump_stack+0x15/0x17
[  179.652094][T12316]  warn_alloc+0x21a/0x390
[  179.656262][T12316]  ? zone_watermark_ok_safe+0x270/0x270
[  179.661642][T12316]  ? kmem_cache_alloc_trace+0x115/0x210
[  179.667370][T12316]  ? __get_vm_area_node+0x117/0x360
[  179.672411][T12316]  ? __get_vm_area_node+0x347/0x360
[  179.677440][T12316]  __vmalloc_node_range+0x2c1/0x8d0
[  179.682559][T12316]  ? selinux_capset+0xf0/0xf0
[  179.687072][T12316]  ? kstrtouint_from_user+0x20a/0x2a0
[  179.692290][T12316]  ? kstrtol_from_user+0x310/0x310
[  179.697239][T12316]  ? bpf_prog_alloc_no_stats+0x3b/0x2f0
[  179.702608][T12316]  __vmalloc+0x7a/0x90
[  179.706513][T12316]  ? bpf_prog_alloc_no_stats+0x3b/0x2f0
[  179.711893][T12316]  bpf_prog_alloc_no_stats+0x3b/0x2f0
[  179.717186][T12316]  ? bpf_prog_alloc+0x15/0x1e0
[  179.721788][T12316]  bpf_prog_alloc+0x1f/0x1e0
[  179.726214][T12316]  bpf_prog_load+0x800/0x1b50
[  179.730730][T12316]  ? map_freeze+0x370/0x370
[  179.735080][T12316]  ? selinux_bpf+0xcb/0x100
[  179.739414][T12316]  ? security_bpf+0x82/0xb0
[  179.743746][T12316]  __sys_bpf+0x4bc/0x760
[  179.747835][T12316]  ? fput_many+0x160/0x1b0
[  179.752082][T12316]  ? bpf_link_show_fdinfo+0x2d0/0x2d0
[  179.757287][T12316]  ? debug_smp_processor_id+0x17/0x20
[  179.762496][T12316]  ? fpregs_assert_state_consistent+0xb6/0xe0
[  179.768399][T12316]  __x64_sys_bpf+0x7c/0x90
[  179.772647][T12316]  do_syscall_64+0x3d/0xb0
[  179.776902][T12316]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  179.782627][T12316] RIP: 0033:0x7f73ccd74f19
[  179.786884][T12316] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  179.806441][T12316] RSP: 002b:00007f73cb9f6048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  179.814683][T12316] RAX: ffffffffffffffda RBX: 00007f73ccf04f60 RCX: 00007f73ccd74f19
[  179.822493][T12316] RDX: 0000000000000070 RSI: 00000000200000c0 RDI: 0000000000000005
[  179.830306][T12316] RBP: 00007f73cb9f60a0 R08: 0000000000000000 R09: 0000000000000000
[  179.838115][T12316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  179.845929][T12316] R13: 000000000000000b R14: 00007f73ccf04f60 R15: 00007fffe8c04f48
[  179.853745][T12316]  </TASK>
[  179.860945][T12316] Mem-Info:
[  179.864013][T12316] active_anon:92 inactive_anon:10902 isolated_anon:0
[  179.864013][T12316]  active_file:25160 inactive_file:5704 isolated_file:0
[  179.864013][T12316]  unevictable:0 dirty:556 writeback:0
[  179.864013][T12316]  slab_reclaimable:8059 slab_unreclaimable:72143
[  179.864013][T12316]  mapped:21001 shmem:154 pagetables:458 bounce:0
[  179.864013][T12316]  kernel_misc_reclaimable:0
[  179.864013][T12316]  free:1543892 free_pcp:26672 free_cma:0
[  179.884172][T12278] device veth0_vlan entered promiscuous mode
[  179.911628][T12316] Node 0 active_anon:392kB inactive_anon:43700kB active_file:100648kB inactive_file:22816kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:84120kB dirty:2228kB writeback:0kB shmem:640kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5748kB pagetables:1884kB all_unreclaimable? no
[  179.942631][T12316] DMA32 free:2976724kB min:62592kB low:78240kB high:93888kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2981396kB mlocked:0kB bounce:0kB free_pcp:4672kB local_pcp:4672kB free_cma:0kB
[  179.977109][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  179.988393][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  179.998351][ T5205] bridge0: port 1(bridge_slave_0) entered blocking state
[  180.005188][ T5205] bridge0: port 1(bridge_slave_0) entered forwarding state
[  180.011457][T12316] lowmem_reserve[]: 0 3941 3941
[  180.012625][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  180.019412][T12316] Normal free:3198604kB min:84860kB low:106072kB high:127284kB reserved_highatomic:0KB active_anon:392kB inactive_anon:43800kB active_file:100648kB inactive_file:22816kB unevictable:0kB writepending:2228kB present:5242880kB managed:4035840kB mlocked:0kB bounce:0kB free_pcp:101720kB local_pcp:51112kB free_cma:0kB
[  180.054948][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  180.063017][ T5205] bridge0: port 2(bridge_slave_1) entered blocking state
[  180.069892][ T5205] bridge0: port 2(bridge_slave_1) entered forwarding state
[  180.083221][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  180.092552][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  180.100438][T12316] lowmem_reserve[]: 0 0 0
[  180.104776][T12316] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 4*2048kB (UM) 723*4096kB (M) = 2976724kB
[  180.108193][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  180.121053][T12316] Normal: 3115*4kB (ME) 3650*8kB (UME) 2803*16kB (UME) 2571*32kB (UME) 1299*64kB (UME) 635*128kB (UME) 441*256kB (UME) 326*512kB (UM) 231*1024kB (UME) 119*2048kB (UM) 514*4096kB (UM) = 3198604kB
[  180.130813][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  180.157450][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  180.157526][T12316] 31026 total pagecache pages
[  180.170293][T12316] 0 pages in swap cache
[  180.173079][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  180.174313][T12316] Swap cache stats: add 0, delete 0, find 0/0
[  180.182546][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  180.188746][T12316] Free swap  = 124996kB
[  180.196181][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  180.207290][T12316] Total swap = 124996kB
[  180.211321][T12316] 2097051 pages RAM
[  180.215227][T12321] device veth0_vlan left promiscuous mode
[  180.221131][T12316] 0 pages HighMem/MovableOnly
[  180.221673][T12321] device veth0_vlan entered promiscuous mode
[  180.225981][T12316] 342742 pages reserved
[  180.235515][T12316] 0 pages cma reserved
[  180.249497][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  180.259339][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  180.275619][T12278] device veth1_macvtap entered promiscuous mode
[  180.296260][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  180.304253][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  180.313407][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  180.346597][  T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  180.360285][  T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  180.378807][  T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  180.395213][  T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  180.413267][T12362] device pim6reg1 entered promiscuous mode
[  180.432934][T12372] FAULT_INJECTION: forcing a failure.
