last executing test programs: 2.986993254s ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180100000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x0, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2, 0x17, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000005900000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b70300000000aa008500000005000000bf0900000000000066090600000003e7040000000600000018010000756c6c2500000000002020207d9af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b70300000000000014000000060000005c93000000000000b5030200000000008500000000000000b70000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.496192319s ago: executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000008000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000340)='xen_mc_callback\x00'}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00'}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=0x0, @ANYRES32, @ANYRES8=r1], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='mm_page_free_batched\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x2, 0x8, 0x8}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018119c00", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000000d69200850000008600000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_da_update_reserve_space\x00', r9}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[], 0x7) write$cgroup_int(r5, &(0x7f0000000200), 0x43400) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) 2.126626745s ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3}, 0x10}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0xfffffffffffffdd2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000700)='cpu.stat\x00', 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0), 0x8) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000600)=r5, 0x4) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4}, 0x48) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$SIOCSIFHWADDR(r8, 0x8924, &(0x7f0000000300)={'macvlan1\x00', @multicast}) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r9, 0x18000000000002a0, 0xe80, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a888e55", 0x0, 0xff, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.087634721s ago: executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x3, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) 2.066672135s ago: executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) 2.060834605s ago: executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) mkdir(&(0x7f0000000040)='./file0\x00', 0xd6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xb, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000001801000b2020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000e0083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='ext4_ext_rm_leaf\x00', r4}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='ext4_ext_rm_leaf\x00', r6}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="9fedcb7968ddc36c8f263408008daa"], 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x3, 0x20000196, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='GPL\x00'}, 0x90) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43451) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) 1.883651522s ago: executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xfb, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb0100180000000000000038000000380000000c0000000a000000000000110400000000000000000000000000000200000000040000000000000402000000020000000000000e0300000000000000000061000000000000002e009b89a69088f88f4a3d3f"], 0x0, 0x5c}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='hrtimer_start\x00', r3}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000580)={{}, &(0x7f0000000500)=0x2, &(0x7f0000000540)='%-010d \x00'}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000540), &(0x7f00000004c0), 0x75}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00'}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r5}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) 1.635518851s ago: executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{}, 0x0, &(0x7f0000000880)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={0xffffffffffffffff, 0x0, 0x0}, 0x20) perf_event_open(0x0, 0x0, 0x20000000000000, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@int={0x5, 0x0, 0x0, 0x1, 0x0, 0x67, 0x0, 0x79, 0x5}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000580)=""/237, 0x2c, 0xed, 0x1, 0xc1c9}, 0x20) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000003540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[{0xb8, 0x0, 0x0, "de9b1e3887fee9375c8f2607cc951a216c5636cdcb77dcddd17a4fcd1a71a0f2eff4ee6b2bb1fe314c51d4b78a72cfbd02c6dbd2392b15bbd42e413723cfee6cce7dfbda1e0c716209ea2eb6c9108a46cceea10000000000000000000000000000c21f2bd694c9efd40e14b5e4d725c3cfe2d5f2e2a79dc6b966460c487154fa89d2fcb0d521680d97425d8f62d855e98eaf932ecb7e1b5c60a10547d3ff61efdd43ad270978"}, {0x80, 0x0, 0x0, "123071c4eed9aeec4f923810f91bf2c903c072053c2dc4e159770e67c17fbc8970ca616a87e71101b9cccf699314e5e68f4092590554a50292dc2c8393192e2d31e7e9ff4580be3dcda715dec18befce75be81346c8556c5278b9aab1ae71012f554a0eec6e595e2e7"}, {0x48, 0x0, 0x0, "93440038ae9c2dfe6ed4af6e771b78bc64a2e4ffdc2f151ce2f674ff6b378813edc2a1ecf0a82fbb12a256e2e2d6473669f3415b7b29c986"}, {0x3f0, 0x0, 0x0, "addd5a3f78ed956b3e4cfaec7449b9003d5db56f1323aa5a883d6e78c42f798e0635631468b6f1d761df05090045262ed39841c7f36bd6f2076513605df48971e175b29e81b1c110e7c62bfffc44056bed2d294386e14181dcd65c2eef4507746407cac05bec57f74e611b70e5bd9e5d6a220b9a21e72fad05b24d6ce47978efe92c5c7198acfd99dac9e7f9a50ec4bb7a954dd9ae6d9905d2aff61b8073efcd86bf48e4f0f59f4448f5ba493e0a10741c071db8b2d6962523dbc7a3caa6d7b7b50a62cfe200d398a576ffdc078c06129b37e539b4430a19fecb52473f67c95d01e7c733d89e95ae4b6fe94544acf975be28b665652dee15d64b3eff2880ba958cf8fdfcbeb09bc336c2caa3de81bbc7fc1243cf28c6f8c6550d61e7391a6c178e37ba113abf45593091c758f468d77ef66bef5a0cb05c4482ed93f0e1a5a505ad7f68327ec713b5c123e0a07b6406de791476311263d65a18e0f22cc4116cd095e8c072a69c5724cfee4ddca2a8dc7c3bd16513f925cf64354de9da7f866546ba1ec1e73819bce9fa13665a72089a4a104535e491d27a08b4661a570cd57f88a953433a2840a5aafeeea1c01e41e6f50ab49d093e680360c3057f2a13a075975c2e09d68581402a3909c156e45c00dc0b5a0cf4ab0f8466b2d4a430c3f18c4b925974b3e0ca21cba5ee99c705c09c35e357adefbf7349b0965b82de9ae59bc05b530b9e90bcd4cd025b087374d64a95423a9cdcce59ec2e0737fb793f0c80299cab81baeba0835d69390d3e164f364f0e03372649c2d2321bd17db7012424e9204c4ed13154e7c637c4490f19ab2b196ee2f93f50de16650ebab99e2b4711b3bbd454ef1fa8cf14a612cd66757e12a92d4b57d39551f6e0623d66120c1b37e3b29fe6cec9eafd31433a57ea1fa5b539dffce6b5520e0cc44e0d73c44ffb797bbfc2e4b79553e361cedf66179b11406db5d397c91b69c282805a1c910525b64afdd474f9f6966052c2de7664e8b2fddfba68c92abdb42f45dd8675a6d05c4bea0968cca4a0a9a85e2f99ce493e88ac06e0e03222207acff47b9c091a3bf58e23f52c3c9ee45eb792a550a4c1e9aa59b8c7780cbd7527e1f8a9c9ffd21a4b8dffa0a4097fdda1f292a506130305461e1b6182e536fef5b98228bb814ca5e0ad3837d63610c5de711da20517c264fa99e211d7b2b3ff1f6abe1176c4728fd441b8126cdfb8efeba14c28d85d971fe70f0ec6ffa47cb6186f242208f90681e296a1e1e85c9293dbaa277129965b7be3992d4fa2faf27e262e7f1fd72a388fc4aa62b8482e657c65c3cde72eaeef2855d9f39036f4f71a6cadfb42c00b2a2807e2d65575453e65738e9270ce37bf3ae2a2f11c63e76e1ec5fa95a0abb9f5eb"}, {0x18, 0x0, 0x0, '$'}], 0x588}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYRES8=r1], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='ext4_discard_preallocations\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 1.278839825s ago: executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x7, 0xfff, 0x9}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xa, 0x17, &(0x7f00000007c0)=ANY=[@ANYBLOB="1805000000005900000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b70300ffffff90008500000005000000bf0900000000000066090600000003e7040000000600000018010000756c6c2500000000002020207d9af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b70300000000000014000000060000005c93000000000000b5030200000000008500000000000000b700000000000000950000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.205323597s ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) close(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x5, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xb, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000100000000000000005100027112121d000000167e6efac0aec603"], &(0x7f0000000340)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x18010, 0x0, 0x0, 0x0, 0x2, 0xfffffffb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x14, &(0x7f0000000600)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @printk={@lu}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r1, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa10000000000000701000003ffffffb702000008000000b703000000000083"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x80004, 0xffffffffffff9bfe, 0x0, 0x1, 0x80, 0x69a4, 0x8, 0x0, 0x0, 0x0, 0x17}, 0x0, 0x2, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000009c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x2}, 0x48) 1.174970871s ago: executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x80000000, 0x9fb, 0x8001, 0x20, r0, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0xe}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x9, 0x2, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, 0x0, &(0x7f00000002c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000300000000000000000000004000000bb7f1a00c600feff0000000a9500000000000b004854cbfc892f998cc4cc8819ca7a6c4eb54d317eb9226d8aaaa48d0dee2835b1bc0421224acb8ee13b4a1a2e6e6d23dabe2436ffffffffffffff7fd5d8be800bddb3f8f3e5ef32d979687e5bec4b16115163178a387ec306cdda"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380)={r0}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000280), 0x82, r1}, 0x38) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r7}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) 1.139163736s ago: executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000001bc0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xd0}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x10, &(0x7f0000000500)=ANY=[@ANYBLOB="18060000000000000000000000003c0018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b707000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.124816048s ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d00000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'vlan0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x17, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x42}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'vlan1\x00', 0x800}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000780), 0x0, r4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000ac2c00000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint_stats\x00'}, 0x10) ioctl$TUNSETOFFLOAD(r3, 0x40086607, 0x20001412) 1.059885889s ago: executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000003367a3b1d42db012a73bad00000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf0900000000000066090600000003e7040000000600000018010000756c6c2500000000002020207d9af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b70300000000000014000000060000005c93000000000000b5030200000000008500000000000000b7000000000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000007000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYRES8=r2, @ANYRESOCT=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e8500000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x6, &(0x7f0000000040)=@raw=[@map_idx, @map_fd, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}], 0x0}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0506617, &(0x7f0000000040)=0x2) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='ext4_ext_rm_leaf\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r7, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r8}, 0x10) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000140)='sys_enter\x00', r10}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r7, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x16, '\x00', r11, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.002913947s ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xcd, 0x1}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000010000107b8af8ff00000000bfa200000000000007020000f8ffffff000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f00000004c0)=ANY=[@ANYBLOB="18081c02000000000000000000200000181100007fac5cee6418508b50d84d3dffffffffffffffffff1559cb1f11e8f100ada909d601b071fa94461976cbeea1eeda86f98b355b8ff3f7f35ad776f40a87ef992e69ac68bba962ef2949c26ca9e6a09e6f4e49cfa9ba476abc33a78f2228ba3f240ab57990349b06004c837af0deae5bb03aba9ebbdf8ac3eadd9601e53758a618fa997196324257c5a071b4d27db6e1eae34e3f6300fc0814312a634c8827ec969817f9504aefd9272251985b01e1f300000000", @ANYRESHEX=r2, @ANYRESHEX=r3, @ANYRES8=r2, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000000000000b7000000000000009500000000000000", @ANYRES8, @ANYRES16=r4], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='cachefiles_tmpfile\x00', r7}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40086602, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40086602, &(0x7f0000000000)=0x80000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r8}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000b80)={@ifindex, 0xffffffffffffffff, 0x2d, 0x2010, 0x0, @link_id}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 996.816608ms ago: executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x18, 0x4, 0x1002, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000940)='mm_page_alloc\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x60ae0}], 0x300, 0x0, 0xd66}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x80, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d00000095"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_unlink_exit\x00', r5}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000004c0)=""/200}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='ext4_forget\x00', r7}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4030582a, &(0x7f0000000040)) 764.925853ms ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000400000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0}, 0x90) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r5, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r4}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6003, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 745.351556ms ago: executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xc6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000c80)={{r1}, &(0x7f0000000c00), &(0x7f0000000c40)='%ps \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r3) (fail_nth: 13) 737.675318ms ago: executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000080)=ANY=[@ANYBLOB="1803000000000000000000000000000085100000060000004d100000", @ANYRES32=r0, @ANYBLOB="00000000000000006600000000000000180000000000000000000000000000009500000000000000c70300000000000095"], &(0x7f0000000000)='GPL\x00'}, 0x90) 720.13132ms ago: executing program 3: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001200)={{}, &(0x7f0000001180), 0x0}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x0, 0x4, &(0x7f0000000480)=ANY=[], 0x0, 0x2, 0x0, 0x0, 0x41000, 0x21, '\x00', 0x0, 0x2}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x30) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000780)=ANY=[@ANYRES64, @ANYRES32, @ANYRES64=r2], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000003700610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x4, &(0x7f0000000800)=ANY=[@ANYRES16, @ANYRESOCT=r4], &(0x7f0000000540)='syzkaller\x00', 0x80000667, 0xc0, &(0x7f0000000580)=""/192, 0x41000, 0x0, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r1, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r9, r8, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r9}, &(0x7f0000000000), &(0x7f0000000080)=r5}, 0x20) recvmsg$unix(r6, &(0x7f00000004c0)={&(0x7f0000000180), 0x6e, &(0x7f0000000100)=[{&(0x7f00000006c0)=""/179, 0x22fe0}], 0x1}, 0x0) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) sendmsg$inet(r7, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x33fe0}], 0x1}, 0x0) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x20000000}, 0x20) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0x20000000}, 