[  180.432934][T12372] name failslab, interval 1, probability 0, space 0, times 0
[  180.447251][T12372] CPU: 0 PID: 12372 Comm: syz.0.5212 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  180.457058][T12372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  180.466952][T12372] Call Trace:
[  180.470158][T12372]  <TASK>
[  180.472943][T12372]  dump_stack_lvl+0x151/0x1b7
[  180.477538][T12372]  ? io_uring_drop_tctx_refs+0x190/0x190
[  180.483006][T12372]  dump_stack+0x15/0x17
[  180.486999][T12372]  should_fail+0x3c6/0x510
[  180.491278][T12372]  __should_failslab+0xa4/0xe0
[  180.495858][T12372]  should_failslab+0x9/0x20
[  180.500370][T12372]  slab_pre_alloc_hook+0x37/0xd0
[  180.505142][T12372]  __kmalloc+0x6d/0x270
[  180.509142][T12372]  ? kvmalloc_node+0x1f0/0x4d0
[  180.513737][T12372]  kvmalloc_node+0x1f0/0x4d0
[  180.518540][T12372]  ? vm_mmap+0xb0/0xb0
[  180.522537][T12372]  ? __kasan_check_write+0x14/0x20
[  180.527570][T12372]  pfifo_fast_init+0x3aa/0x7a0
[  180.532168][T12372]  qdisc_create_dflt+0x144/0x3e0
[  180.537024][T12372]  ? _raw_spin_lock+0xa4/0x1b0
[  180.541634][T12372]  dev_activate+0x2e0/0x1140
[  180.546054][T12372]  __dev_open+0x3bf/0x4e0
[  180.550223][T12372]  ? dev_open+0x260/0x260
[  180.554564][T12372]  ? _raw_spin_unlock_bh+0x51/0x60
[  180.559511][T12372]  ? dev_set_rx_mode+0x245/0x2e0
[  180.564366][T12372]  ? __kasan_check_read+0x11/0x20
[  180.569250][T12372]  __dev_change_flags+0x1db/0x6e0
[  180.574088][T12372]  ? avc_denied+0x1b0/0x1b0
[  180.578428][T12372]  ? dev_get_flags+0x1e0/0x1e0
[  180.583027][T12372]  dev_change_flags+0x8c/0x1a0
[  180.587747][T12372]  dev_ifsioc+0x147/0x10c0
[  180.592002][T12372]  ? dev_ioctl+0xe70/0xe70
[  180.596260][T12372]  ? mutex_lock+0x135/0x1e0
[  180.600847][T12372]  ? wait_for_completion_killable_timeout+0x10/0x10
[  180.607360][T12372]  dev_ioctl+0x54d/0xe70
[  180.611610][T12372]  sock_do_ioctl+0x34f/0x5a0
[  180.616557][T12372]  ? sock_show_fdinfo+0xa0/0xa0
[  180.621246][T12372]  ? selinux_file_ioctl+0x3cc/0x540
[  180.626462][T12372]  sock_ioctl+0x455/0x740
[  180.630618][T12372]  ? sock_poll+0x400/0x400
[  180.634959][T12372]  ? __fget_files+0x31e/0x380
[  180.639554][T12372]  ? security_file_ioctl+0x84/0xb0
[  180.644499][T12372]  ? sock_poll+0x400/0x400
[  180.648753][T12372]  __se_sys_ioctl+0x114/0x190
[  180.653267][T12372]  __x64_sys_ioctl+0x7b/0x90
[  180.657912][T12372]  do_syscall_64+0x3d/0xb0
[  180.662162][T12372]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  180.667889][T12372] RIP: 0033:0x7f422e313f19
[  180.672141][T12372] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  180.691673][T12372] RSP: 002b:00007f422cf95048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  180.699921][T12372] RAX: ffffffffffffffda RBX: 00007f422e4a3f60 RCX: 00007f422e313f19
[  180.707730][T12372] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000009
[  180.715812][T12372] RBP: 00007f422cf950a0 R08: 0000000000000000 R09: 0000000000000000
[  180.723612][T12372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  180.731443][T12372] R13: 000000000000000b R14: 00007f422e4a3f60 R15: 00007ffc0a0ec658
[  180.739240][T12372]  </TASK>
[  180.743189][T12372] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue
[  180.750889][T12372] device pim6reg1 entered promiscuous mode
[  180.756961][T12369] device veth0_vlan left promiscuous mode
[  180.763172][T12369] device veth0_vlan entered promiscuous mode
[  180.884016][T12407] device pim6reg1 entered promiscuous mode
[  180.918379][T12405] device veth0_vlan left promiscuous mode
[  180.926402][T12405] device veth0_vlan entered promiscuous mode
[  181.161352][T12454] device veth0_vlan left promiscuous mode
[  181.169025][T12454] device veth0_vlan entered promiscuous mode
[  181.183468][T12460] bond_slave_1: mtu greater than device maximum
[  181.203923][T12462] device pim6reg1 entered promiscuous mode
[  181.268553][T12485] FAULT_INJECTION: forcing a failure.
[  181.268553][T12485] name failslab, interval 1, probability 0, space 0, times 0
[  181.295559][T12485] CPU: 1 PID: 12485 Comm: syz.3.5265 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  181.305371][T12485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  181.315436][T12485] Call Trace:
[  181.318565][T12485]  <TASK>
[  181.321442][T12485]  dump_stack_lvl+0x151/0x1b7
[  181.325938][T12485]  ? io_uring_drop_tctx_refs+0x190/0x190
[  181.331417][T12485]  ? _raw_spin_unlock_irqrestore+0x5c/0x80
[  181.337047][T12485]  ? __skb_try_recv_datagram+0x495/0x6a0
[  181.342514][T12485]  dump_stack+0x15/0x17
[  181.346508][T12485]  should_fail+0x3c6/0x510
[  181.350761][T12485]  __should_failslab+0xa4/0xe0
[  181.355360][T12485]  ? skb_clone+0x1d1/0x360
[  181.359613][T12485]  should_failslab+0x9/0x20
[  181.363952][T12485]  slab_pre_alloc_hook+0x37/0xd0
[  181.368728][T12485]  ? skb_clone+0x1d1/0x360
[  181.372978][T12485]  kmem_cache_alloc+0x44/0x200
[  181.377578][T12485]  skb_clone+0x1d1/0x360
[  181.381660][T12485]  sk_psock_verdict_recv+0x53/0x840
[  181.386692][T12485]  ? avc_has_perm_noaudit+0x430/0x430
[  181.391901][T12485]  unix_read_sock+0x132/0x370
[  181.396416][T12485]  ? sk_psock_skb_redirect+0x440/0x440
[  181.401715][T12485]  ? unix_stream_splice_actor+0x120/0x120
[  181.407263][T12485]  ? _raw_spin_lock_irqsave+0xf9/0x210
[  181.412557][T12485]  ? unix_stream_splice_actor+0x120/0x120
[  181.418111][T12485]  sk_psock_verdict_data_ready+0x147/0x1a0
[  181.423752][T12485]  ? sk_psock_start_verdict+0xc0/0xc0
[  181.428961][T12485]  ? _raw_spin_lock+0xa4/0x1b0
[  181.433559][T12485]  ? _raw_spin_unlock_irqrestore+0x5c/0x80
[  181.439210][T12485]  ? skb_queue_tail+0xfb/0x120
[  181.443801][T12485]  unix_dgram_sendmsg+0x15fa/0x2090
[  181.448846][T12485]  ? unix_dgram_poll+0x710/0x710
[  181.453609][T12485]  ? kmem_cache_free+0x116/0x2e0
[  181.458383][T12485]  ? ____kasan_slab_free+0x126/0x160
[  181.463502][T12485]  ? __kasan_slab_free+0x11/0x20
[  181.468276][T12485]  ? slab_free_freelist_hook+0xbd/0x190
[  181.473659][T12485]  ? security_socket_sendmsg+0x82/0xb0
[  181.478954][T12485]  ? unix_dgram_poll+0x710/0x710
[  181.483726][T12485]  ____sys_sendmsg+0x59e/0x8f0
[  181.488329][T12485]  ? __sys_sendmsg_sock+0x40/0x40
[  181.493188][T12485]  ? import_iovec+0xe5/0x120
[  181.497614][T12485]  ___sys_sendmsg+0x252/0x2e0
[  181.502128][T12485]  ? __sys_sendmsg+0x260/0x260
[  181.506733][T12485]  ? __fdget+0x1bc/0x240
[  181.510805][T12485]  __se_sys_sendmsg+0x19a/0x260
[  181.515490][T12485]  ? __x64_sys_sendmsg+0x90/0x90
[  181.520263][T12485]  ? ksys_write+0x260/0x2c0
[  181.524605][T12485]  ? debug_smp_processor_id+0x17/0x20
[  181.529810][T12485]  ? fpregs_assert_state_consistent+0xb6/0xe0
[  181.535715][T12485]  __x64_sys_sendmsg+0x7b/0x90
[  181.540315][T12485]  do_syscall_64+0x3d/0xb0
[  181.544568][T12485]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  181.550380][T12485] RIP: 0033:0x7fd73780ef19
[  181.554635][T12485] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  181.574077][T12485] RSP: 002b:00007fd736490048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  181.582321][T12485] RAX: ffffffffffffffda RBX: 00007fd73799ef60 RCX: 00007fd73780ef19
[  181.590222][T12485] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000007
[  181.598028][T12485] RBP: 00007fd7364900a0 R08: 0000000000000000 R09: 0000000000000000
[  181.605839][T12485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  181.613653][T12485] R13: 000000000000000b R14: 00007fd73799ef60 R15: 00007fff1933c2e8
[  181.621468][T12485]  </TASK>
[  181.643269][T12497] FAULT_INJECTION: forcing a failure.
[  181.643269][T12497] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  181.665136][T12497] CPU: 0 PID: 12497 Comm: syz.2.5270 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  181.674948][T12497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  181.684841][T12497] Call Trace:
[  181.687963][T12497]  <TASK>
[  181.690738][T12497]  dump_stack_lvl+0x151/0x1b7
[  181.695254][T12497]  ? io_uring_drop_tctx_refs+0x190/0x190
[  181.700722][T12497]  ? kstrtouint_from_user+0x20a/0x2a0
[  181.705927][T12497]  dump_stack+0x15/0x17
[  181.709956][T12497]  should_fail+0x3c6/0x510
[  181.714186][T12497]  should_fail_usercopy+0x1a/0x20
[  181.719033][T12497]  _copy_to_user+0x20/0x90
[  181.723290][T12497]  simple_read_from_buffer+0xc7/0x150
[  181.728494][T12497]  proc_fail_nth_read+0x1a3/0x210
[  181.733356][T12497]  ? proc_fault_inject_write+0x390/0x390
[  181.738823][T12497]  ? fsnotify_perm+0x470/0x5d0
[  181.743431][T12497]  ? security_file_permission+0x86/0xb0
[  181.748802][T12497]  ? proc_fault_inject_write+0x390/0x390
[  181.754269][T12497]  vfs_read+0x27d/0xd40
[  181.758263][T12497]  ? kernel_read+0x1f0/0x1f0
[  181.762692][T12497]  ? __kasan_check_write+0x14/0x20
[  181.767651][T12497]  ? mutex_lock+0xb6/0x1e0
[  181.771894][T12497]  ? wait_for_completion_killable_timeout+0x10/0x10
[  181.778314][T12497]  ? __fdget_pos+0x2e7/0x3a0
[  181.782738][T12497]  ? ksys_read+0x77/0x2c0
[  181.786907][T12497]  ksys_read+0x199/0x2c0
[  181.790984][T12497]  ? vfs_write+0x1110/0x1110
[  181.795409][T12497]  ? debug_smp_processor_id+0x17/0x20
[  181.800615][T12497]  ? fpregs_assert_state_consistent+0xb6/0xe0
[  181.806520][T12497]  __x64_sys_read+0x7b/0x90
[  181.810861][T12497]  do_syscall_64+0x3d/0xb0
[  181.815112][T12497]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  181.821016][T12497] RIP: 0033:0x7f73ccd739fc
[  181.825265][T12497] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8c 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 1f 8d 02 00 48
[  181.844708][T12497] RSP: 002b:00007f73cb9f6040 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[  181.852951][T12497] RAX: ffffffffffffffda RBX: 00007f73ccf04f60 RCX: 00007f73ccd739fc
[  181.860763][T12497] RDX: 000000000000000f RSI: 00007f73cb9f60b0 RDI: 0000000000000006
[  181.868576][T12497] RBP: 00007f73cb9f60a0 R08: 0000000000000000 R09: 0000000000000000
[  181.876394][T12497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  181.884283][T12497] R13: 000000000000000b R14: 00007f73ccf04f60 R15: 00007fffe8c04f48
[  181.892107][T12497]  </TASK>
[  181.906917][T12498] device veth0_vlan left promiscuous mode
[  181.912696][T12498] device veth0_vlan entered promiscuous mode
[  181.923102][ T5204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  181.932933][ T5204] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  181.944605][ T5204] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  181.952415][T12508] device pim6reg1 entered promiscuous mode
[  181.999088][T12530] FAULT_INJECTION: forcing a failure.
[  181.999088][T12530] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  182.013374][T12530] CPU: 1 PID: 12530 Comm: syz.2.5285 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  182.023261][T12530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  182.033158][T12530] Call Trace:
[  182.036276][T12530]  <TASK>
[  182.039054][T12530]  dump_stack_lvl+0x151/0x1b7
[  182.043606][T12530]  ? io_uring_drop_tctx_refs+0x190/0x190
[  182.049035][T12530]  ? stack_trace_save+0x113/0x1c0
[  182.053897][T12530]  dump_stack+0x15/0x17
[  182.057983][T12530]  should_fail+0x3c6/0x510
[  182.062227][T12530]  should_fail_alloc_page+0x5a/0x80
[  182.067259][T12530]  prepare_alloc_pages+0x15c/0x700
[  182.072294][T12530]  ? __alloc_pages_bulk+0xe40/0xe40
[  182.077326][T12530]  ? do_syscall_64+0x3d/0xb0
[  182.081769][T12530]  ? entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  182.087660][T12530]  __alloc_pages+0x18c/0x8f0
[  182.092084][T12530]  ? prep_new_page+0x110/0x110
[  182.096685][T12530]  kmalloc_order+0x4a/0x160
[  182.101021][T12530]  kmalloc_order_trace+0x1a/0xb0
[  182.105795][T12530]  ? alloc_skb_with_frags+0xa6/0x680
[  182.110926][T12530]  __kmalloc_track_caller+0x19b/0x260
[  182.116210][T12530]  ? kmem_cache_alloc+0xf5/0x200
[  182.120984][T12530]  ? alloc_skb_with_frags+0xa6/0x680
[  182.126103][T12530]  __alloc_skb+0x10c/0x550
[  182.130359][T12530]  alloc_skb_with_frags+0xa6/0x680
[  182.135304][T12530]  ? 0xffffffffa0028000
[  182.139297][T12530]  ? is_bpf_text_address+0x172/0x190
[  182.144417][T12530]  ? stack_trace_save+0x1c0/0x1c0
[  182.149279][T12530]  sock_alloc_send_pskb+0x915/0xa50
[  182.154321][T12530]  ? sock_kzfree_s+0x60/0x60
[  182.158749][T12530]  ? stack_trace_snprint+0xf0/0xf0
[  182.163691][T12530]  ? __stack_depot_save+0x34/0x470
[  182.168638][T12530]  tun_get_user+0xf1b/0x3aa0
[  182.173060][T12530]  ? kasan_set_track+0x4b/0x70
[  182.177675][T12530]  ? kasan_set_free_info+0x23/0x40
[  182.182610][T12530]  ? _kstrtoull+0x3a0/0x4a0
[  182.186949][T12530]  ? tun_do_read+0x1ef0/0x1ef0
[  182.191547][T12530]  ? kstrtouint_from_user+0x20a/0x2a0
[  182.196754][T12530]  ? kstrtol_from_user+0x310/0x310
[  182.201790][T12530]  ? avc_policy_seqno+0x1b/0x70
[  182.206475][T12530]  ? selinux_file_permission+0x2c4/0x570
[  182.211950][T12530]  tun_chr_write_iter+0x1e1/0x2e0
[  182.216803][T12530]  vfs_write+0xd5d/0x1110
[  182.220969][T12530]  ? kmem_cache_free+0x116/0x2e0
[  182.225745][T12530]  ? file_end_write+0x1c0/0x1c0
[  182.230448][T12530]  ? __fdget_pos+0x209/0x3a0
[  182.234855][T12530]  ? ksys_write+0x77/0x2c0
[  182.239117][T12530]  ksys_write+0x199/0x2c0
[  182.243278][T12530]  ? __ia32_sys_read+0x90/0x90
[  182.247877][T12530]  ? debug_smp_processor_id+0x17/0x20
[  182.253082][T12530]  ? fpregs_assert_state_consistent+0xb6/0xe0
[  182.258991][T12530]  __x64_sys_write+0x7b/0x90
[  182.263410][T12530]  do_syscall_64+0x3d/0xb0
[  182.267664][T12530]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  182.273395][T12530] RIP: 0033:0x7f73ccd74f19
[  182.277646][T12530] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  182.297344][T12530] RSP: 002b:00007f73cb9f6048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  182.305591][T12530] RAX: ffffffffffffffda RBX: 00007f73ccf04f60 RCX: 00007f73ccd74f19
[  182.313402][T12530] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8
[  182.321213][T12530] RBP: 00007f73cb9f60a0 R08: 0000000000000000 R09: 0000000000000000
[  182.329024][T12530] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  182.336833][T12530] R13: 000000000000000b R14: 00007f73ccf04f60 R15: 00007fffe8c04f48
[  182.344650][T12530]  </TASK>
[  182.443763][T12548] device veth0_vlan left promiscuous mode
[  182.455305][T12548] device veth0_vlan entered promiscuous mode
[  182.485128][  T347] device bridge_slave_1 left promiscuous mode
[  182.507793][  T347] bridge0: port 2(bridge_slave_1) entered disabled state
[  182.518104][   T30] audit: type=1400 audit(1721876887.159:153): avc:  denied  { create } for  pid=12566 comm="syz.3.5302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[  182.547818][  T347] device bridge_slave_0 left promiscuous mode
[  182.575396][  T347] bridge0: port 1(bridge_slave_0) entered disabled state
[  182.594519][  T347] device veth0_vlan left promiscuous mode
[  182.719757][T12579] device pim6reg1 entered promiscuous mode
[  182.884924][T12597] device veth0_vlan left promiscuous mode
[  182.901230][T12597] device veth0_vlan entered promiscuous mode
[  182.983876][T12612] FAULT_INJECTION: forcing a failure.