0x20) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='jbd2_update_log_tail\x00', r11}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x2e, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x4004662b, 0x20001412) openat$cgroup_ro(r10, &(0x7f0000000480)='memory.swap.current\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) 711.779072ms ago: executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x7f, 0x0, 0x8e, 0xff, 0x0, 0x1c37, 0x820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000000), 0x3}, 0x108080, 0x1, 0x6, 0x5, 0x100000001, 0x8, 0x1f, 0x0, 0xdc7, 0x0, 0x400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001b00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) 698.333904ms ago: executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x0, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18090000000000ea94a91711a671a50018150000", @ANYRES32=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000900)='mm_page_alloc\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xffffffff}, 0x23) 146.846838ms ago: executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000604b7030000000000008504000083000000bf090000000000005509010000000000950000000000000000b7020000000000008500000095000000b7000000000000009500"/96], &(0x7f0000000200)='syzkaller\x00', 0x2, 0xf7, &(0x7f0000001e40)=""/4093}, 0x21) 105.808844ms ago: executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) syz_open_procfs$namespace(0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='rss_stat\x00', r2}, 0x29) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='mm_page_free_batched\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0xfffffffb) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r7, &(0x7f0000000180), 0x40001) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b7040000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000400)='ext4_sync_file_exit\x00', r10}, 0x10) write$cgroup_int(r9, &(0x7f0000000200), 0x43400) write$cgroup_int(r6, &(0x7f0000000000), 0xc000) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) 69.39862ms ago: executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x10, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095", @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x0, 0x0, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xf, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x12, 0xfffff001, 0x9, 0x9, 0x140c, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_user\x00', 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000000008500000086000000851000000600000018110000", @ANYRES32, @ANYBLOB="01000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70200000000000085000000860000000699010009000000"], &(0x7f0000000100)='GPL\x00', 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='contention_end\x00', r3}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)=@o_path={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10, r3}, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00', 0xe511}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_exit\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{}, &(0x7f00000001c0), &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f00000038c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x1, 0x0, 0x2}, 0x48) 57.825712ms ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000bc0)=ANY=[@ANYBLOB="611834000000000061134c0000009c00bfa000000000000007000000080000002d0301000000000095000000000000006916000000000000bf37000000000000350607000fff0720dc03000020000000260300000ee60060bf050000000000000f630000000000006507f9ff01000000070700004ddfffff1e75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd399703cac4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44221b235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f3fa039a196ee920ae2fb494059bba8e3b680324a188076eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932b3a6aa57f1ad2e99e0e67ab93716d20000009f0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f674629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43ea0ffb567b40407d000000210000000000000000005f37d8703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f625480a55c22fe3a5ac000000000000000000000000000000c1eb2d91fb79ea00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba90000000000000000fffb0000000082fb0d3cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c693962895496d4f6e9cc54db6c7205a6b068fff496d2da7d6327f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a0337302f3b41eae59809fd05d12f6106f117b062df67d3a6473265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db89da3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f815f8989d78854ca4d3116dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff139604c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c299848649e1a57ff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee15620789c524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2b4dc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca87ddd9d064e081383409ed2912c811ae63f03212a5331c2a4ead000000000000000000008e69cc5c1e7319d39fa6f96c23c8ffd591ef011294c50a0a705549134c4aa3544a99edc9535105d3aeba9ec9441f912bdc65695e731c872278b64167aa46a07c68a9eace7fa485108f9d8cb4304c4b65d61d88aacea85b53893ee96edc310c23b1fc83b4b0f3d28c3861480840b7fe39a2bc2f6a558a20ae4d30b41f32e275faf92af8456141fde716d8d10a6b30981563db05312c39e8074fd5bb8bf95c24ccdb04e40e595927181d1138510fc6162da1a5898534fc2460b957e7b77bc5e192cc36ad2949c85e15142da926fbf6f830e1aaaa5dd9538e259e7f107e49b194c537ed4a52d7175c814e880610815c4090441873b3eb27"], &(0x7f0000000100)='GPL\x00'}, 0x48) 51.525972ms ago: executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000180000ab4a85fc9f9fc44112", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000200)='task_rename\x00', r1}, 0x10) perf_event_open(0x0, 0x0, 0x20000000000000, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r3}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000340)={r2, &(0x7f0000000600)="b99655a78a365085816547893b99c483447f6607045e7912a31a54e59a095681b82a4a5a61e73e02ee60f69543240ab3c9a3f0c62422d9a71248dc14c3ecf90cc0d2595173f804776d57fc52e38d8e83309db64b13b920131c7f66cd651dba119c6808cfd12e08377003c9e881466fbdd2f66294f6332091d89fe5dffbb4eed2f9ade042efee81ef225ca1226b6e5db96f974111266d2c177f3848"}, 0x20) r4 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r4, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000001c0)='\x00'}, 0x30) syz_open_procfs$namespace(r4, &(0x7f0000001740)='ns/uts\x00') r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000004c0), 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x3f, '\x00', 0x0, r0, 0x2, 0x3, 0x1}, 0x48) perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0xee, 0x40, 0x20, 0x83, 0x0, 0x49, 0x2001, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x83fe, 0x4, @perf_bp={&(0x7f0000000400)}, 0x10004, 0x1000, 0x10000, 0x1, 0x5, 0x3, 0x6, 0x0, 0x7fffffff}, 0xffffffffffffffff, 0x800b, r5, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000001000000010000000c513bca905000000000000010000000067007900000000"], 0x0, 0x2b, 0x0, 0x1}, 0x20) socketpair$tipc(0x2, 0x0, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000003000000000000000000000004000000bb7f1e00c600feff0000000a9500feffffff0000c292c21a36d0d2306181132a69e28aa2235ed98e5c9f4a16dc1b8aa9c659f2ddc21e3b25d8b9bbdcfa02e94d3bb6debc9578010289a7d4b1103bcd83e76f81e6ce03cbb00949778d0d938e3eb67e317e2459f7eef783bd4d5defada42ba27b12fa95220950b89f4716d5dc8c612fa63547d16269acdba86e5fb06bff87814cda7b30e66329a0567ed94ebe8ee04a4553b27587ea8af541aa63a7553f28f955f3d1b730f72b9c019d55c54c9234d8"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 41.089264ms ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000414be000004000000bb7f1a00d600feff0000000a9500000000000001"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 27.077656ms ago: executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 0s ago: executing program 2: perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0xc0ff, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) kernel console output (not intermixed with test programs): ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 106.842411][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 106.852416][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 106.868975][ T4056] device veth1_macvtap entered promiscuous mode [ 106.902089][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 106.917438][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 106.929646][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 107.022440][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 107.076452][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 107.126486][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 107.184364][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 107.192616][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 107.200695][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 108.232459][ T4216] device bridge_slave_1 left promiscuous mode [ 108.276524][ T4216] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.322976][ T4216] device bridge_slave_0 left promiscuous mode [ 108.341111][ T4216] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.933042][ T4241] bridge0: port 3(veth1_macvtap) entered blocking state [ 109.023210][ T4241] bridge0: port 3(veth1_macvtap) entered disabled state [ 109.644899][ T4267] bridge0: port 3(veth1_macvtap) entered blocking state [ 109.652336][ T4267] bridge0: port 3(veth1_macvtap) entered disabled state [ 109.770429][ T28] audit: type=1400 audit(1719247377.979:134): avc: denied { setattr } for pid=4272 comm="syz-executor.4" path="/dev/ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 110.134325][ T28] audit: type=1400 audit(1719247378.339:135): avc: denied { create } for pid=4286 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 110.762885][ T28] audit: type=1400 audit(1719247378.969:136): avc: denied { write } for pid=4296 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 111.170226][ T4308] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.259660][ T4308] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.357251][ T4308] device bridge_slave_0 entered promiscuous mode [ 111.439928][ T4308] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.496999][ T4308] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.546676][ T4308] device bridge_slave_1 entered promiscuous mode [ 111.784500][ T1338] device veth1_macvtap left promiscuous mode [ 111.793755][ T1338] device veth0_vlan left promiscuous mode [ 112.052650][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 112.063485][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 112.099753][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 112.127652][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 112.135644][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.142481][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.150080][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 112.176391][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 112.184390][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.191232][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.198427][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 112.206489][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 112.214663][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 112.240981][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 112.253600][ T4308] device veth0_vlan entered promiscuous mode [ 112.265067][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 112.277116][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 112.285869][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 112.300497][ T4308] device veth1_macvtap entered promiscuous mode [ 112.316749][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 112.327784][ T4369] tap0: tun_chr_ioctl cmd 1074025677 [ 112.333017][ T4369] tap0: linktype set to 773 [ 112.347377][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 112.361236][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 113.351900][ T28] audit: type=1400 audit(1719247381.559:137): avc: denied { read } for pid=4388 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 115.088373][ T4420] device veth0_vlan left promiscuous mode [ 115.097507][ T4420] device veth0_vlan entered promiscuous mode [ 115.115055][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 115.123346][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 115.142381][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 115.336186][ T4418] device syzkaller0 entered promiscuous mode [ 116.710000][ T4472] Â: renamed from pim6reg1 [ 118.716678][ T28] audit: type=1400 audit(1719247386.919:138): avc: denied { setopt } for pid=4578 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 121.242481][ T4704] device pim6reg1 entered promiscuous mode [ 121.405788][ T28] audit: type=1400 audit(1719247389.609:139): avc: denied { create } for pid=4703 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 121.721484][ T4721] syz-executor.2[4721] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.721552][ T4721] syz-executor.2[4721] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.994336][ T4751] Â: renamed from pim6reg1 [ 122.573449][ T28] audit: type=1400 audit(1719247390.779:140): avc: denied { create } for pid=4759 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 123.664293][ T28] audit: type=1400 audit(1719247391.869:141): avc: denied { create } for pid=4789 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 124.885415][ T4836] Â: renamed from pim6reg1 [ 125.491549][ T4876] device pim6reg1 entered promiscuous mode [ 125.588159][ T28] audit: type=1400 audit(1719247393.799:142): avc: denied { create } for pid=4887 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 125.900218][ T28] audit: type=1400 audit(1719247394.109:143): avc: denied { create } for pid=4900 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 126.136228][ T4919] Â: renamed from pim6reg1 [ 126.249036][ T4934] device pim6reg1 entered promiscuous mode [ 126.761594][ T4959] Â: renamed from pim6reg1 [ 127.601268][ T5021] device sit0 entered promiscuous mode [ 127.807078][ T5027] device veth1_macvtap left promiscuous mode [ 127.867086][ T5032] device veth1_macvtap entered promiscuous mode [ 127.909326][ T5032] device macsec0 entered promiscuous mode [ 128.661687][ T5074] syz-executor.2[5074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.661758][ T5074] syz-executor.2[5074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.674004][ T5074] syz-executor.2[5074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.685621][ T5074] syz-executor.2[5074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.066821][ T5113] syz-executor.4[5113] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.083519][ T5111] Â: renamed from pim6reg1 [ 129.106941][ T5113] syz-executor.4[5113] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.599488][ T5129] Â: renamed from pim6reg1 [ 130.060930][ T28] audit: type=1400 audit(1719247398.269:144): avc: denied { create } for pid=5145 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 130.686604][ T1330] device bridge_slave_1 left promiscuous mode [ 130.694727][ T1330] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.738233][ T1330] device bridge_slave_0 left promiscuous mode [ 130.744212][ T1330] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.786311][ T1330] device veth1_macvtap left promiscuous mode [ 130.793827][ T1330] device veth0_vlan left promiscuous mode [ 131.083880][ T5164] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.097380][ T5164] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.110061][ T5164] device bridge_slave_0 entered promiscuous mode [ 131.122118][ T5165] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.130503][ T5165] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.144343][ T5165] device bridge_slave_0 entered promiscuous mode [ 131.156473][ T5164] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.164444][ T5164] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.175066][ T5164] device bridge_slave_1 entered promiscuous mode [ 131.187443][ T5165] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.195398][ T5165] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.204265][ T5165] device bridge_slave_1 entered promiscuous mode [ 131.359482][ T5164] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.366365][ T5164] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.373435][ T5164] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.380241][ T5164] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.393719][ T5190] device sit0 entered promiscuous mode [ 131.428653][ T5165] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.435523][ T5165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.442651][ T5165] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.449408][ T5165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.492738][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 131.500790][ T19] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.508521][ T19] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.515662][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.522983][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.549345][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 131.557946][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 131.566016][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.572883][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.580150][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 131.588915][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.595765][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.603453][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 131.621195][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.628057][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.635276][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 131.644112][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.650974][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.663894][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 131.672299][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 131.706773][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 131.714918][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 131.734639][ T5164] device veth0_vlan entered promiscuous mode [ 131.741518][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 131.750175][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 131.757970][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 131.765820][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 131.791776][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 131.799549][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 131.855437][ T5165] device veth0_vlan entered promiscuous mode [ 131.871655][ T5164] device veth1_macvtap entered promiscuous mode [ 131.879142][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 131.888990][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 131.901957][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 131.910669][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 131.918903][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 131.926785][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 131.934611][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 131.942569][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 131.950468][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 131.963840][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 131.971184][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 131.978357][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 131.986381][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 131.994386][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 132.002327][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 132.019581][ T5165] device veth1_macvtap entered promiscuous mode [ 132.028943][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 132.036851][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 132.044690][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 132.056166][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 132.072895][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 132.091215][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 132.128317][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 132.266512][ T5248] geneve1: tun_chr_ioctl cmd 1074025672 [ 132.300589][ T5248] geneve1: ignored: set checksum disabled [ 132.311353][ T5258] Â: renamed from pim6reg1 [ 132.398584][ T5260] syz-executor.1[5260] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.398651][ T5260] syz-executor.1[5260] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.450767][ T5268] syz-executor.0[5268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.484285][ T5268] syz-executor.0[5268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.552421][ T5279] device pim6reg1 entered promiscuous mode [ 132.723452][ T5286] device syzkaller0 entered promiscuous mode [ 133.429556][ T5339] Â: renamed from pim6reg1 [ 136.731595][ T5479] bpf_get_probe_write_proto: 2 callbacks suppressed [ 136.731611][ T5479] syz-executor.1[5479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.819444][ T5479] syz-executor.1[5479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.896531][ T5481] syz-executor.1[5481] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.021381][ T5481] syz-executor.1[5481] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.585616][ T5517] syz-executor.4[5517] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.600079][ T5510] device syzkaller0 entered promiscuous mode [ 137.618532][ T5517] syz-executor.4[5517] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.283948][ T5582] FAULT_INJECTION: forcing a failure. [ 139.283948][ T5582] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 139.316195][ T5582] CPU: 0 PID: 5582 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 139.326092][ T5582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 139.335986][ T5582] Call Trace: [ 139.339109][ T5582] [ 139.341896][ T5582] dump_stack_lvl+0x151/0x1b7 [ 139.346401][ T5582] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 139.351696][ T5582] ? bpf_trace_run4+0x192/0x2f0 [ 139.356382][ T5582] dump_stack+0x15/0x1b [ 139.360372][ T5582] should_fail_ex+0x3d0/0x520 [ 139.364888][ T5582] should_fail+0xb/0x10 [ 139.368878][ T5582] should_fail_usercopy+0x1a/0x20 [ 139.373740][ T5582] _copy_from_iter+0x18d/0xe00 [ 139.378342][ T5582] ? __alloc_pages+0x727/0x780 [ 139.382938][ T5582] ? copyout_mc+0x80/0x80 [ 139.387109][ T5582] ? __kasan_check_write+0x14/0x20 [ 139.392054][ T5582] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 139.397086][ T5582] ? _raw_spin_lock_irqsave+0x210/0x210 [ 139.402474][ T5582] copy_page_from_iter+0x1d7/0x2b0 [ 139.407416][ T5582] pipe_write+0x7c1/0x1990 [ 139.411678][ T5582] ? pipe_read+0x1040/0x1040 [ 139.416094][ T5582] ? selinux_file_permission+0x440/0x560 [ 139.421561][ T5582] ? fsnotify_perm+0x6a/0x5d0 [ 139.426081][ T5582] vfs_write+0x902/0xeb0 [ 139.430156][ T5582] ? file_end_write+0x1c0/0x1c0 [ 139.434844][ T5582] ? __fget_files+0x2cb/0x330 [ 139.439361][ T5582] ? __fdget_pos+0x204/0x390 [ 139.443781][ T5582] ? ksys_write+0x77/0x2c0 [ 139.448038][ T5582] ksys_write+0x199/0x2c0 [ 139.452203][ T5582] ? __ia32_sys_read+0x90/0x90 [ 139.456802][ T5582] ? debug_smp_processor_id+0x17/0x20 [ 139.462008][ T5582] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 139.467911][ T5582] __x64_sys_write+0x7b/0x90 [ 139.472335][ T5582] do_syscall_64+0x3d/0xb0 [ 139.476588][ T5582] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 139.482317][ T5582] RIP: 0033:0x7f5ac407d0a9 [ 139.486571][ T5582] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 139.506012][ T5582] RSP: 002b:00007f5ac4da10c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 139.514259][ T5582] RAX: ffffffffffffffda RBX: 00007f5ac41b3f80 RCX: 00007f5ac407d0a9 [ 139.522070][ T5582] RDX: 000000000000fdef RSI: 0000000020000180 RDI: 0000000000000000 [ 139.529881][ T5582] RBP: 00007f5ac4da1120 R08: 0000000000000000 R09: 0000000000000000 [ 139.537694][ T5582] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 139.545502][ T5582] R13: 000000000000000b R14: 00007f5ac41b3f80 R15: 00007fffc9526b68 [ 139.553320][ T5582] [ 139.587704][ T5590] syz-executor.1[5590] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.587768][ T5590] syz-executor.1[5590] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.673748][ T5603] device sit0 entered promiscuous mode [ 140.230026][ T5642] geneve1: tun_chr_ioctl cmd 1074025672 [ 140.268346][ T5642] geneve1: ignored: set checksum disabled [ 140.346778][ T5648] syz-executor.4[5648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.348465][ T5648] syz-executor.4[5648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.449533][ T5720] Â: renamed from pim6reg1 [ 141.767382][ T1336] device bridge_slave_1 left promiscuous mode [ 141.773322][ T1336] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.819237][ T1336] device bridge_slave_0 left promiscuous mode [ 141.870551][ T1336] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.907601][ T1336] device veth1_macvtap left promiscuous mode [ 141.982400][ T1336] device veth0_vlan left promiscuous mode [ 142.280353][ T28] audit: type=1400 audit(1719247410.489:145): avc: denied { create } for pid=5751 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 142.482276][ T5735] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.573725][ T5735] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.588732][ T5735] device bridge_slave_0 entered promiscuous mode [ 142.595922][ T5735] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.602901][ T5735] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.613146][ T5735] device bridge_slave_1 entered promiscuous mode [ 142.810181][ T5776] device veth1_macvtap left promiscuous mode [ 142.938949][ T5776] device  entered promiscuous mode [ 143.176276][ T5795] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 143.194423][ T5735] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.201300][ T5735] bridge0: port 2(bridge_slave_1) entered forwarding state [ 143.208389][ T5735] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.215177][ T5735] bridge0: port 1(bridge_slave_0) entered forwarding state [ 143.225331][ T2547] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.232972][ T2547] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.261088][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 143.272028][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 143.289823][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 143.306387][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 143.314371][ T2547] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.321239][ T2547] bridge0: port 1(bridge_slave_0) entered forwarding state [ 143.329695][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 143.345442][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 143.355630][ T2547] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.362498][ T2547] bridge0: port 2(bridge_slave_1) entered forwarding state [ 143.388289][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 143.396350][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 143.412322][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 143.428793][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 143.440952][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 143.449322][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 143.458457][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 143.466292][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 143.476651][ T5735] device veth0_vlan entered promiscuous mode [ 143.502413][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 143.509712][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 143.521066][ T5735] device veth1_macvtap entered promiscuous mode [ 143.533429][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 143.556943][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 143.590824][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 143.603245][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 143.611509][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 143.683107][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 143.729613][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 144.374770][ T5866] bridge0: port 3(veth1_macvtap) entered blocking state [ 144.386413][ T5866] bridge0: port 3(veth1_macvtap) entered disabled state [ 145.506739][ T5926] Â: renamed from pim6reg1 [ 145.689539][ T5936] Â: renamed from pim6reg1 [ 146.973827][ T5986] syz-executor.1[5986] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.973886][ T5986] syz-executor.1[5986] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.023739][ T5986] syz-executor.1[5986] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.059294][ T5986] syz-executor.1[5986] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.450054][ T6009] FAULT_INJECTION: forcing a failure. [ 147.450054][ T6009] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 147.678117][ T6009] CPU: 1 PID: 6009 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 147.688010][ T6009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 147.697908][ T6009] Call Trace: [ 147.701028][ T6009] [ 147.703806][ T6009] dump_stack_lvl+0x151/0x1b7 [ 147.708322][ T6009] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 147.713616][ T6009] ? _copy_from_iter+0x1b1/0xe00 [ 147.718392][ T6009] dump_stack+0x15/0x1b [ 147.722379][ T6009] should_fail_ex+0x3d0/0x520 [ 147.726894][ T6009] should_fail_alloc_page+0x68/0x90 [ 147.731928][ T6009] __alloc_pages+0x1f4/0x780 [ 147.736355][ T6009] ? prep_new_page+0x110/0x110 [ 147.740955][ T6009] ? _raw_spin_lock_irqsave+0x210/0x210 [ 147.746334][ T6009] ? copy_page_from_iter+0x23b/0x2b0 [ 147.751456][ T6009] pipe_write+0x56a/0x1990 [ 147.755715][ T6009] ? pipe_read+0x1040/0x1040 [ 147.760137][ T6009] ? selinux_file_permission+0x440/0x560 [ 147.765606][ T6009] ? fsnotify_perm+0x6a/0x5d0 [ 147.770119][ T6009] vfs_write+0x902/0xeb0 [ 147.774200][ T6009] ? file_end_write+0x1c0/0x1c0 [ 147.778883][ T6009] ? __fget_files+0x2cb/0x330 [ 147.783397][ T6009] ? __fdget_pos+0x204/0x390 [ 147.787821][ T6009] ? ksys_write+0x77/0x2c0 [ 147.792076][ T6009] ksys_write+0x199/0x2c0 [ 147.796244][ T6009] ? __ia32_sys_read+0x90/0x90 [ 147.800843][ T6009] ? debug_smp_processor_id+0x17/0x20 [ 147.806050][ T6009] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 147.811954][ T6009] __x64_sys_write+0x7b/0x90 [ 147.816378][ T6009] do_syscall_64+0x3d/0xb0 [ 147.820631][ T6009] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 147.826363][ T6009] RIP: 0033:0x7f5ac407d0a9 [ 147.830612][ T6009] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 147.850056][ T6009] RSP: 002b:00007f5ac4da10c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 147.858298][ T6009] RAX: ffffffffffffffda RBX: 00007f5ac41b3f80 RCX: 00007f5ac407d0a9 [ 147.866111][ T6009] RDX: 000000000000fdef RSI: 0000000020000180 RDI: 0000000000000000 [ 147.873922][ T6009] RBP: 00007f5ac4da1120 R08: 0000000000000000 R09: 0000000000000000 [ 147.881732][ T6009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 147.889547][ T6009] R13: 000000000000000b R14: 00007f5ac41b3f80 R15: 00007fffc9526b68 [ 147.897369][ T6009] [ 148.952740][ T6059] Â: renamed from pim6reg1 [ 150.180162][ T28] audit: type=1400 audit(1719247418.379:146): avc: denied { create } for pid=6128 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 150.496737][ T6159] Â: renamed from pim6reg1 [ 150.798709][ T6173] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 35595 (only 8 groups) [ 151.784528][ T6219] device sit0 left promiscuous mode [ 152.084987][ T6250] Â: renamed from pim6reg1 [ 152.738615][ T6291] EXT4-fs warning (device sda1): ext4_group_extend:1877: need to use ext2online to resize further [ 153.400887][ T28] audit: type=1400 audit(1719247421.609:147): avc: denied { tracepoint } for pid=6324 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 153.573407][ T6338] syz-executor.4[6338] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.573474][ T6338] syz-executor.4[6338] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.836472][ T6349] device syzkaller0 entered promiscuous mode [ 154.640697][ T6390] device pim6reg1 entered promiscuous mode [ 154.682530][ T6395] device pim6reg1 entered promiscuous mode [ 154.783394][ T6412] Â: renamed from pim6reg1 [ 154.979894][ T6429] Â: renamed from pim6reg1 [ 155.039950][ T6438] syz-executor.4[6438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.040009][ T6438] syz-executor.4[6438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.097927][ T6438] syz-executor.4[6438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.135147][ T6438] syz-executor.4[6438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.424655][ T6495] syz-executor.2[6495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.445402][ T6495] syz-executor.2[6495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.461584][ T6495] syz-executor.2[6495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.473308][ T6495] syz-executor.2[6495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.654466][ T6597] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.808200][ T6602] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.815078][ T6602] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.825987][ T6604] bpf_get_probe_write_proto: 14 callbacks suppressed [ 158.826003][ T6604] syz-executor.1[6604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.845400][ T6602] device bridge0 entered promiscuous mode [ 158.853031][ T6604] syz-executor.1[6604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.873468][ T6604] syz-executor.1[6604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.891129][ T6604] syz-executor.1[6604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.898331][ T6601] device syzkaller0 entered promiscuous mode [ 159.153704][ T6621] geneve1: tun_chr_ioctl cmd 1074025672 [ 159.187712][ T6621] geneve1: ignored: set checksum disabled [ 159.886319][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 160.481003][ T6692] device pim6reg1 entered promiscuous mode [ 161.266950][ T6729] Â: renamed from pim6reg1 [ 162.649704][ T6796] syz-executor.3[6796] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.649773][ T6796] syz-executor.3[6796] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.980281][ T6818] syz-executor.0[6818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.011166][ T6822] bridge0: port 3(veth1_macvtap) entered blocking state [ 163.029622][ T6818] syz-executor.0[6818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.031899][ T6818] syz-executor.0[6818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.086454][ T6822] bridge0: port 3(veth1_macvtap) entered disabled state [ 163.157169][ T6818] syz-executor.0[6818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.339257][ T6831] device pim6reg1 entered promiscuous mode [ 164.953164][ T6906] device pim6reg1 entered promiscuous mode [ 165.334158][ T6936] bridge0: port 3(veth1_macvtap) entered blocking state [ 165.421413][ T6936] bridge0: port 3(veth1_macvtap) entered disabled state [ 165.855232][ T6957] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 166.035161][ T6964] Â: renamed from pim6reg1 [ 166.299065][ T6976] syz-executor.0[6976] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.299122][ T6976] syz-executor.0[6976] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.268383][ T7056] syz-executor.2[7056] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.340691][ T7056] syz-executor.2[7056] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.504872][ T7062] syz-executor.2[7062] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.624000][ T7062] syz-executor.2[7062] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.890334][ T7070] FAULT_INJECTION: forcing a failure. [ 169.890334][ T7070] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 170.076614][ T7070] CPU: 1 PID: 7070 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 170.086508][ T7070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 170.096421][ T7070] Call Trace: [ 170.099524][ T7070] [ 170.102308][ T7070] dump_stack_lvl+0x151/0x1b7 [ 170.106820][ T7070] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 170.112113][ T7070] ? _copy_from_iter+0x1b1/0xe00 [ 170.116886][ T7070] dump_stack+0x15/0x1b [ 170.120875][ T7070] should_fail_ex+0x3d0/0x520 [ 170.125391][ T7070] should_fail_alloc_page+0x68/0x90 [ 170.130433][ T7070] __alloc_pages+0x1f4/0x780 [ 170.134853][ T7070] ? prep_new_page+0x110/0x110 [ 170.139451][ T7070] ? _raw_spin_lock_irqsave+0x210/0x210 [ 170.144833][ T7070] ? copy_page_from_iter+0x23b/0x2b0 [ 170.149956][ T7070] pipe_write+0x56a/0x1990 [ 170.154210][ T7070] ? pipe_read+0x1040/0x1040 [ 170.158630][ T7070] ? selinux_file_permission+0x440/0x560 [ 170.164101][ T7070] ? fsnotify_perm+0x6a/0x5d0 [ 170.168618][ T7070] vfs_write+0x902/0xeb0 [ 170.172695][ T7070] ? file_end_write+0x1c0/0x1c0 [ 170.177380][ T7070] ? __fget_files+0x2cb/0x330 [ 170.181893][ T7070] ? __fdget_pos+0x204/0x390 [ 170.186319][ T7070] ? ksys_write+0x77/0x2c0 [ 170.190575][ T7070] ksys_write+0x199/0x2c0 [ 170.194740][ T7070] ? __ia32_sys_read+0x90/0x90 [ 170.199338][ T7070] ? debug_smp_processor_id+0x17/0x20 [ 170.204544][ T7070] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 170.210449][ T7070] __x64_sys_write+0x7b/0x90 [ 170.214876][ T7070] do_syscall_64+0x3d/0xb0 [ 170.219127][ T7070] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 170.224855][ T7070] RIP: 0033:0x7f5ac407d0a9 [ 170.229108][ T7070] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 170.248550][ T7070] RSP: 002b:00007f5ac4da10c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 170.256797][ T7070] RAX: ffffffffffffffda RBX: 00007f5ac41b3f80 RCX: 00007f5ac407d0a9 [ 170.264609][ T7070] RDX: 000000000000fdef RSI: 0000000020000180 RDI: 0000000000000000 [ 170.272423][ T7070] RBP: 00007f5ac4da1120 R08: 0000000000000000 R09: 0000000000000000 [ 170.280230][ T7070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 170.288045][ T7070] R13: 000000000000000b R14: 00007f5ac41b3f80 R15: 00007fffc9526b68 [ 170.295859][ T7070] [ 170.455905][ T7088] geneve1: tun_chr_ioctl cmd 1074025672 [ 170.485508][ T7092] syz-executor.2[7092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.485568][ T7092] syz-executor.2[7092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.498822][ T7092] syz-executor.2[7092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.510478][ T7092] syz-executor.2[7092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.523294][ T7088] geneve1: ignored: set checksum disabled [ 170.584363][ T7098] Â: renamed from pim6reg1 [ 171.240349][ T7136] device veth1_macvtap left promiscuous mode [ 171.696844][ T7160] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 171.972261][ T7180] Â: renamed from pim6reg1 [ 172.097827][ T7190] bpf_get_probe_write_proto: 6 callbacks suppressed [ 172.097843][ T7190] syz-executor.1[7190] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.125919][ T7190] syz-executor.1[7190] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.150969][ T7197] syz-executor.0[7197] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.164923][ T7197] syz-executor.0[7197] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.184708][ T7199] bond_slave_1: mtu less than device minimum [ 172.217817][ T7190] syz-executor.1[7190] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.217872][ T7190] syz-executor.1[7190] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.704855][ T28] audit: type=1400 audit(1719247440.909:148): avc: denied { create } for pid=7228 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 172.755285][ T7233] syz-executor.3[7233] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.755346][ T7233] syz-executor.3[7233] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.838176][ T7233] syz-executor.3[7233] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.017278][ T7233] syz-executor.3[7233] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.918967][ T7292] Â: renamed from pim6reg1 [ 175.455245][ T7367] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.462218][ T7367] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.469400][ T7367] device bridge_slave_0 entered promiscuous mode [ 175.476256][ T7367] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.483102][ T7367] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.490562][ T7367] device bridge_slave_1 entered promiscuous mode [ 175.610416][ T1336] device bridge_slave_1 left promiscuous mode [ 175.618781][ T1336] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.685607][ T1336] device bridge_slave_0 left promiscuous mode [ 175.691672][ T1336] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.944191][ T7379] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.951445][ T7379] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.958769][ T7379] device bridge_slave_0 entered promiscuous mode [ 175.990540][ T7367] device veth0_vlan entered promiscuous mode [ 176.006687][ T7379] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.014701][ T7379] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.027475][ T7379] device bridge_slave_1 entered promiscuous mode [ 176.038919][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.049058][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.063503][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 176.079461][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.093904][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.107732][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.122642][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 176.137582][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.160513][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 176.177565][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.194362][ T975] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.201243][ T975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.213515][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 176.221809][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 176.229859][ T975] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.236719][ T975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.250689][ T7367] device veth1_macvtap entered promiscuous mode [ 176.267558][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 176.275873][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 176.316946][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 176.329868][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 176.666591][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 176.674079][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.739901][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 176.796368][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.804480][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.811335][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.818645][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 176.826851][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 176.834929][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.841779][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.849088][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 176.895489][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 177.018577][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 177.112513][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 177.214346][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 177.228739][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 177.245608][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 177.298479][ T7379] device veth0_vlan entered promiscuous mode [ 177.339216][ T7379] device veth1_macvtap entered promiscuous mode [ 177.360400][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 177.376318][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 177.394776][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 177.402948][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 177.411175][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 177.419080][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 177.427349][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 177.435591][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 177.443831][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 177.458047][ T7423] device pim6reg1 entered promiscuous mode [ 177.464907][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 177.472184][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 177.492759][ T7428] bpf_get_probe_write_proto: 20 callbacks suppressed [ 177.492777][ T7428] syz-executor.1[7428] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.499605][ T7428] syz-executor.1[7428] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.606656][ T7442] bond_slave_1: mtu less than device minimum [ 177.640857][ T1336] device bridge_slave_1 left promiscuous mode [ 177.648155][ T1336] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.662168][ T1336] device bridge_slave_0 left promiscuous mode [ 177.673605][ T1336] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.688968][ T1336] device veth0_vlan left promiscuous mode [ 180.037276][ T7546] syz-executor.4[7546] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.037344][ T7546] syz-executor.4[7546] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.170622][ T7588] syz-executor.2[7588] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.266982][ T7588] syz-executor.2[7588] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.045800][ T7615] syz-executor.2[7615] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.066149][ T7615] syz-executor.2[7615] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.137489][ T7622] geneve1: tun_chr_ioctl cmd 1074025672 [ 182.166173][ T7622] geneve1: ignored: set checksum disabled [ 182.352023][ T7648] syz-executor.1[7648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.352087][ T7648] syz-executor.1[7648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.098770][ T7682] bpf_get_probe_write_proto: 2 callbacks suppressed [ 183.098787][ T7682] syz-executor.3[7682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.182173][ T7682] syz-executor.3[7682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.206866][ T7682] syz-executor.3[7682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.223857][ T7682] syz-executor.3[7682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.802773][ T7717] syz-executor.2[7717] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.939186][ T7717] syz-executor.2[7717] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.079109][ T7724] device syzkaller0 entered promiscuous mode [ 184.958172][ T7758] syz-executor.2[7758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.958233][ T7758] syz-executor.2[7758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.078509][ T7758] syz-executor.2[7758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.156979][ T7758] syz-executor.2[7758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.658603][ T7781] bond_slave_1: mtu less than device minimum [ 185.999995][ T28] audit: type=1400 audit(1719247454.209:149): avc: denied { remove_name } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 186.157985][ T28] audit: type=1400 audit(1719247454.209:150): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 186.235657][ T7823] device syzkaller0 entered promiscuous mode [ 186.302556][ T7834] device veth0_vlan left promiscuous mode [ 186.308865][ T7834] device veth0_vlan entered promiscuous mode [ 186.538035][ T7848] Â: renamed from pim6reg1 [ 186.904474][ T7857] device syzkaller0 entered promiscuous mode [ 187.262631][ T7868] bond_slave_1: mtu greater than device maximum [ 187.667216][ T7894] bond_slave_1: mtu less than device minimum [ 188.235981][ T7931] device lo entered promiscuous mode [ 189.080941][ T7969] bpf_get_probe_write_proto: 12 callbacks suppressed [ 189.080960][ T7969] syz-executor.1[7969] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.136280][ T7969] syz-executor.1[7969] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.380370][ T8027] bridge0: port 3(veth1_macvtap) entered blocking state [ 190.415448][ T8027] bridge0: port 3(veth1_macvtap) entered disabled state [ 192.318594][ T8090] device pim6reg1 entered promiscuous mode [ 192.498803][ T8099] Â: renamed from pim6reg1 [ 193.195406][ T8134] syz-executor.4[8134] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.195463][ T8134] syz-executor.4[8134] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.289990][ T8134] syz-executor.4[8134] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.366742][ T8134] syz-executor.4[8134] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.660820][ T28] audit: type=1400 audit(1719247461.869:151): avc: denied { attach_queue } for pid=8148 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 194.578262][ T8180] syz-executor.4[8180] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.578323][ T8180] syz-executor.4[8180] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.839662][ T28] audit: type=1400 audit(1719247463.049:152): avc: denied { create } for pid=8186 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 