[  182.983876][T12612] name failslab, interval 1, probability 0, space 0, times 0
[  183.023457][T12612] CPU: 0 PID: 12612 Comm: syz.4.5321 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  183.033274][T12612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  183.043254][T12612] Call Trace:
[  183.046377][T12612]  <TASK>
[  183.049155][T12612]  dump_stack_lvl+0x151/0x1b7
[  183.053672][T12612]  ? io_uring_drop_tctx_refs+0x190/0x190
[  183.059135][T12612]  ? _raw_spin_unlock_irqrestore+0x5c/0x80
[  183.064867][T12612]  ? __skb_try_recv_datagram+0x495/0x6a0
[  183.070336][T12612]  dump_stack+0x15/0x17
[  183.074322][T12612]  should_fail+0x3c6/0x510
[  183.078591][T12612]  __should_failslab+0xa4/0xe0
[  183.083178][T12612]  ? skb_clone+0x1d1/0x360
[  183.087430][T12612]  should_failslab+0x9/0x20
[  183.091771][T12612]  slab_pre_alloc_hook+0x37/0xd0
[  183.096549][T12612]  ? skb_clone+0x1d1/0x360
[  183.100798][T12612]  kmem_cache_alloc+0x44/0x200
[  183.105398][T12612]  skb_clone+0x1d1/0x360
[  183.109481][T12612]  sk_psock_verdict_recv+0x53/0x840
[  183.114512][T12612]  ? avc_has_perm_noaudit+0x430/0x430
[  183.119722][T12612]  unix_read_sock+0x132/0x370
[  183.124234][T12612]  ? sk_psock_skb_redirect+0x440/0x440
[  183.129538][T12612]  ? unix_stream_splice_actor+0x120/0x120
[  183.135081][T12612]  ? _raw_spin_lock_irqsave+0xf9/0x210
[  183.140384][T12612]  ? unix_stream_splice_actor+0x120/0x120
[  183.145929][T12612]  sk_psock_verdict_data_ready+0x147/0x1a0
[  183.151661][T12612]  ? sk_psock_start_verdict+0xc0/0xc0
[  183.156865][T12612]  ? _raw_spin_lock+0xa4/0x1b0
[  183.161466][T12612]  ? _raw_spin_unlock_irqrestore+0x5c/0x80
[  183.167108][T12612]  ? skb_queue_tail+0xfb/0x120
[  183.171711][T12612]  unix_dgram_sendmsg+0x15fa/0x2090
[  183.176745][T12612]  ? unix_dgram_poll+0x710/0x710
[  183.181528][T12612]  ? kmem_cache_free+0x116/0x2e0
[  183.186290][T12612]  ? ____kasan_slab_free+0x126/0x160
[  183.191415][T12612]  ? __kasan_slab_free+0x11/0x20
[  183.196191][T12612]  ? slab_free_freelist_hook+0xbd/0x190
[  183.201739][T12612]  ? security_socket_sendmsg+0x82/0xb0
[  183.207043][T12612]  ? unix_dgram_poll+0x710/0x710
[  183.211891][T12612]  ____sys_sendmsg+0x59e/0x8f0
[  183.216495][T12612]  ? __sys_sendmsg_sock+0x40/0x40
[  183.221353][T12612]  ? import_iovec+0xe5/0x120
[  183.225780][T12612]  ___sys_sendmsg+0x252/0x2e0
[  183.230307][T12612]  ? __sys_sendmsg+0x260/0x260
[  183.234906][T12612]  ? __fdget+0x1bc/0x240
[  183.238973][T12612]  __se_sys_sendmsg+0x19a/0x260
[  183.243661][T12612]  ? __x64_sys_sendmsg+0x90/0x90
[  183.248509][T12612]  ? ksys_write+0x260/0x2c0
[  183.252773][T12612]  ? debug_smp_processor_id+0x17/0x20
[  183.257977][T12612]  ? fpregs_assert_state_consistent+0xb6/0xe0
[  183.263882][T12612]  __x64_sys_sendmsg+0x7b/0x90
[  183.268480][T12612]  do_syscall_64+0x3d/0xb0
[  183.272735][T12612]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  183.278460][T12612] RIP: 0033:0x7fc3a06dff19
[  183.282716][T12612] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  183.302155][T12612] RSP: 002b:00007fc39f361048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  183.310489][T12612] RAX: ffffffffffffffda RBX: 00007fc3a086ff60 RCX: 00007fc3a06dff19
[  183.318295][T12612] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000007
[  183.326109][T12612] RBP: 00007fc39f3610a0 R08: 0000000000000000 R09: 0000000000000000
[  183.333915][T12612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  183.341728][T12612] R13: 000000000000000b R14: 00007fc3a086ff60 R15: 00007ffe9db36ba8
[  183.349549][T12612]  </TASK>
[  183.432673][T12634] device veth0_vlan left promiscuous mode
[  183.444793][T12634] device veth0_vlan entered promiscuous mode
[  183.457220][T12628] device veth0_vlan left promiscuous mode
[  183.469463][T12628] device veth0_vlan entered promiscuous mode
[  183.523623][T12658] device pim6reg1 entered promiscuous mode
[  183.648947][T12679] device veth0_vlan left promiscuous mode
[  183.660990][T12679] device veth0_vlan entered promiscuous mode
[  183.748003][T12697] device pim6reg1 entered promiscuous mode
[  183.777674][T12695] device veth0_vlan left promiscuous mode
[  183.787261][T12708] FAULT_INJECTION: forcing a failure.
[  183.787261][T12708] name failslab, interval 1, probability 0, space 0, times 0
[  183.805536][T12695] device veth0_vlan entered promiscuous mode
[  183.819383][T12708] CPU: 0 PID: 12708 Comm: syz.4.5367 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  183.829179][T12708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  183.839074][T12708] Call Trace:
[  183.842199][T12708]  <TASK>
[  183.844976][T12708]  dump_stack_lvl+0x151/0x1b7
[  183.849490][T12708]  ? io_uring_drop_tctx_refs+0x190/0x190
[  183.854958][T12708]  dump_stack+0x15/0x17
[  183.858950][T12708]  should_fail+0x3c6/0x510
[  183.863203][T12708]  __should_failslab+0xa4/0xe0
[  183.867803][T12708]  should_failslab+0x9/0x20
[  183.872140][T12708]  slab_pre_alloc_hook+0x37/0xd0
[  183.876917][T12708]  kmem_cache_alloc_trace+0x48/0x210
[  183.882033][T12708]  ? __get_vm_area_node+0x117/0x360
[  183.887073][T12708]  ? do_sys_openat2+0x71c/0x830
[  183.892192][T12708]  __get_vm_area_node+0x117/0x360
[  183.897050][T12708]  __vmalloc_node_range+0xe2/0x8d0
[  183.902002][T12708]  ? bpf_prog_alloc_no_stats+0x3b/0x2f0
[  183.907378][T12708]  ? selinux_capset+0xf0/0xf0
[  183.911901][T12708]  ? kstrtouint_from_user+0x20a/0x2a0
[  183.917098][T12708]  ? kstrtol_from_user+0x310/0x310
[  183.922045][T12708]  ? bpf_prog_alloc_no_stats+0x3b/0x2f0
[  183.927427][T12708]  __vmalloc+0x7a/0x90
[  183.931332][T12708]  ? bpf_prog_alloc_no_stats+0x3b/0x2f0
[  183.936711][T12708]  bpf_prog_alloc_no_stats+0x3b/0x2f0
[  183.941918][T12708]  ? bpf_prog_alloc+0x15/0x1e0
[  183.946519][T12708]  bpf_prog_alloc+0x1f/0x1e0
[  183.950953][T12708]  bpf_prog_load+0x800/0x1b50
[  183.955461][T12708]  ? map_freeze+0x370/0x370
[  183.959803][T12708]  ? selinux_bpf+0xcb/0x100
[  183.964140][T12708]  ? security_bpf+0x82/0xb0
[  183.968478][T12708]  __sys_bpf+0x4bc/0x760
[  183.972558][T12708]  ? fput_many+0x160/0x1b0
[  183.976811][T12708]  ? bpf_link_show_fdinfo+0x2d0/0x2d0
[  183.982021][T12708]  ? debug_smp_processor_id+0x17/0x20
[  183.987224][T12708]  ? fpregs_assert_state_consistent+0xb6/0xe0
[  183.993126][T12708]  __x64_sys_bpf+0x7c/0x90
[  183.997379][T12708]  do_syscall_64+0x3d/0xb0
[  184.001633][T12708]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  184.007360][T12708] RIP: 0033:0x7fc3a06dff19
[  184.011616][T12708] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  184.031141][T12708] RSP: 002b:00007fc39f361048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  184.039657][T12708] RAX: ffffffffffffffda RBX: 00007fc3a086ff60 RCX: 00007fc3a06dff19
[  184.047467][T12708] RDX: 0000000000000070 RSI: 00000000200000c0 RDI: 0000000000000005
[  184.055279][T12708] RBP: 00007fc39f3610a0 R08: 0000000000000000 R09: 0000000000000000
[  184.063088][T12708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  184.070901][T12708] R13: 000000000000000b R14: 00007fc3a086ff60 R15: 00007ffe9db36ba8
[  184.078833][T12708]  </TASK>
[  184.150499][T12720] device veth0_vlan left promiscuous mode
[  184.168254][T12720] device veth0_vlan entered promiscuous mode
[  184.334240][T12750] device veth0_vlan left promiscuous mode
[  184.343209][T12750] device veth0_vlan entered promiscuous mode
[  184.367453][T12761] device pim6reg1 entered promiscuous mode
[  184.389850][T12763] device veth0_vlan left promiscuous mode
[  184.397444][T12763] device veth0_vlan entered promiscuous mode
[  184.545995][T12791] bridge0: port 1(bridge_slave_0) entered blocking state
[  184.552886][T12791] bridge0: port 1(bridge_slave_0) entered disabled state
[  184.561732][T12791] device bridge_slave_0 entered promiscuous mode
[  184.568689][T12791] bridge0: port 2(bridge_slave_1) entered blocking state
[  184.575582][T12791] bridge0: port 2(bridge_slave_1) entered disabled state
[  184.582837][T12791] device bridge_slave_1 entered promiscuous mode
[  184.633176][T12799] device veth0_vlan left promiscuous mode
[  184.651306][T12799] device veth0_vlan entered promiscuous mode
[  184.661342][T12810] device pim6reg1 entered promiscuous mode
[  184.737950][T12813] device sit0 entered promiscuous mode
[  185.562442][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  185.571042][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  185.587185][ T5155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  185.595457][ T5155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  185.607907][ T5155] bridge0: port 1(bridge_slave_0) entered blocking state
[  185.614750][ T5155] bridge0: port 1(bridge_slave_0) entered forwarding state
[  185.625591][ T5155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  185.633913][ T5155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  185.642119][ T5155] bridge0: port 2(bridge_slave_1) entered blocking state
[  185.648979][ T5155] bridge0: port 2(bridge_slave_1) entered forwarding state
[  185.665940][ T5155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  185.679305][ T5155] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  185.694691][T12841] FAULT_INJECTION: forcing a failure.
[  185.694691][T12841] name failslab, interval 1, probability 0, space 0, times 0
[  185.708581][T12841] CPU: 0 PID: 12841 Comm: syz.1.5424 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  185.718374][T12841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  185.728274][T12841] Call Trace:
[  185.731392][T12841]  <TASK>
[  185.734173][T12841]  dump_stack_lvl+0x151/0x1b7
[  185.738685][T12841]  ? io_uring_drop_tctx_refs+0x190/0x190
[  185.744152][T12841]  dump_stack+0x15/0x17
[  185.748143][T12841]  should_fail+0x3c6/0x510
[  185.752483][T12841]  __should_failslab+0xa4/0xe0
[  185.757082][T12841]  should_failslab+0x9/0x20
[  185.761430][T12841]  slab_pre_alloc_hook+0x37/0xd0
[  185.766194][T12841]  __kmalloc+0x6d/0x270
[  185.770187][T12841]  ? kvmalloc_node+0x1f0/0x4d0
[  185.774789][T12841]  kvmalloc_node+0x1f0/0x4d0
[  185.779215][T12841]  ? vm_mmap+0xb0/0xb0
[  185.783123][T12841]  ? __kasan_check_write+0x14/0x20
[  185.788069][T12841]  pfifo_fast_init+0x110/0x7a0
[  185.792666][T12841]  qdisc_create_dflt+0x144/0x3e0
[  185.797439][T12841]  ? _raw_spin_lock+0xa4/0x1b0
[  185.802042][T12841]  dev_activate+0x2e0/0x1140
[  185.806470][T12841]  __dev_open+0x3bf/0x4e0
[  185.810634][T12841]  ? dev_open+0x260/0x260
[  185.814797][T12841]  ? _raw_spin_unlock_bh+0x51/0x60
[  185.819745][T12841]  ? dev_set_rx_mode+0x245/0x2e0
[  185.824529][T12841]  ? __kasan_check_read+0x11/0x20
[  185.829383][T12841]  __dev_change_flags+0x1db/0x6e0
[  185.834242][T12841]  ? __request_module+0x8e0/0x8e0
[  185.839099][T12841]  ? dev_get_flags+0x1e0/0x1e0
[  185.843700][T12841]  ? __request_module+0x3fa/0x8e0
[  185.848560][T12841]  ? capable+0x78/0xe0
[  185.852465][T12841]  dev_change_flags+0x8c/0x1a0
[  185.857067][T12841]  dev_ifsioc+0x147/0x10c0
[  185.861322][T12841]  ? dev_ioctl+0xe70/0xe70
[  185.865572][T12841]  ? mutex_lock+0x135/0x1e0
[  185.869913][T12841]  ? wait_for_completion_killable_timeout+0x10/0x10
[  185.876334][T12841]  ? security_capable+0x87/0xb0
[  185.881031][T12841]  dev_ioctl+0x54d/0xe70
[  185.885101][T12841]  sock_do_ioctl+0x34f/0x5a0
[  185.889533][T12841]  ? sock_show_fdinfo+0xa0/0xa0
[  185.894217][T12841]  ? selinux_file_ioctl+0x3cc/0x540
[  185.899248][T12841]  sock_ioctl+0x455/0x740
[  185.903414][T12841]  ? sock_poll+0x400/0x400
[  185.907664][T12841]  ? __fget_files+0x31e/0x380
[  185.912179][T12841]  ? security_file_ioctl+0x84/0xb0
[  185.917125][T12841]  ? sock_poll+0x400/0x400
[  185.921379][T12841]  __se_sys_ioctl+0x114/0x190
[  185.925893][T12841]  __x64_sys_ioctl+0x7b/0x90
[  185.930319][T12841]  do_syscall_64+0x3d/0xb0
[  185.934572][T12841]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  185.940299][T12841] RIP: 0033:0x7f5a49982f19
[  185.944554][T12841] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  185.963995][T12841] RSP: 002b:00007f5a485e3048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  185.972244][T12841] RAX: ffffffffffffffda RBX: 00007f5a49b13038 RCX: 00007f5a49982f19
[  185.980050][T12841] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000009
[  185.987863][T12841] RBP: 00007f5a485e30a0 R08: 0000000000000000 R09: 0000000000000000
[  185.995672][T12841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  186.003483][T12841] R13: 000000000000006e R14: 00007f5a49b13038 R15: 00007ffd7bfd7e68
[  186.011301][T12841]  </TASK>
[  186.014614][T12841] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue
[  186.022308][T12841] device pim6reg1 entered promiscuous mode
[  186.029762][T12843] device veth0_vlan left promiscuous mode
[  186.035966][T12843] device veth0_vlan entered promiscuous mode
[  186.055588][T12791] device veth0_vlan entered promiscuous mode
[  186.064343][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  186.072031][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  186.080028][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  186.089160][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  186.097349][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  186.105459][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  186.125181][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  186.144928][T12791] device veth1_macvtap entered promiscuous mode
[  186.164521][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  186.174643][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  186.183064][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  186.191241][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  186.199436][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  186.216159][T12861] device pim6reg1 entered promiscuous mode
[  186.231410][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  186.245602][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  186.265821][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  186.284073][ T5205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  186.305423][T12874] device veth1_macvtap left promiscuous mode
[  186.322752][T12874] device veth1_macvtap entered promiscuous mode
[  186.333298][T12874] device macsec0 entered promiscuous mode
[  186.378513][T12874] device pim6reg1 entered promiscuous mode
[  186.425279][T12888] device veth0_vlan left promiscuous mode
[  186.437855][T12888] device veth0_vlan entered promiscuous mode
[  186.570993][T12927] device pim6reg1 entered promiscuous mode
[  186.657649][T12930] device syzkaller0 entered promiscuous mode
[  186.694446][T12936] device veth0_vlan left promiscuous mode
[  186.716189][T12936] device veth0_vlan entered promiscuous mode
[  186.769046][  T347] device bridge_slave_1 left promiscuous mode
[  186.775015][  T347] bridge0: port 2(bridge_slave_1) entered disabled state
[  186.782401][T12961] FAULT_INJECTION: forcing a failure.