195.400225][ T8213] device syzkaller0 entered promiscuous mode [ 198.533916][ T8317] syz-executor.0[8317] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.533973][ T8317] syz-executor.0[8317] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.028281][ T8324] syz-executor.0[8324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.120997][ T8324] syz-executor.0[8324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.688392][ T8348] FAULT_INJECTION: forcing a failure. [ 199.688392][ T8348] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 199.942874][ T8348] CPU: 1 PID: 8348 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 199.952858][ T8348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 199.962760][ T8348] Call Trace: [ 199.965873][ T8348] [ 199.968650][ T8348] dump_stack_lvl+0x151/0x1b7 [ 199.973167][ T8348] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 199.978459][ T8348] ? bpf_trace_run4+0x192/0x2f0 [ 199.983150][ T8348] dump_stack+0x15/0x1b [ 199.987139][ T8348] should_fail_ex+0x3d0/0x520 [ 199.991651][ T8348] should_fail+0xb/0x10 [ 199.995645][ T8348] should_fail_usercopy+0x1a/0x20 [ 200.000505][ T8348] _copy_from_iter+0x18d/0xe00 [ 200.005105][ T8348] ? __alloc_pages+0x727/0x780 [ 200.009703][ T8348] ? copyout_mc+0x80/0x80 [ 200.013870][ T8348] ? __kasan_check_write+0x14/0x20 [ 200.018816][ T8348] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 200.023764][ T8348] ? _raw_spin_lock_irqsave+0x210/0x210 [ 200.029149][ T8348] copy_page_from_iter+0x1d7/0x2b0 [ 200.034092][ T8348] pipe_write+0x7c1/0x1990 [ 200.038354][ T8348] ? pipe_read+0x1040/0x1040 [ 200.042778][ T8348] ? selinux_file_permission+0x440/0x560 [ 200.048240][ T8348] ? fsnotify_perm+0x6a/0x5d0 [ 200.052754][ T8348] vfs_write+0x902/0xeb0 [ 200.056835][ T8348] ? file_end_write+0x1c0/0x1c0 [ 200.061521][ T8348] ? __fget_files+0x2cb/0x330 [ 200.066034][ T8348] ? __fdget_pos+0x204/0x390 [ 200.070457][ T8348] ? ksys_write+0x77/0x2c0 [ 200.074710][ T8348] ksys_write+0x199/0x2c0 [ 200.078878][ T8348] ? __ia32_sys_read+0x90/0x90 [ 200.083475][ T8348] ? debug_smp_processor_id+0x17/0x20 [ 200.088682][ T8348] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 200.094616][ T8348] __x64_sys_write+0x7b/0x90 [ 200.099013][ T8348] do_syscall_64+0x3d/0xb0 [ 200.103265][ T8348] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 200.108994][ T8348] RIP: 0033:0x7f829287d0a9 [ 200.113247][ T8348] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 200.132687][ T8348] RSP: 002b:00007f829364c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 200.141020][ T8348] RAX: ffffffffffffffda RBX: 00007f82929b3f80 RCX: 00007f829287d0a9 [ 200.148830][ T8348] RDX: 000000000000fdef RSI: 0000000020000180 RDI: 0000000000000000 [ 200.156642][ T8348] RBP: 00007f829364c120 R08: 0000000000000000 R09: 0000000000000000 [ 200.164455][ T8348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 200.172534][ T8348] R13: 000000000000000b R14: 00007f82929b3f80 R15: 00007ffd511d7648 [ 200.180348][ T8348] [ 200.375395][ T8363] geneve1: tun_chr_ioctl cmd 1074025672 [ 200.416383][ T8363] geneve1: ignored: set checksum disabled [ 200.798619][ T8385] Â: renamed from pim6reg1 [ 201.027548][ T8408] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 204.740456][ T8584] syz-executor.4[8584] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.740523][ T8584] syz-executor.4[8584] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.794836][ T8591] syz-executor.4[8591] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.873146][ T8598] Â: renamed from pim6reg1 [ 204.907125][ T8591] syz-executor.4[8591] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.631817][ T28] audit: type=1400 audit(1719247473.839:153): avc: denied { create } for pid=8619 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 206.656204][ T8663] syz-executor.0[8663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.656268][ T8663] syz-executor.0[8663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.721045][ T8670] device wg2 entered promiscuous mode [ 207.629280][ T8701] syz-executor.3[8701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.629342][ T8701] syz-executor.3[8701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.767408][ T8709] syz-executor.3[8709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.846580][ T8709] syz-executor.3[8709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.261386][ T8733] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 208.900011][ T8762] Â: renamed from pim6reg1 [ 209.347531][ T28] audit: type=1400 audit(1719247477.559:154): avc: denied { create } for pid=8777 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 209.488576][ T28] audit: type=1400 audit(1719247477.579:155): avc: denied { ioctl } for pid=8777 comm="syz-executor.3" path="socket:[42751]" dev="sockfs" ino=42751 ioctlcmd=0x54e3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 209.993590][ T8801] bpf_get_probe_write_proto: 16 callbacks suppressed [ 209.993609][ T8801] syz-executor.0[8801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.067590][ T8801] syz-executor.0[8801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.123198][ T8801] syz-executor.0[8801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.135460][ T8801] syz-executor.0[8801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.650806][ T8835] syz-executor.2[8835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.663965][ T8835] syz-executor.2[8835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.680673][ T8835] syz-executor.2[8835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.692516][ T8835] syz-executor.2[8835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.129677][ T8873] syz-executor.2[8873] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.262269][ T8873] syz-executor.2[8873] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.843546][ T8925] FAULT_INJECTION: forcing a failure. [ 212.843546][ T8925] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 213.026340][ T8925] CPU: 1 PID: 8925 Comm: syz-executor.2 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 213.036241][ T8925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 213.046134][ T8925] Call Trace: [ 213.049258][ T8925] [ 213.052033][ T8925] dump_stack_lvl+0x151/0x1b7 [ 213.056550][ T8925] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 213.061844][ T8925] ? bpf_trace_run4+0x192/0x2f0 [ 213.066530][ T8925] dump_stack+0x15/0x1b [ 213.070521][ T8925] should_fail_ex+0x3d0/0x520 [ 213.075035][ T8925] should_fail+0xb/0x10 [ 213.079121][ T8925] should_fail_usercopy+0x1a/0x20 [ 213.083984][ T8925] _copy_from_iter+0x18d/0xe00 [ 213.088587][ T8925] ? __alloc_pages+0x727/0x780 [ 213.093182][ T8925] ? copyout_mc+0x80/0x80 [ 213.097361][ T8925] ? __kasan_check_write+0x14/0x20 [ 213.102299][ T8925] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 213.107244][ T8925] ? _raw_spin_lock_irqsave+0x210/0x210 [ 213.112625][ T8925] copy_page_from_iter+0x1d7/0x2b0 [ 213.117573][ T8925] pipe_write+0x7c1/0x1990 [ 213.121830][ T8925] ? pipe_read+0x1040/0x1040 [ 213.126252][ T8925] ? selinux_file_permission+0x440/0x560 [ 213.131723][ T8925] ? fsnotify_perm+0x6a/0x5d0 [ 213.136236][ T8925] vfs_write+0x902/0xeb0 [ 213.140317][ T8925] ? file_end_write+0x1c0/0x1c0 [ 213.145004][ T8925] ? __fget_files+0x2cb/0x330 [ 213.149513][ T8925] ? __fdget_pos+0x204/0x390 [ 213.153937][ T8925] ? ksys_write+0x77/0x2c0 [ 213.158193][ T8925] ksys_write+0x199/0x2c0 [ 213.162358][ T8925] ? __ia32_sys_read+0x90/0x90 [ 213.166958][ T8925] ? debug_smp_processor_id+0x17/0x20 [ 213.172265][ T8925] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 213.178165][ T8925] __x64_sys_write+0x7b/0x90 [ 213.182589][ T8925] do_syscall_64+0x3d/0xb0 [ 213.186840][ T8925] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 213.192570][ T8925] RIP: 0033:0x7f282987d0a9 [ 213.196822][ T8925] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 213.216271][ T8925] RSP: 002b:00007f282a6640c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 213.224509][ T8925] RAX: ffffffffffffffda RBX: 00007f28299b3f80 RCX: 00007f282987d0a9 [ 213.232323][ T8925] RDX: 000000000000fdef RSI: 0000000020000180 RDI: 0000000000000000 [ 213.240132][ T8925] RBP: 00007f282a664120 R08: 0000000000000000 R09: 0000000000000000 [ 213.247948][ T8925] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 213.255757][ T8925] R13: 000000000000000b R14: 00007f28299b3f80 R15: 00007ffe34659f58 [ 213.263572][ T8925] [ 213.294697][ T8943] Â: renamed from pim6reg1 [ 214.571495][ T1330] device bridge_slave_1 left promiscuous mode [ 214.610052][ T1330] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.639179][ T1330] device bridge_slave_0 left promiscuous mode [ 214.647555][ T1330] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.665502][ T1330] device veth1_macvtap left promiscuous mode [ 214.671702][ T1330] device veth0_vlan left promiscuous mode [ 215.558761][ T9052] device syzkaller0 entered promiscuous mode [ 216.118391][ T1330] device bridge_slave_1 left promiscuous mode [ 216.124348][ T1330] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.186839][ T1330] device bridge_slave_0 left promiscuous mode [ 216.243732][ T1330] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.259439][ T9068] bpf_get_probe_write_proto: 18 callbacks suppressed [ 216.259456][ T9068] syz-executor.0[9068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.303399][ T1330] device veth1_macvtap left promiscuous mode [ 216.335445][ T9068] syz-executor.0[9068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.342022][ T9068] syz-executor.0[9068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.413202][ T1330] device veth0_vlan left promiscuous mode [ 216.446977][ T9068] syz-executor.0[9068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.179830][ T9105] syz-executor.3[9105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.286182][ T9105] syz-executor.3[9105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.427039][ T9105] syz-executor.3[9105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.476225][ T9105] syz-executor.3[9105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.905496][ T1330] device bridge_slave_1 left promiscuous mode [ 217.978512][ T1330] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.006351][ T1330] device bridge_slave_0 left promiscuous mode [ 218.036343][ T1330] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.047154][ T1330] device veth1_macvtap left promiscuous mode [ 218.062439][ T1330] device veth0_vlan left promiscuous mode [ 218.617009][ T9111] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.656251][ T9111] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.663515][ T9111] device bridge_slave_0 entered promiscuous mode [ 218.670361][ T9111] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.677232][ T9111] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.684485][ T9111] device bridge_slave_1 entered promiscuous mode [ 219.506273][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.533825][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.635760][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.654954][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.722093][ T975] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.728978][ T975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.824222][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.884793][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.941873][ T975] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.948763][ T975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.993019][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 220.029018][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 220.039594][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 220.052982][ T9111] device veth0_vlan entered promiscuous mode [ 220.066317][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 220.087680][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 220.115917][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 220.136284][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 220.169997][ T9111] device veth1_macvtap entered promiscuous mode [ 220.186728][ T9193] device veth1_macvtap left promiscuous mode [ 220.196814][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 220.204098][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 220.231981][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 220.248255][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 220.272473][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 220.316902][ T9193] device veth1_macvtap entered promiscuous mode [ 220.340988][ T9193] device macsec0 entered promiscuous mode [ 220.389774][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 220.405575][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 220.446445][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 220.505092][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 221.365922][ T9239] syz-executor.0[9239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.365988][ T9239] syz-executor.0[9239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.467750][ T9239] syz-executor.0[9239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.586176][ T9239] syz-executor.0[9239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.111060][ T9273] syz-executor.0[9273] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.122845][ T9273] syz-executor.0[9273] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.163408][ T9273] syz-executor.0[9273] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.290858][ T9273] syz-executor.0[9273] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.605619][ T9310] syz-executor.1[9310] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.807683][ T9310] syz-executor.1[9310] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.312932][ T9376] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 224.409181][ T9373] syz-executor.4 (9373) used greatest stack depth: 20376 bytes left [ 224.633101][ T9382] device sit0 left promiscuous mode [ 224.744287][ T9384] device sit0 entered promiscuous mode [ 225.824535][ T9444] Â: renamed from pim6reg1 [ 226.326122][ T9473] Â: renamed from pim6reg1 [ 226.417706][ T28] audit: type=1400 audit(1719247494.629:156): avc: denied { create } for pid=9478 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 226.520995][ T9483] device pim6reg1 entered promiscuous mode [ 226.663972][ T9496] device syzkaller0 entered promiscuous mode [ 227.161059][ T28] audit: type=1400 audit(1719247495.369:157): avc: denied { append } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 227.189173][ T28] audit: type=1400 audit(1719247495.369:158): avc: denied { open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 227.275526][ T28] audit: type=1400 audit(1719247495.369:159): avc: denied { getattr } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 227.977495][ T9554] device syzkaller0 entered promiscuous mode [ 228.471108][ T9584] bond_slave_1: mtu less than device minimum [ 228.532255][ T9587] bond_slave_1: mtu less than device minimum [ 230.040739][ T9674] bpf_get_probe_write_proto: 12 callbacks suppressed [ 230.040757][ T9674] syz-executor.0[9674] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.066184][ T9674] syz-executor.0[9674] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.249671][ T9698] Â: renamed from pim6reg1 [ 233.324237][ T9803] syz-executor.2[9803] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.324302][ T9803] syz-executor.2[9803] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.583960][ T28] audit: type=1400 audit(1719247501.789:160): avc: denied { create } for pid=9810 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 234.103366][ T9823] device syzkaller0 entered promiscuous mode [ 234.386417][ T9832] syz-executor.0[9832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.386472][ T9832] syz-executor.0[9832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.399061][ T9832] syz-executor.0[9832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.410592][ T9832] syz-executor.0[9832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.538370][ T9842] FAULT_INJECTION: forcing a failure. [ 234.538370][ T9842] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 234.562881][ T9842] CPU: 0 PID: 9842 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 234.572758][ T9842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 234.582652][ T9842] Call Trace: [ 234.585773][ T9842] [ 234.588556][ T9842] dump_stack_lvl+0x151/0x1b7 [ 234.593066][ T9842] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 234.598359][ T9842] ? bpf_trace_run4+0x192/0x2f0 [ 234.603046][ T9842] dump_stack+0x15/0x1b [ 234.607040][ T9842] should_fail_ex+0x3d0/0x520 [ 234.611555][ T9842] should_fail+0xb/0x10 [ 234.615545][ T9842] should_fail_usercopy+0x1a/0x20 [ 234.620405][ T9842] _copy_from_iter+0x18d/0xe00 [ 234.625008][ T9842] ? __alloc_pages+0x727/0x780 [ 234.629626][ T9842] ? copyout_mc+0x80/0x80 [ 234.633773][ T9842] ? __kasan_check_write+0x14/0x20 [ 234.638718][ T9842] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 234.643668][ T9842] ? _raw_spin_lock_irqsave+0x210/0x210 [ 234.649047][ T9842] copy_page_from_iter+0x1d7/0x2b0 [ 234.653996][ T9842] pipe_write+0x7c1/0x1990 [ 234.658252][ T9842] ? pipe_read+0x1040/0x1040 [ 234.662676][ T9842] ? selinux_file_permission+0x440/0x560 [ 234.668153][ T9842] ? fsnotify_perm+0x6a/0x5d0 [ 234.672659][ T9842] vfs_write+0x902/0xeb0 [ 234.676737][ T9842] ? file_end_write+0x1c0/0x1c0 [ 234.681422][ T9842] ? __fget_files+0x2cb/0x330 [ 234.685936][ T9842] ? __fdget_pos+0x204/0x390 [ 234.690360][ T9842] ? ksys_write+0x77/0x2c0 [ 234.694613][ T9842] ksys_write+0x199/0x2c0 [ 234.698782][ T9842] ? __ia32_sys_read+0x90/0x90 [ 234.703381][ T9842] ? debug_smp_processor_id+0x17/0x20 [ 234.708587][ T9842] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 234.714489][ T9842] __x64_sys_write+0x7b/0x90 [ 234.718919][ T9842] do_syscall_64+0x3d/0xb0 [ 234.723170][ T9842] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 234.728897][ T9842] RIP: 0033:0x7f829287d0a9 [ 234.733150][ T9842] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 234.752595][ T9842] RSP: 002b:00007f829364c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 234.760840][ T9842] RAX: ffffffffffffffda RBX: 00007f82929b3f80 RCX: 00007f829287d0a9 [ 234.768661][ T9842] RDX: 000000000000fdef RSI: 0000000020000180 RDI: 0000000000000000 [ 234.776461][ T9842] RBP: 00007f829364c120 R08: 0000000000000000 R09: 0000000000000000 [ 234.784272][ T9842] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 234.792082][ T9842] R13: 000000000000000b R14: 00007f82929b3f80 R15: 00007ffd511d7648 [ 234.799902][ T9842] [ 235.783198][ T9860] syz-executor.1[9860] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.783266][ T9860] syz-executor.1[9860] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.991922][ T9878] Â: renamed from pim6reg1 [ 237.352851][ T9928] syz-executor.2[9928] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.352917][ T9928] syz-executor.2[9928] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.403530][ T9931] syz-executor.2[9931] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.488450][ T9931] syz-executor.2[9931] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.342990][T10037] device syzkaller0 entered promiscuous mode [ 242.018516][T10092] device pim6reg1 entered promiscuous mode [ 242.130170][T10107] Â: renamed from pim6reg1 [ 243.210100][T10156] Â: renamed from pim6reg1 [ 243.414939][T10172] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.431603][T10172] O3ãc¤±: renamed from bridge_slave_0 [ 245.406793][T10281] device syzkaller0 entered promiscuous mode [ 246.804879][T10318] device lo entered promiscuous mode [ 246.844655][T10318] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 246.954858][T10327] device pim6reg1 entered promiscuous mode [ 246.961710][T10327] FAULT_INJECTION: forcing a failure. [ 246.961710][T10327] name failslab, interval 1, probability 0, space 0, times 0 [ 246.974194][T10327] CPU: 1 PID: 10327 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 246.984090][T10327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 246.993992][T10327] Call Trace: [ 246.997106][T10327] [ 246.999882][T10327] dump_stack_lvl+0x151/0x1b7 [ 247.004394][T10327] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 247.009695][T10327] ? pfifo_fast_reset+0xe57/0xf20 [ 247.014551][T10327] dump_stack+0x15/0x1b [ 247.018555][T10327] should_fail_ex+0x3d0/0x520 [ 247.023063][T10327] ? __alloc_skb+0xcc/0x2d0 [ 247.027398][T10327] __should_failslab+0xaf/0xf0 [ 247.032005][T10327] should_failslab+0x9/0x20 [ 247.036337][T10327] kmem_cache_alloc_node+0x3e/0x2d0 [ 247.041370][T10327] __alloc_skb+0xcc/0x2d0 [ 247.045535][T10327] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 247.050658][T10327] rtmsg_ifinfo+0x78/0x120 [ 247.054909][T10327] dev_close_many+0x2a6/0x530 [ 247.059423][T10327] ? __dev_open+0x4e0/0x4e0 [ 247.063763][T10327] ? __kasan_check_read+0x11/0x20 [ 247.068624][T10327] unregister_netdevice_many+0x4d1/0x1740 [ 247.074177][T10327] ? kasan_save_alloc_info+0x1f/0x30 [ 247.079299][T10327] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 247.084947][T10327] ? alloc_netdev_mqs+0xf90/0xf90 [ 247.089803][T10327] ? __kasan_check_write+0x14/0x20 [ 247.094750][T10327] ? queue_delayed_work_on+0x13f/0x180 [ 247.100044][T10327] ? linkwatch_fire_event+0x1e4/0x240 [ 247.105252][T10327] ? __kasan_check_read+0x11/0x20 [ 247.110112][T10327] unregister_netdevice_queue+0x2e6/0x350 [ 247.115667][T10327] ? list_netdevice+0x710/0x710 [ 247.120353][T10327] ? linkwatch_fire_event+0x211/0x240 [ 247.125560][T10327] __tun_detach+0xcf9/0x14c0 [ 247.129985][T10327] ? bit_wait_io_timeout+0x120/0x120 [ 247.135108][T10327] tun_chr_close+0x92/0x140 [ 247.139444][T10327] ? tun_chr_open+0x530/0x530 [ 247.143959][T10327] __fput+0x3ab/0x870 [ 247.147781][T10327] ____fput+0x15/0x20 [ 247.151597][T10327] task_work_run+0x24d/0x2e0 [ 247.156128][T10327] ? __kasan_check_write+0x14/0x20 [ 247.161072][T10327] ? task_work_cancel+0x2b0/0x2b0 [ 247.165932][T10327] ? filp_close+0x105/0x150 [ 247.170271][T10327] exit_to_user_mode_loop+0x94/0xa0 [ 247.175305][T10327] exit_to_user_mode_prepare+0x5a/0xa0 [ 247.180600][T10327] syscall_exit_to_user_mode+0x26/0x140 [ 247.185980][T10327] do_syscall_64+0x49/0xb0 [ 247.190232][T10327] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 247.195961][T10327] RIP: 0033:0x7f5ac407d0a9 [ 247.200217][T10327] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 247.219655][T10327] RSP: 002b:00007f5ac4da10c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 247.227900][T10327] RAX: 0000000000000000 RBX: 00007f5ac41b3f80 RCX: 00007f5ac407d0a9 [ 247.235712][T10327] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 247.243522][T10327] RBP: 00007f5ac4da1120 R08: 0000000000000000 R09: 0000000000000000 [ 247.251333][T10327] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 247.259145][T10327] R13: 000000000000000b R14: 00007f5ac41b3f80 R15: 00007fffc9526b68 [ 247.266962][T10327] [ 247.419311][T10345] Â: renamed from pim6reg1 [ 249.950751][T10444] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 250.113740][T10462] syz-executor.1[10462] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.113799][T10462] syz-executor.1[10462] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.219400][T10462] syz-executor.1[10462] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.291754][T10462] syz-executor.1[10462] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.922320][T10508] device sit0 entered promiscuous mode [ 252.696561][T10550] syz-executor.3[10550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.696631][T10550] syz-executor.3[10550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.455671][T10573] device sit0 entered promiscuous mode [ 253.533822][T10576] syz-executor.3[10576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.533875][T10576] syz-executor.3[10576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.603202][T10576] syz-executor.3[10576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.658746][T10576] syz-executor.3[10576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.847844][T10642] bpf_get_probe_write_proto: 4 callbacks suppressed [ 255.847859][T10642] syz-executor.0[10642] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.967395][T10643] syz-executor.0[10643] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.030505][T10642] syz-executor.0[10642] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.123110][T10643] syz-executor.0[10643] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.275567][T10652] syz-executor.0[10652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.328676][T10652] syz-executor.0[10652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.724899][T10675] syz-executor.2[10675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.742976][T10675] syz-executor.2[10675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.766627][T10675] syz-executor.2[10675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.786363][T10675] syz-executor.2[10675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.000149][T10698] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 258.476302][T10758] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.483238][T10758] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.490525][T10758] device bridge_slave_0 entered promiscuous mode [ 258.500054][T10758] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.507035][T10758] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.514213][T10758] device bridge_slave_1 entered promiscuous mode [ 258.893714][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 258.908009][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 258.956434][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 258.974741][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 259.013580][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.020475][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 259.066880][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 259.076395][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 259.108647][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.115533][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 259.126133][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 259.160164][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 259.203970][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 259.234822][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 259.247410][T10758] device veth0_vlan entered promiscuous mode [ 259.263296][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 259.272117][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 259.279838][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 259.292995][T10758] device veth1_macvtap entered promiscuous mode [ 259.329212][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 259.455824][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 259.464391][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 261.090342][T10825] Â: renamed from pim6reg1 [ 261.368810][T10854] device pim6reg1 entered promiscuous mode [ 261.535964][T10864] Â: renamed from pim6reg1 [ 262.208616][ T28] audit: type=1400 audit(1719247530.419:161): avc: denied { create } for pid=10879 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 262.276120][T10882] bridge0: port 3(veth1_macvtap) entered blocking state [ 262.295071][T10882] bridge0: port 3(veth1_macvtap) entered disabled state [ 262.756838][T10938] bpf_get_probe_write_proto: 12 callbacks suppressed [ 262.756854][T10938] syz-executor.0[10938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.763404][T10938] syz-executor.0[10938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.281772][T10961] syz-executor.4[10961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.293500][T10961] syz-executor.4[10961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.306786][T10961] syz-executor.4[10961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.321520][T10961] syz-executor.4[10961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.448154][T10971] geneve1: tun_chr_ioctl cmd 1074025672 [ 263.518959][T10971] geneve1: ignored: set checksum disabled [ 264.348924][T10993] syz-executor.4[10993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.348989][T10993] syz-executor.4[10993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.393139][T10995] syz-executor.1[10995] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.453411][T10995] syz-executor.1[10995] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.591289][T11123] device pim6reg1 entered promiscuous mode [ 268.098318][T11126] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.131642][T11126] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.199676][T11126] device bridge_slave_0 entered promiscuous mode [ 268.336228][T11126] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.343090][T11126] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.422264][T11126] device bridge_slave_1 entered promiscuous mode [ 268.667568][ T1336] device bridge_slave_1 left promiscuous mode [ 268.681281][ T1336] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.764407][ T1336] device bridge_slave_0 left promiscuous mode [ 268.808696][ T1336] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.817251][ T1336] device veth1_macvtap left promiscuous mode [ 268.823177][ T1336] device veth0_vlan left promiscuous mode [ 269.051360][T11198] device pim6reg1 entered promiscuous mode [ 269.086784][T11204] Â: renamed from pim6reg1 [ 269.148555][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 269.156275][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 269.186611][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 269.194717][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 269.202986][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.209828][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 269.217037][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 269.225418][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 269.234061][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.240917][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.260611][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 269.275239][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 269.294817][T11208] Â: renamed from pim6reg1 [ 269.302859][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 269.338593][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 269.354244][T11126] device veth0_vlan entered promiscuous mode [ 269.368095][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 269.379104][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 269.390758][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 269.413371][T11126] device veth1_macvtap entered promiscuous mode [ 269.434094][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 269.452210][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 269.460668][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 269.743914][T11247] Â: renamed from pim6reg1 [ 270.167412][ T1336] device bridge_slave_1 left promiscuous mode [ 270.176818][ T1336] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.233476][ T1336] device bridge_slave_0 left promiscuous mode [ 270.282391][ T1336] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.341904][ T1336] device veth1_macvtap left promiscuous mode [ 270.356223][ T1336] device veth0_vlan left promiscuous mode [ 271.346710][T11335] bpf_get_probe_write_proto: 22 callbacks suppressed [ 271.346728][T11335] syz-executor.0[11335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.359831][T11335] syz-executor.0[11335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.800681][T11358] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 271.859612][T11356] device pim6reg1 entered promiscuous mode [ 275.098806][T11377] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.105814][T11377] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.334186][T11389] device pim6reg1 entered promiscuous mode [ 275.401682][T11394] FAULT_INJECTION: forcing a failure. [ 275.401682][T11394] name failslab, interval 1, probability 0, space 0, times 0 [ 275.443824][T11394] CPU: 1 PID: 11394 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 275.453806][T11394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 275.463697][T11394] Call Trace: [ 275.466821][T11394] [ 275.469597][T11394] dump_stack_lvl+0x151/0x1b7 [ 275.474113][T11394] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 275.479404][T11394] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 275.485046][T11394] dump_stack+0x15/0x1b [ 275.489037][T11394] should_fail_ex+0x3d0/0x520 [ 275.493548][T11394] ? nf_nat_masq_schedule+0x2d1/0x600 [ 275.498761][T11394] __should_failslab+0xaf/0xf0 [ 275.503357][T11394] should_failslab+0x9/0x20 [ 