[  186.782401][T12961] name failslab, interval 1, probability 0, space 0, times 0
[  186.795112][T12961] CPU: 1 PID: 12961 Comm: syz.0.5479 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  186.804901][T12961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  186.814794][T12961] Call Trace:
[  186.817919][T12961]  <TASK>
[  186.820696][T12961]  dump_stack_lvl+0x151/0x1b7
[  186.825211][T12961]  ? io_uring_drop_tctx_refs+0x190/0x190
[  186.830678][T12961]  dump_stack+0x15/0x17
[  186.834668][T12961]  should_fail+0x3c6/0x510
[  186.838930][T12961]  __should_failslab+0xa4/0xe0
[  186.843521][T12961]  should_failslab+0x9/0x20
[  186.847861][T12961]  slab_pre_alloc_hook+0x37/0xd0
[  186.852635][T12961]  kmem_cache_alloc_trace+0x48/0x210
[  186.857755][T12961]  ? sk_psock_skb_ingress_self+0x60/0x330
[  186.863318][T12961]  ? migrate_disable+0x190/0x190
[  186.868086][T12961]  sk_psock_skb_ingress_self+0x60/0x330
[  186.873470][T12961]  sk_psock_verdict_recv+0x66d/0x840
[  186.878587][T12961]  unix_read_sock+0x132/0x370
[  186.883100][T12961]  ? sk_psock_skb_redirect+0x440/0x440
[  186.888394][T12961]  ? unix_stream_splice_actor+0x120/0x120
[  186.893952][T12961]  ? _raw_spin_lock_irqsave+0xf9/0x210
[  186.899246][T12961]  ? unix_stream_splice_actor+0x120/0x120
[  186.904798][T12961]  sk_psock_verdict_data_ready+0x147/0x1a0
[  186.910440][T12961]  ? sk_psock_start_verdict+0xc0/0xc0
[  186.915749][T12961]  ? _raw_spin_lock+0xa4/0x1b0
[  186.920345][T12961]  ? _raw_spin_unlock_irqrestore+0x5c/0x80
[  186.925987][T12961]  ? skb_queue_tail+0xfb/0x120
[  186.930588][T12961]  unix_dgram_sendmsg+0x15fa/0x2090
[  186.935624][T12961]  ? unix_dgram_poll+0x710/0x710
[  186.940392][T12961]  ? kmem_cache_free+0x116/0x2e0
[  186.945165][T12961]  ? ____kasan_slab_free+0x126/0x160
[  186.950285][T12961]  ? __kasan_slab_free+0x11/0x20
[  186.955060][T12961]  ? slab_free_freelist_hook+0xbd/0x190
[  186.960440][T12961]  ? security_socket_sendmsg+0x82/0xb0
[  186.965736][T12961]  ? unix_dgram_poll+0x710/0x710
[  186.970508][T12961]  ____sys_sendmsg+0x59e/0x8f0
[  186.975111][T12961]  ? __sys_sendmsg_sock+0x40/0x40
[  186.979970][T12961]  ? import_iovec+0xe5/0x120
[  186.984396][T12961]  ___sys_sendmsg+0x252/0x2e0
[  186.988908][T12961]  ? __sys_sendmsg+0x260/0x260
[  186.993515][T12961]  ? __fdget+0x1bc/0x240
[  186.997588][T12961]  __se_sys_sendmsg+0x19a/0x260
[  187.002274][T12961]  ? __x64_sys_sendmsg+0x90/0x90
[  187.007047][T12961]  ? ksys_write+0x260/0x2c0
[  187.011391][T12961]  ? debug_smp_processor_id+0x17/0x20
[  187.016592][T12961]  ? fpregs_assert_state_consistent+0xb6/0xe0
[  187.022496][T12961]  __x64_sys_sendmsg+0x7b/0x90
[  187.027097][T12961]  do_syscall_64+0x3d/0xb0
[  187.031351][T12961]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  187.037078][T12961] RIP: 0033:0x7f9fdf301f19
[  187.041332][T12961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  187.060805][T12961] RSP: 002b:00007f9fddf83048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  187.069105][T12961] RAX: ffffffffffffffda RBX: 00007f9fdf491f60 RCX: 00007f9fdf301f19
[  187.076916][T12961] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000007
[  187.085012][T12961] RBP: 00007f9fddf830a0 R08: 0000000000000000 R09: 0000000000000000
[  187.092818][T12961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  187.100626][T12961] R13: 000000000000000b R14: 00007f9fdf491f60 R15: 00007fff7d59a368
[  187.108444][T12961]  </TASK>
[  187.117252][T12959] ==================================================================
[  187.118600][  T347] device bridge_slave_0 left promiscuous mode
[  187.125133][T12959] BUG: KASAN: use-after-free in consume_skb+0x3c/0x250
[  187.125158][T12959] Read of size 4 at addr ffff8881259e2d6c by task syz.0.5479/12959
[  187.131228][  T347] bridge0: port 1(bridge_slave_0) entered disabled state
[  187.137713][T12959] 
[  187.137720][T12959] CPU: 0 PID: 12959 Comm: syz.0.5479 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0
[  187.137737][T12959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  187.174268][T12959] Call Trace:
[  187.177391][T12959]  <TASK>
[  187.180165][T12959]  dump_stack_lvl+0x151/0x1b7
[  187.184680][T12959]  ? io_uring_drop_tctx_refs+0x190/0x190
[  187.190146][T12959]  ? panic+0x751/0x751
[  187.194065][T12959]  print_address_description+0x87/0x3b0
[  187.199434][T12959]  kasan_report+0x179/0x1c0
[  187.203771][T12959]  ? consume_skb+0x3c/0x250
[  187.208112][T12959]  ? consume_skb+0x3c/0x250
[  187.212452][T12959]  kasan_check_range+0x293/0x2a0
[  187.217227][T12959]  __kasan_check_read+0x11/0x20
[  187.221911][T12959]  consume_skb+0x3c/0x250
[  187.226078][T12959]  __sk_msg_free+0x2dd/0x370
[  187.230504][T12959]  ? _raw_spin_unlock_irqrestore+0x5c/0x80
[  187.236147][T12959]  sk_psock_stop+0x44c/0x4d0
[  187.240572][T12959]  ? unix_peer_get+0xe0/0xe0
[  187.245000][T12959]  sock_map_close+0x2b9/0x4c0
[  187.249513][T12959]  ? sock_map_remove_links+0x570/0x570
[  187.254806][T12959]  ? rwsem_mark_wake+0x770/0x770
[  187.259578][T12959]  ? security_file_free+0xc6/0xe0
[  187.264440][T12959]  unix_release+0x82/0xc0
[  187.268607][T12959]  sock_close+0xdf/0x270
[  187.272687][T12959]  ? sock_mmap+0xa0/0xa0
[  187.276766][T12959]  __fput+0x3fe/0x910
[  187.280584][T12959]  ____fput+0x15/0x20
[  187.284400][T12959]  task_work_run+0x129/0x190
[  187.288833][T12959]  exit_to_user_mode_loop+0xc4/0xe0
[  187.293865][T12959]  exit_to_user_mode_prepare+0x5a/0xa0
[  187.299158][T12959]  syscall_exit_to_user_mode+0x26/0x160
[  187.304538][T12959]  do_syscall_64+0x49/0xb0
[  187.308792][T12959]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  187.314521][T12959] RIP: 0033:0x7f9fdf301f19
[  187.318773][T12959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  187.338217][T12959] RSP: 002b:00007fff7d59a448 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4
[  187.346461][T12959] RAX: 0000000000000000 RBX: 00007f9fdf493a60 RCX: 00007f9fdf301f19
[  187.354272][T12959] RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003
[  187.362081][T12959] RBP: 00007f9fdf493a60 R08: 0000000000000000 R09: 0000000c7d59a76f
[  187.369891][T12959] R10: 000000000003fd88 R11: 0000000000000246 R12: 000000000002dcbd
[  187.377703][T12959] R13: 0000000000000032 R14: 00007f9fdf493a60 R15: 00007fff7d59a530
[  187.385520][T12959]  </TASK>
[  187.388379][T12959] 
[  187.390548][T12959] Allocated by task 12961:
[  187.394800][T12959]  __kasan_slab_alloc+0xb1/0xe0