275.507696][T11394] __kmem_cache_alloc_node+0x3d/0x250 [ 275.512905][T11394] ? nf_nat_masq_schedule+0x2d1/0x600 [ 275.518114][T11394] kmalloc_trace+0x2a/0xa0 [ 275.522364][T11394] nf_nat_masq_schedule+0x2d1/0x600 [ 275.527397][T11394] ? __kasan_check_write+0x14/0x20 [ 275.532346][T11394] ? nf_nat_masq_schedule+0x600/0x600 [ 275.537553][T11394] ? masq_device_event+0xd0/0xd0 [ 275.542328][T11394] ? nfqnl_rcv_dev_event+0x43d/0x470 [ 275.547448][T11394] ? rtnl_is_locked+0x15/0x20 [ 275.551960][T11394] masq_device_event+0xa0/0xd0 [ 275.556564][T11394] raw_notifier_call_chain+0x8c/0xf0 [ 275.561682][T11394] dev_close_many+0x37c/0x530 [ 275.566195][T11394] ? __dev_open+0x4e0/0x4e0 [ 275.570536][T11394] ? __kasan_check_read+0x11/0x20 [ 275.575397][T11394] unregister_netdevice_many+0x4d1/0x1740 [ 275.580952][T11394] ? kasan_save_alloc_info+0x1f/0x30 [ 275.586074][T11394] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 275.591713][T11394] ? alloc_netdev_mqs+0xf90/0xf90 [ 275.596575][T11394] ? __kasan_check_write+0x14/0x20 [ 275.601521][T11394] ? queue_delayed_work_on+0x13f/0x180 [ 275.606814][T11394] ? linkwatch_fire_event+0x1e4/0x240 [ 275.612025][T11394] ? __kasan_check_read+0x11/0x20 [ 275.616883][T11394] unregister_netdevice_queue+0x2e6/0x350 [ 275.622438][T11394] ? list_netdevice+0x710/0x710 [ 275.627125][T11394] ? linkwatch_fire_event+0x211/0x240 [ 275.632333][T11394] __tun_detach+0xcf9/0x14c0 [ 275.636759][T11394] ? bit_wait_io_timeout+0x120/0x120 [ 275.641969][T11394] tun_chr_close+0x92/0x140 [ 275.646306][T11394] ? tun_chr_open+0x530/0x530 [ 275.650819][T11394] __fput+0x3ab/0x870 [ 275.654641][T11394] ____fput+0x15/0x20 [ 275.658458][T11394] task_work_run+0x24d/0x2e0 [ 275.662882][T11394] ? __kasan_check_write+0x14/0x20 [ 275.667831][T11394] ? task_work_cancel+0x2b0/0x2b0 [ 275.672695][T11394] ? filp_close+0x105/0x150 [ 275.677031][T11394] exit_to_user_mode_loop+0x94/0xa0 [ 275.682068][T11394] exit_to_user_mode_prepare+0x5a/0xa0 [ 275.687359][T11394] syscall_exit_to_user_mode+0x26/0x140 [ 275.692746][T11394] do_syscall_64+0x49/0xb0 [ 275.696995][T11394] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 275.702807][T11394] RIP: 0033:0x7f1cac07d0a9 [ 275.707061][T11394] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 275.726504][T11394] RSP: 002b:00007f1cab3f70c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 275.734749][T11394] RAX: 0000000000000000 RBX: 00007f1cac1b4050 RCX: 00007f1cac07d0a9 [ 275.742560][T11394] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 275.750371][T11394] RBP: 00007f1cab3f7120 R08: 0000000000000000 R09: 0000000000000000 [ 275.758181][T11394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 275.765996][T11394] R13: 000000000000006e R14: 00007f1cac1b4050 R15: 00007ffdec429538 [ 275.773808][T11394] [ 276.646959][T11446] syz-executor.1[11446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.647019][T11446] syz-executor.1[11446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.807118][T11446] syz-executor.1[11446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.832401][T11450] syz-executor.3[11450] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.943979][T11446] syz-executor.1[11446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.958269][T11450] syz-executor.3[11450] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.060819][T11456] device syzkaller0 entered promiscuous mode [ 277.536678][T11478] device sit0 left promiscuous mode [ 277.744124][T11483] syz-executor.3[11483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.744189][T11483] syz-executor.3[11483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.806598][T11485] syz-executor.2[11485] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.822582][T11483] syz-executor.3[11483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.988612][T11497] device pim6reg1 entered promiscuous mode [ 278.291098][T11520] device pim6reg1 entered promiscuous mode [ 281.654901][T11698] device lo entered promiscuous mode [ 283.052007][T11752] bond_slave_1: mtu less than device minimum [ 284.347685][T11795] bpf_get_probe_write_proto: 24 callbacks suppressed [ 284.347702][T11795] syz-executor.3[11795] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.387295][T11795] syz-executor.3[11795] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.501284][T11795] syz-executor.3[11795] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.635257][T11795] syz-executor.3[11795] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.679850][T11799] Â: renamed from pim6reg1 [ 285.039985][T11812] Â: renamed from pim6reg1 [ 285.645472][T11825] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.655658][T11825] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.675774][T11825] device bridge_slave_0 entered promiscuous mode [ 285.704031][T11825] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.715225][T11825] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.729622][T11825] device bridge_slave_1 entered promiscuous mode [ 285.926240][ T1338] device bridge_slave_1 left promiscuous mode [ 285.942180][ T1338] bridge0: port 2(bridge_slave_1) entered disabled state [ 286.027602][ T1338] device bridge_slave_0 left promiscuous mode [ 286.099764][ T1338] bridge0: port 1(bridge_slave_0) entered disabled state [ 286.178658][ T1338] device veth1_macvtap left promiscuous mode [ 286.224665][ T1338] device veth0_vlan left promiscuous mode [ 286.928872][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 287.011234][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 287.146927][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 287.155052][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 287.236734][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.243582][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 287.356441][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 287.364621][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 287.496487][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.503426][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 287.510630][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 287.518449][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 287.602152][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 287.653186][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 287.664616][T11825] device veth0_vlan entered promiscuous mode [ 287.683717][ T6294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 287.692125][ T6294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 287.757172][ T6294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 287.777778][ T6294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 287.802457][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 287.818211][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 287.950056][T11825] device veth1_macvtap entered promiscuous mode [ 288.007176][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 288.024956][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 288.060188][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 288.129417][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 288.147735][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 288.380133][T11920] device pim6reg1 entered promiscuous mode [ 288.733073][T11938] syz-executor.2[11938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.733144][T11938] syz-executor.2[11938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.918854][T12004] device syzkaller0 entered promiscuous mode [ 291.372031][T12070] device pim6reg1 entered promiscuous mode [ 291.392487][T12074] syz-executor.0[12074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.392552][T12074] syz-executor.0[12074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.548161][T12086] Â: renamed from pim6reg1 [ 291.588672][ T28] audit: type=1400 audit(1719247559.799:162): avc: denied { create } for pid=12085 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 291.592901][T12089] device pim6reg1 entered promiscuous mode [ 293.427189][T12194] device syzkaller0 entered promiscuous mode [ 293.858369][T12213] Â: renamed from pim6reg1 [ 294.847555][T12269] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.854669][T12269] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.862272][T12269] device bridge_slave_0 entered promiscuous mode [ 294.915763][T12269] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.958595][T12269] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.966030][T12269] device bridge_slave_1 entered promiscuous mode [ 295.018234][T12287] device syzkaller0 entered promiscuous mode [ 295.190804][ T1338] device bridge_slave_1 left promiscuous mode [ 295.220108][ T1338] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.256333][ T1338] device bridge_slave_0 left promiscuous mode [ 295.299496][ T1338] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.369582][ T1338] device veth1_macvtap left promiscuous mode [ 295.384417][ T1338] device veth0_vlan left promiscuous mode [ 295.688929][T12311] Â: renamed from pim6reg1 [ 295.701589][T12269] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.708475][T12269] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.715582][T12269] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.722347][T12269] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.736111][ T975] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.747463][ T975] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.773112][T12326] syz-executor.3[12326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.773174][T12326] syz-executor.3[12326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.796462][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 295.829200][T12326] syz-executor.3[12326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.829263][T12326] syz-executor.3[12326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.836290][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 295.896637][T12326] device pim6reg1 entered promiscuous mode [ 295.906143][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 295.921961][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 295.947058][ T2547] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.953921][ T2547] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.989776][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 296.009283][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 296.063987][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.070899][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.098826][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 296.140433][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 296.201635][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 296.227764][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 296.241821][T12269] device veth0_vlan entered promiscuous mode [ 296.256461][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 296.264707][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 296.323550][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 296.364343][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 296.409652][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 296.455148][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 296.508253][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 296.526708][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 296.573571][T12269] device veth1_macvtap entered promiscuous mode [ 296.598065][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 296.607563][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 296.639737][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 296.702131][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 296.726635][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 296.886985][T12364] Â: renamed from pim6reg1 [ 296.937260][T12369] syz-executor.2[12369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 296.937325][T12369] syz-executor.2[12369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.056522][T12369] syz-executor.2[12369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.167645][T12375] device pim6reg1 entered promiscuous mode [ 297.185160][T12369] syz-executor.2[12369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.555537][T12388] device vxcan1 entered promiscuous mode [ 297.649769][T12394] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 297.923468][T12403] device wg2 entered promiscuous mode [ 298.648819][T12442] device vxcan1 entered promiscuous mode [ 298.654937][T12444] bond_slave_1: mtu greater than device maximum [ 300.451858][T12483] device vxcan1 entered promiscuous mode [ 301.240753][T12541] device pim6reg1 entered promiscuous mode [ 301.517743][T12552] EXT4-fs warning (device sda1): ext4_group_extend:1877: need to use ext2online to resize further [ 307.161710][T12657] syz-executor.4[12657] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.161772][T12657] syz-executor.4[12657] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.382045][T12677] Â: renamed from pim6reg1 [ 307.458328][T12683] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 307.512237][T12682] device syzkaller0 entered promiscuous mode [ 308.147034][ T28] audit: type=1400 audit(1719247576.349:163): avc: denied { create } for pid=12712 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 308.680363][T12742] syz-executor.4[12742] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.680421][T12742] syz-executor.4[12742] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.729559][T12742] syz-executor.4[12742] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.775645][T12742] syz-executor.4[12742] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 309.389225][T12788] Â: renamed from pim6reg1 [ 309.558597][T12808] syz-executor.4[12808] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 309.622272][T12813] syz-executor.4[12813] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 309.644570][T12812] Â: renamed from pim6reg1 [ 313.830808][T12908] syz-executor.1[12908] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.835259][T12908] syz-executor.1[12908] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.057993][T12930] device pim6reg1 entered promiscuous mode [ 314.135280][T12940] FAULT_INJECTION: forcing a failure. [ 314.135280][T12940] name failslab, interval 1, probability 0, space 0, times 0 [ 314.147737][T12940] CPU: 1 PID: 12940 Comm: syz-executor.3 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 314.157675][T12940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 314.167568][T12940] Call Trace: [ 314.170690][T12940] [ 314.173469][T12940] dump_stack_lvl+0x151/0x1b7 [ 314.177981][T12940] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 314.183279][T12940] dump_stack+0x15/0x1b [ 314.187268][T12940] should_fail_ex+0x3d0/0x520 [ 314.191791][T12940] ? __alloc_skb+0xcc/0x2d0 [ 314.196207][T12940] __should_failslab+0xaf/0xf0 [ 314.200808][T12940] should_failslab+0x9/0x20 [ 314.205146][T12940] kmem_cache_alloc_node+0x3e/0x2d0 [ 314.210182][T12940] ? _find_next_bit+0x126/0x130 [ 314.214871][T12940] __alloc_skb+0xcc/0x2d0 [ 314.219036][T12940] inet6_rt_notify+0x2db/0x560 [ 314.223635][T12940] ? rt6_nh_dump_exceptions+0x650/0x650 [ 314.229026][T12940] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 314.234660][T12940] fib6_del+0xce0/0x1060 [ 314.238742][T12940] ? fib6_locate+0x560/0x560 [ 314.243161][T12940] ? finish_task_switch+0x207/0x7b0 [ 314.248208][T12940] fib6_clean_node+0x2ed/0x550 [ 314.252799][T12940] ? node_free_rcu+0x30/0x30 [ 314.257224][T12940] ? __kasan_check_read+0x11/0x20 [ 314.262086][T12940] ? preempt_schedule_common+0xbe/0xf0 [ 314.267377][T12940] fib6_walk_continue+0x52d/0x720 [ 314.272242][T12940] fib6_walk+0x172/0x2d0 [ 314.276319][T12940] fib6_clean_all+0x202/0x2c0 [ 314.280832][T12940] ? rt6_sync_down_dev+0x170/0x170 [ 314.285777][T12940] ? fib6_del+0x1060/0x1060 [ 314.290116][T12940] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 314.295777][T12940] ? node_free_rcu+0x30/0x30 [ 314.300190][T12940] ? rt6_sync_down_dev+0x170/0x170 [ 314.305134][T12940] ? cpu_curr_snapshot+0x90/0x90 [ 314.309908][T12940] ? schedule_preempt_disabled+0x20/0x20 [ 314.315380][T12940] rt6_disable_ip+0x166/0x9e0 [ 314.319889][T12940] ? preempt_schedule_thunk+0x16/0x18 [ 314.325098][T12940] ? tracing_record_taskinfo_sched_switch+0x54/0x390 [ 314.331607][T12940] ? fib6_ifdown+0x510/0x510 [ 314.336036][T12940] ? __kasan_check_read+0x11/0x20 [ 314.340892][T12940] addrconf_ifdown+0x15e/0x1ab0 [ 