[  187.399488][T12959]  slab_post_alloc_hook+0x53/0x2c0
[  187.404434][T12959]  kmem_cache_alloc+0xf5/0x200
[  187.409033][T12959]  skb_clone+0x1d1/0x360
[  187.413114][T12959]  sk_psock_verdict_recv+0x53/0x840
[  187.418148][T12959]  unix_read_sock+0x132/0x370
[  187.422662][T12959]  sk_psock_verdict_data_ready+0x147/0x1a0
[  187.428303][T12959]  unix_dgram_sendmsg+0x15fa/0x2090
[  187.433348][T12959]  ____sys_sendmsg+0x59e/0x8f0
[  187.437937][T12959]  ___sys_sendmsg+0x252/0x2e0
[  187.442449][T12959]  __se_sys_sendmsg+0x19a/0x260
[  187.447137][T12959]  __x64_sys_sendmsg+0x7b/0x90
[  187.451735][T12959]  do_syscall_64+0x3d/0xb0
[  187.455988][T12959]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  187.461719][T12959] 
[  187.463887][T12959] Freed by task 5199:
[  187.467706][T12959]  kasan_set_track+0x4b/0x70
[  187.472132][T12959]  kasan_set_free_info+0x23/0x40
[  187.476905][T12959]  ____kasan_slab_free+0x126/0x160
[  187.481851][T12959]  __kasan_slab_free+0x11/0x20
[  187.486452][T12959]  slab_free_freelist_hook+0xbd/0x190
[  187.491661][T12959]  kmem_cache_free+0x116/0x2e0
[  187.496261][T12959]  kfree_skbmem+0x104/0x170
[  187.500601][T12959]  kfree_skb+0xc2/0x360
[  187.504593][T12959]  sk_psock_backlog+0xc21/0xd90
[  187.509279][T12959]  process_one_work+0x6bb/0xc10
[  187.513966][T12959]  worker_thread+0xad5/0x12a0
[  187.518566][T12959]  kthread+0x421/0x510
[  187.522471][T12959]  ret_from_fork+0x1f/0x30
[  187.526726][T12959] 
[  187.528895][T12959] The buggy address belongs to the object at ffff8881259e2c80
[  187.528895][T12959]  which belongs to the cache skbuff_head_cache of size 248
[  187.543574][T12959] The buggy address is located 236 bytes inside of
[  187.543574][T12959]  248-byte region [ffff8881259e2c80, ffff8881259e2d78)
[  187.556799][T12959] The buggy address belongs to the page:
[  187.562246][T12959] page:ffffea0004967880 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1259e2
[  187.572388][T12959] flags: 0x4000000000000200(slab|zone=1)
[  187.577864][T12959] raw: 4000000000000200 ffffea000494dc00 0000000400000004 ffff888107f98780
[  187.586278][T12959] raw: 0000000000000000 00000000000c000c 00000001ffffffff 0000000000000000
[  187.594694][T12959] page dumped because: kasan: bad access detected
[  187.600956][T12959] page_owner tracks the page as allocated
[  187.606584][T12959] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112a20(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_HARDWALL), pid 10833, ts 165904979299, free_ts 165066878854
[  187.624206][T12959]  post_alloc_hook+0x1a3/0x1b0
[  187.628803][T12959]  prep_new_page+0x1b/0x110
[  187.633142][T12959]  get_page_from_freelist+0x3550/0x35d0
[  187.638523][T12959]  __alloc_pages+0x27e/0x8f0
[  187.642950][T12959]  new_slab+0x9a/0x4e0
[  187.646855][T12959]  ___slab_alloc+0x39e/0x830
[  187.651369][T12959]  __slab_alloc+0x4a/0x90
[  187.655535][T12959]  kmem_cache_alloc+0x134/0x200
[  187.660396][T12959]  skb_clone+0x1d1/0x360
[  187.664646][T12959]  bpf_clone_redirect+0xa6/0x390
[  187.669420][T12959]  bpf_prog_705e93932f3cc54b+0x429/0xb98
[  187.674887][T12959]  bpf_test_run+0x478/0xa10
[  187.679229][T12959]  bpf_prog_test_run_skb+0xb41/0x1420
[  187.684435][T12959]  bpf_prog_test_run+0x3b0/0x630
[  187.689208][T12959]  __sys_bpf+0x525/0x760
[  187.693288][T12959]  __x64_sys_bpf+0x7c/0x90
[  187.697540][T12959] page last free stack trace:
[  187.702053][T12959]  free_unref_page_prepare+0x7c8/0x7d0
[  187.707350][T12959]  free_unref_page+0xe8/0x750
[  187.711860][T12959]  __free_pages+0x61/0xf0
[  187.716027][T12959]  __vunmap+0x7bc/0x8f0
[  187.720021][T12959]  vfree+0x7f/0xb0
[  187.723579][T12959]  kvfree+0x26/0x40
[  187.727222][T12959]  bpf_map_area_free+0x15/0x20
[  187.731824][T12959]  array_map_free+0x162/0x1c0
[  187.736339][T12959]  bpf_map_free_deferred+0x10d/0x1e0
[  187.741456][T12959]  process_one_work+0x6bb/0xc10
[  187.746145][T12959]  worker_thread+0xad5/0x12a0
[  187.750656][T12959]  kthread+0x421/0x510
[  187.754563][T12959]  ret_from_fork+0x1f/0x30
[  187.758815][T12959] 
[  187.760984][T12959] Memory state around the buggy address:
[  187.766459][T12959]  ffff8881259e2c00: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[  187.774355][T12959]  ffff8881259e2c80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  187.782251][T12959] >ffff8881259e2d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc
[  187.790148][T12959]                                                           ^
[  187.797439][T12959]  ffff8881259e2d80: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[  187.805338][T12959]  ffff8881259e2e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  187.813234][T12959] ==================================================================
[  187.821130][T12959] Disabling lock debugging due to kernel taint
[  187.827271][T12959] ==================================================================
[  187.835106][T12959] BUG: KASAN: double-free or invalid-free in kmem_cache_free+0x116/0x2e0
[  187.843349][T12959] 
[  187.845523][T12959] CPU: 0 PID: 12959 Comm: syz.0.5479 Tainted: G    B             5.15.151-syzkaller-00059-g5356d2f17edf #0
[  187.856716][T12959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[  187.866611][T12959] Call Trace:
[  187.869736][T12959]  <TASK>
[  187.872514][T12959]  dump_stack_lvl+0x151/0x1b7
[  187.877028][T12959]  ? io_uring_drop_tctx_refs+0x190/0x190
[  187.882492][T12959]  ? __wake_up_klogd+0xd5/0x110
[  187.887181][T12959]  ? panic+0x751/0x751
[  187.891087][T12959]  ? kmem_cache_free+0x116/0x2e0
[  187.895858][T12959]  print_address_description+0x87/0x3b0
[  187.901239][T12959]  ? asm_common_interrupt+0x27/0x40
[  187.906290][T12959]  ? kmem_cache_free+0x116/0x2e0
[  187.911048][T12959]  ? kmem_cache_free+0x116/0x2e0
[  187.915822][T12959]  kasan_report_invalid_free+0x6b/0xa0
[  187.921126][T12959]  ____kasan_slab_free+0x13e/0x160
[  187.926065][T12959]  __kasan_slab_free+0x11/0x20
[  187.930666][T12959]  slab_free_freelist_hook+0xbd/0x190
[  187.935960][T12959]  ? kfree_skbmem+0x104/0x170
[  187.940559][T12959]  kmem_cache_free+0x116/0x2e0
[  187.945159][T12959]  kfree_skbmem+0x104/0x170
[  187.949499][T12959]  consume_skb+0xb4/0x250
[  187.953663][T12959]  __sk_msg_free+0x2dd/0x370
[  187.958091][T12959]  ? _raw_spin_unlock_irqrestore+0x5c/0x80
[  187.963731][T12959]  sk_psock_stop+0x44c/0x4d0
[  187.968158][T12959]  ? unix_peer_get+0xe0/0xe0
[  187.972583][T12959]  sock_map_close+0x2b9/0x4c0
[  187.977096][T12959]  ? sock_map_remove_links+0x570/0x570
[  187.982391][T12959]  ? rwsem_mark_wake+0x770/0x770
[  187.987163][T12959]  ? security_file_free+0xc6/0xe0
[  187.992027][T12959]  unix_release+0x82/0xc0
[  187.996190][T12959]  sock_close+0xdf/0x270
[  188.000279][T12959]  ? sock_mmap+0xa0/0xa0
[  188.004348][T12959]  __fput+0x3fe/0x910
[  188.008173][T12959]  ____fput+0x15/0x20
[  188.011988][T12959]  task_work_run+0x129/0x190
[  188.016413][T12959]  exit_to_user_mode_loop+0xc4/0xe0
[  188.021448][T12959]  exit_to_user_mode_prepare+0x5a/0xa0
[  188.026741][T12959]  syscall_exit_to_user_mode+0x26/0x160
[  188.032122][T12959]  do_syscall_64+0x49/0xb0
[  188.036376][T12959]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  188.042108][T12959] RIP: 0033:0x7f9fdf301f19
[  188.046358][T12959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  188.065886][T12959] RSP: 002b:00007fff7d59a448 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4
[  188.074130][T12959] RAX: 0000000000000000 RBX: 00007f9fdf493a60 RCX: 00007f9fdf301f19
[  188.081943][T12959] RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003
[  188.089757][T12959] RBP: 00007f9fdf493a60 R08: 0000000000000000 R09: 0000000c7d59a76f
[  188.097566][T12959] R10: 000000000003fd88 R11: 0000000000000246 R12: 000000000002dcbd
[  188.105374][T12959] R13: 0000000000000032 R14: 00007f9fdf493a60 R15: 00007fff7d59a530
[  188.113198][T12959]  </TASK>
[  188.116053][T12959] 
[  188.118222][T12959] Allocated by task 12961:
[  188.122649][T12959]  __kasan_slab_alloc+0xb1/0xe0
[  188.127336][T12959]  slab_post_alloc_hook+0x53/0x2c0
[  188.132280][T12959]  kmem_cache_alloc+0xf5/0x200
[  188.136879][T12959]  skb_clone+0x1d1/0x360
[  188.140961][T12959]  sk_psock_verdict_recv+0x53/0x840
[  188.145994][T12959]  unix_read_sock+0x132/0x370
[  188.150505][T12959]  sk_psock_verdict_data_ready+0x147/0x1a0
[  188.156244][T12959]  unix_dgram_sendmsg+0x15fa/0x2090
[  188.161363][T12959]  ____sys_sendmsg+0x59e/0x8f0
[  188.165970][T12959]  ___sys_sendmsg+0x252/0x2e0
[  188.170479][T12959]  __se_sys_sendmsg+0x19a/0x260
[  188.175170][T12959]  __x64_sys_sendmsg+0x7b/0x90
[  188.179765][T12959]  do_syscall_64+0x3d/0xb0
[  188.184021][T12959]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  188.189746][T12959] 
[  188.191917][T12959] Freed by task 5199:
[  188.195734][T12959]  kasan_set_track+0x4b/0x70
[  188.200159][T12959]  kasan_set_free_info+0x23/0x40
[  188.204933][T12959]  ____kasan_slab_free+0x126/0x160
[  188.209880][T12959]  __kasan_slab_free+0x11/0x20
[  188.214480][T12959]  slab_free_freelist_hook+0xbd/0x190
[  188.219686][T12959]  kmem_cache_free+0x116/0x2e0
[  188.224287][T12959]  kfree_skbmem+0x104/0x170
[  188.228629][T12959]  kfree_skb+0xc2/0x360
[  188.232621][T12959]  sk_psock_backlog+0xc21/0xd90
[  188.237307][T12959]  process_one_work+0x6bb/0xc10
[  188.241994][T12959]  worker_thread+0xad5/0x12a0
[  188.246510][T12959]  kthread+0x421/0x510
[  188.250412][T12959]  ret_from_fork+0x1f/0x30
[  188.254666][T12959] 
[  188.256836][T12959] The buggy address belongs to the object at ffff8881259e2c80
[  188.256836][T12959]  which belongs to the cache skbuff_head_cache of size 248
[  188.271243][T12959] The buggy address is located 0 bytes inside of
[  188.271243][T12959]  248-byte region [ffff8881259e2c80, ffff8881259e2d78)
[  188.284175][T12959] The buggy address belongs to the page:
[  188.289645][T12959] page:ffffea0004967880 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1259e2
[  188.299712][T12959] flags: 0x4000000000000200(slab|zone=1)
[  188.305183][T12959] raw: 4000000000000200 ffffea000494dc00 0000000400000004 ffff888107f98780
[  188.313611][T12959] raw: 0000000000000000 00000000000c000c 00000001ffffffff 0000000000000000
[  188.322017][T12959] page dumped because: kasan: bad access detected
[  188.328266][T12959] page_owner tracks the page as allocated
[  188.333819][T12959] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112a20(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_HARDWALL), pid 10833, ts 165904979299, free_ts 165066878854
[  188.351353][T12959]  post_alloc_hook+0x1a3/0x1b0
[  188.355951][T12959]  prep_new_page+0x1b/0x110
[  188.360290][T12959]  get_page_from_freelist+0x3550/0x35d0
[  188.365671][T12959]  __alloc_pages+0x27e/0x8f0
[  188.370100][T12959]  new_slab+0x9a/0x4e0
[  188.374007][T12959]  ___slab_alloc+0x39e/0x830
[  188.378430][T12959]  __slab_alloc+0x4a/0x90
[  188.382597][T12959]  kmem_cache_alloc+0x134/0x200
[  188.387283][T12959]  skb_clone+0x1d1/0x360
[  188.391361][T12959]  bpf_clone_redirect+0xa6/0x390
[  188.396137][T12959]  bpf_prog_705e93932f3cc54b+0x429/0xb98
[  188.401603][T12959]  bpf_test_run+0x478/0xa10
[  188.405944][T12959]  bpf_prog_test_run_skb+0xb41/0x1420
[  188.411148][T12959]  bpf_prog_test_run+0x3b0/0x630
[  188.415924][T12959]  __sys_bpf+0x525/0x760
[  188.420003][T12959]  __x64_sys_bpf+0x7c/0x90
[  188.424256][T12959] page last free stack trace:
[  188.428769][T12959]  free_unref_page_prepare+0x7c8/0x7d0
[  188.434063][T12959]  free_unref_page+0xe8/0x750
[  188.438576][T12959]  __free_pages+0x61/0xf0
[  188.442741][T12959]  __vunmap+0x7bc/0x8f0
[  188.446823][T12959]  vfree+0x7f/0xb0
[  188.450380][T12959]  kvfree+0x26/0x40
[  188.454025][T12959]  bpf_map_area_free+0x15/0x20
[  188.458624][T12959]  array_map_free+0x162/0x1c0
[  188.463138][T12959]  bpf_map_free_deferred+0x10d/0x1e0
[  188.468260][T12959]  process_one_work+0x6bb/0xc10
[  188.472946][T12959]  worker_thread+0xad5/0x12a0
[  188.477462][T12959]  kthread+0x421/0x510
[  188.481367][T12959]  ret_from_fork+0x1f/0x30
[  188.485623][T12959] 
[  188.487787][T12959] Memory state around the buggy address:
[  188.493261][T12959]  ffff8881259e2b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  188.501156][T12959]  ffff8881259e2c00: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[  188.509229][T12959] >ffff8881259e2c80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  188.517126][T12959]                    ^
[  188.521031][T12959]  ffff8881259e2d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc
[  188.528930][T12959]  ffff8881259e2d80: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[  188.536914][T12959] ==================================================================
[  188.556395][  T347] device veth0_vlan left promiscuous mode
[  188.630138][T12958] device pim6reg1 entered promiscuous mode