314.345584][T12940] ? __fput+0x3ab/0x870 [ 314.349570][T12940] ? ____fput+0x15/0x20 [ 314.353566][T12940] ? wq_worker_last_func+0x50/0x50 [ 314.358510][T12940] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 314.364417][T12940] ? addrconf_cleanup+0x140/0x140 [ 314.369274][T12940] ? mutex_unlock+0xb2/0x260 [ 314.373700][T12940] ? __mutex_lock_slowpath+0x10/0x10 [ 314.378821][T12940] ? nf_nat_masq_schedule+0x600/0x600 [ 314.384031][T12940] ? masq_device_event+0xd0/0xd0 [ 314.388805][T12940] addrconf_notify+0x32f/0xe10 [ 314.393401][T12940] ? ip6mr_device_event+0x1e3/0x210 [ 314.398448][T12940] raw_notifier_call_chain+0x8c/0xf0 [ 314.403557][T12940] dev_close_many+0x37c/0x530 [ 314.408071][T12940] ? __dev_open+0x4e0/0x4e0 [ 314.412410][T12940] ? __kasan_check_read+0x11/0x20 [ 314.417271][T12940] unregister_netdevice_many+0x4d1/0x1740 [ 314.422824][T12940] ? kasan_save_alloc_info+0x1f/0x30 [ 314.427946][T12940] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 314.433587][T12940] ? alloc_netdev_mqs+0xf90/0xf90 [ 314.438450][T12940] ? __kasan_check_write+0x14/0x20 [ 314.443396][T12940] ? queue_delayed_work_on+0x13f/0x180 [ 314.448690][T12940] ? linkwatch_fire_event+0x1e4/0x240 [ 314.453898][T12940] ? __kasan_check_read+0x11/0x20 [ 314.458758][T12940] unregister_netdevice_queue+0x2e6/0x350 [ 314.464314][T12940] ? list_netdevice+0x710/0x710 [ 314.469001][T12940] ? linkwatch_fire_event+0x211/0x240 [ 314.474211][T12940] __tun_detach+0xcf9/0x14c0 [ 314.478634][T12940] ? bit_wait_io_timeout+0x120/0x120 [ 314.483755][T12940] tun_chr_close+0x92/0x140 [ 314.488093][T12940] ? tun_chr_open+0x530/0x530 [ 314.492606][T12940] __fput+0x3ab/0x870 [ 314.496435][T12940] ____fput+0x15/0x20 [ 314.500244][T12940] task_work_run+0x24d/0x2e0 [ 314.504672][T12940] ? __kasan_check_write+0x14/0x20 [ 314.509622][T12940] ? task_work_cancel+0x2b0/0x2b0 [ 314.514478][T12940] ? filp_close+0x105/0x150 [ 314.518819][T12940] exit_to_user_mode_loop+0x94/0xa0 [ 314.523852][T12940] exit_to_user_mode_prepare+0x5a/0xa0 [ 314.529152][T12940] syscall_exit_to_user_mode+0x26/0x140 [ 314.534530][T12940] do_syscall_64+0x49/0xb0 [ 314.538783][T12940] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 314.544514][T12940] RIP: 0033:0x7f60f167d0a9 [ 314.548764][T12940] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 314.568204][T12940] RSP: 002b:00007f60f247d0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 314.576450][T12940] RAX: 0000000000000000 RBX: 00007f60f17b4050 RCX: 00007f60f167d0a9 [ 314.584257][T12940] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 314.592069][T12940] RBP: 00007f60f247d120 R08: 0000000000000000 R09: 0000000000000000 [ 314.599881][T12940] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 314.607693][T12940] R13: 000000000000006e R14: 00007f60f17b4050 R15: 00007fff5d180768 [ 314.615512][T12940] [ 315.005156][T13002] syz-executor.1[13002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.005227][T13002] syz-executor.1[13002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.647240][ T28] audit: type=1400 audit(1719247583.859:164): avc: denied { create } for pid=13039 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 315.853903][T13046] device pim6reg1 entered promiscuous mode [ 315.864155][T13050] syz-executor.1[13050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.864218][T13050] syz-executor.1[13050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.909885][T13050] syz-executor.1[13050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.925239][T13050] syz-executor.1[13050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.939420][T13054] bond_slave_1: mtu less than device minimum [ 315.957862][T13050] syz-executor.1[13050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.957924][T13050] syz-executor.1[13050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 316.495027][T13083] tap0: tun_chr_ioctl cmd 2147767507 [ 316.525495][T13076] device pim6reg1 entered promiscuous mode [ 316.593996][T13084] tap0: tun_chr_ioctl cmd 2147767517 [ 316.692168][T13104] tap0: tun_chr_ioctl cmd 2147767506 [ 316.765785][T13111] device syzkaller0 entered promiscuous mode [ 316.783912][ T28] audit: type=1400 audit(1719247584.989:165): avc: denied { create } for pid=13112 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 316.824002][T13117] tap0: tun_chr_ioctl cmd 2147767511 [ 317.044359][T13123] tap0: tun_chr_ioctl cmd 1074025694 [ 317.054213][T13125] tap0: tun_chr_ioctl cmd 1074025675 [ 317.061285][T13125] tap0: persist enabled [ 317.182603][T13160] tap0: tun_chr_ioctl cmd 1074025675 [ 317.188505][T13160] tap0: persist disabled [ 317.270690][T13168] tap0: tun_chr_ioctl cmd 2147767519 [ 317.300861][T13172] tap0: tun_chr_ioctl cmd 1074025681 [ 317.349370][T13180] tap0: tun_chr_ioctl cmd 2148553947 [ 317.412695][T13186] device pim6reg1 entered promiscuous mode [ 317.462434][T13194] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 317.488445][T13198] Â: renamed from pim6reg1 [ 319.126812][T13284] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.133833][T13284] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.999383][T13359] Â: renamed from pim6reg1 [ 321.583244][T13451] Â: renamed from pim6reg1 [ 324.258746][T13584] device syzkaller0 entered promiscuous mode [ 325.161699][T13635] device syzkaller0 entered promiscuous mode [ 326.267246][T13694] syz-executor.4[13694] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 326.267310][T13694] syz-executor.4[13694] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.863276][T13739] device syzkaller0 entered promiscuous mode [ 328.867930][T13790] Â: renamed from pim6reg1 [ 329.962663][T13851] Â: renamed from pim6reg1 [ 331.252167][T13900] syz-executor.2[13900] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.252236][T13900] syz-executor.2[13900] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.693659][T13933] syz-executor.2[13933] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.776296][T13933] syz-executor.2[13933] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.927592][T13942] device pim6reg1 entered promiscuous mode [ 334.552133][T13988] device pim6reg1 entered promiscuous mode [ 335.043287][T14023] device syzkaller0 entered promiscuous mode [ 335.352338][T14036] device syzkaller0 entered promiscuous mode [ 335.498901][T14063] Â: renamed from pim6reg1 [ 335.782832][T14080] device sit0 entered promiscuous mode [ 337.626317][T14132] device syzkaller0 entered promiscuous mode [ 338.257388][T14179] Â: renamed from pim6reg1 [ 338.551685][T14200] geneve1: tun_chr_ioctl cmd 1074025672 [ 338.603487][T14200] geneve1: ignored: set checksum disabled [ 339.375356][T14242] Â: renamed from pim6reg1 [ 339.911937][T14275] syz-executor.0[14275] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 339.912004][T14275] syz-executor.0[14275] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 342.131261][T14396] syz-executor.1[14396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 342.147655][T14396] syz-executor.1[14396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.099356][T14433] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 344.131474][T14435] syz-executor.4[14435] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.131552][T14435] syz-executor.4[14435] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.240729][T14453] device veth0_vlan left promiscuous mode [ 344.265861][T14453] device veth0_vlan entered promiscuous mode [ 344.288275][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 344.308840][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 344.322877][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 344.478041][T14478] device wg2 entered promiscuous mode [ 344.807458][T14494] syz-executor.1[14494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.807529][T14494] syz-executor.1[14494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.859280][T14488] syz-executor.1[14488] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.948278][T14488] syz-executor.1[14488] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 345.437518][T14514] Â: renamed from pim6reg1 [ 345.736403][T14548] device syzkaller0 entered promiscuous mode [ 346.040549][T14592] Â: renamed from pim6reg1 [ 346.166712][ T1330] device bridge_slave_1 left promiscuous mode [ 346.172819][ T1330] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.240138][T14613] syz-executor.0[14613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 346.241857][T14613] syz-executor.0[14613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 346.258840][ T1330] device bridge_slave_0 left promiscuous mode [ 346.350689][ T1330] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.395535][ T1330] device veth1_macvtap left promiscuous mode [ 346.429500][ T1330] device veth0_vlan left promiscuous mode [ 346.651453][T14624] tap0: tun_chr_ioctl cmd 35111 [ 346.689202][T14620] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.696211][T14620] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.703820][T14620] device bridge_slave_0 entered promiscuous mode [ 346.716721][T14620] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.727236][T14620] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.734386][T14620] device bridge_slave_1 entered promiscuous mode [ 346.792339][T14620] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.799219][T14620] bridge0: port 2(bridge_slave_1) entered forwarding state [ 346.806346][T14620] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.813193][T14620] bridge0: port 1(bridge_slave_0) entered forwarding state [ 346.860686][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 346.870039][ T24] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.919263][ T24] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.985483][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 347.066205][ T316] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.073067][ T316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 347.201747][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 347.281710][ T316] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.288677][ T316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 347.427962][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 347.435777][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 347.506492][T14672] syz-executor.1[14672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.506560][T14672] syz-executor.1[14672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.574051][T14620] device veth0_vlan entered promiscuous mode [ 347.601506][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 347.622675][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 347.636348][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 347.645479][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 347.690615][T14620] device veth1_macvtap entered promiscuous mode [ 347.700253][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 347.721075][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 347.817192][ T975] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 347.938642][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 347.946796][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 347.954942][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 348.111806][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 348.596155][T14726] bond_slave_1: mtu less than device minimum [ 351.476578][T14821] device pim6reg1 entered promiscuous mode [ 352.117562][T14888] bridge0: port 3(team_slave_1) entered blocking state [ 352.255256][T14888] bridge0: port 3(team_slave_1) entered disabled state [ 352.296782][T14888] device team_slave_1 entered promiscuous mode [ 354.022725][T14979] Â: renamed from pim6reg1 [ 354.089455][T14985] device syzkaller0 entered promiscuous mode [ 355.230733][T15041] Â: renamed from pim6reg1 [ 355.266122][T15046] syz-executor.3[15046] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 355.678747][T15077] geneve1: tun_chr_ioctl cmd 1074025672 [ 355.719236][T15077] geneve1: ignored: set checksum disabled [ 356.958296][T15137] Â: renamed from pim6reg1 [ 358.433028][T15195] device pim6reg1 entered promiscuous mode [ 358.481639][T15195] FAULT_INJECTION: forcing a failure. [ 358.481639][T15195] name failslab, interval 1, probability 0, space 0, times 0 [ 358.494093][T15195] CPU: 1 PID: 15195 Comm: syz-executor.4 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 358.504037][T15195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 358.513933][T15195] Call Trace: [ 358.517066][T15195] [ 358.519835][T15195] dump_stack_lvl+0x151/0x1b7 [ 358.524349][T15195] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 358.529643][T15195] ? unwind_next_frame+0x3cb/0x700 [ 358.534591][T15195] dump_stack+0x15/0x1b [ 358.538580][T15195] should_fail_ex+0x3d0/0x520 [ 358.543096][T15195] ? __alloc_skb+0xcc/0x2d0 [ 358.547434][T15195] __should_failslab+0xaf/0xf0 [ 358.552036][T15195] should_failslab+0x9/0x20 [ 358.556379][T15195] kmem_cache_alloc_node+0x3e/0x2d0 [ 358.561410][T15195] __alloc_skb+0xcc/0x2d0 [ 358.565575][T15195] ? _raw_write_lock+0xa4/0x170 [ 358.570262][T15195] __neigh_notify+0x7d/0x130 [ 358.574690][T15195] neigh_cleanup_and_release+0x2c/0x1b0 [ 358.580070][T15195] neigh_flush_dev+0x7b5/0x970 [ 358.584668][T15195] ? __kasan_check_write+0x14/0x20 [ 358.589620][T15195] __neigh_ifdown+0x3d/0x410 [ 358.594043][T15195] neigh_ifdown+0x1f/0x30 [ 358.598208][T15195] rt6_disable_ip+0x97e/0x9e0 [ 358.602724][T15195] ? fib6_ifdown+0x510/0x510 [ 358.607150][T15195] ? __kasan_check_read+0x11/0x20 [ 358.612010][T15195] addrconf_ifdown+0x15e/0x1ab0 [ 358.616702][T15195] ? __fput+0x3ab/0x870 [ 358.620687][T15195] ? ____fput+0x15/0x20 [ 358.624681][T15195] ? wq_worker_last_func+0x50/0x50 [ 358.629631][T15195] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 358.635539][T15195] ? addrconf_cleanup+0x140/0x140 [ 358.640392][T15195] ? mutex_unlock+0xb2/0x260 [ 358.644818][T15195] ? __mutex_lock_slowpath+0x10/0x10 [ 358.649938][T15195] ? nf_nat_masq_schedule+0x600/0x600 [ 358.655233][T15195] ? masq_device_event+0xd0/0xd0 [ 358.660007][T15195] addrconf_notify+0x32f/0xe10 [ 358.664605][T15195] ? ip6mr_device_event+0x1e3/0x210 [ 358.669647][T15195] raw_notifier_call_chain+0x8c/0xf0 [ 358.674764][T15195] dev_close_many+0x37c/0x530 [ 358.679276][T15195] ? __dev_open+0x4e0/0x4e0 [ 358.683616][T15195] ? __kasan_check_read+0x11/0x20 [ 358.688474][T15195] unregister_netdevice_many+0x4d1/0x1740 [ 358.694030][T15195] ? __queue_work+0x9d9/0xd70 [ 358.698544][T15195] ? alloc_netdev_mqs+0xf90/0xf90 [ 358.703403][T15195] ? __queue_delayed_work+0x182/0x1f0 [ 358.708610][T15195] ? queue_delayed_work_on+0x13f/0x180 [ 358.713905][T15195] ? linkwatch_fire_event+0x1e4/0x240 [ 358.719113][T15195] ? __kasan_check_read+0x11/0x20 [ 358.723974][T15195] unregister_netdevice_queue+0x2e6/0x350 [ 358.729530][T15195] ? list_netdevice+0x710/0x710 [ 358.734214][T15195] ? linkwatch_fire_event+0x211/0x240 [ 358.739424][T15195] __tun_detach+0xcf9/0x14c0 [ 358.743850][T15195] ? bit_wait_io_timeout+0x120/0x120 [ 358.748973][T15195] tun_chr_close+0x92/0x140 [ 358.753309][T15195] ? tun_chr_open+0x530/0x530 [ 358.757823][T15195] __fput+0x3ab/0x870 [ 358.761646][T15195] ____fput+0x15/0x20 [ 358.765460][T15195] task_work_run+0x24d/0x2e0 [ 358.769886][T15195] ? __kasan_check_write+0x14/0x20 [ 358.774833][T15195] ? task_work_cancel+0x2b0/0x2b0 [ 358.779696][T15195] ? filp_close+0x105/0x150 [ 358.784035][T15195] exit_to_user_mode_loop+0x94/0xa0 [ 358.789069][T15195] exit_to_user_mode_prepare+0x5a/0xa0 [ 358.794365][T15195] syscall_exit_to_user_mode+0x26/0x140 [ 358.799745][T15195] do_syscall_64+0x49/0xb0 [ 358.803997][T15195] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 358.809726][T15195] RIP: 0033:0x7f6bd9e7d0a9 [ 358.813978][T15195] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 358.833426][T15195] RSP: 002b:00007f6bdac5b0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 358.841663][T15195] RAX: 0000000000000000 RBX: 00007f6bd9fb3f80 RCX: 00007f6bd9e7d0a9 [ 358.849474][T15195] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 358.857284][T15195] RBP: 00007f6bdac5b120 R08: 0000000000000000 R09: 0000000000000000 [ 358.865096][T15195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 358.872909][T15195] R13: 000000000000000b R14: 00007f6bd9fb3f80 R15: 00007ffe3ca26b68 [ 358.880727][T15195] [ 359.213223][T15193] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 359.220848][T15193] #PF: supervisor instruction fetch in kernel mode [ 359.227182][T15193] #PF: error_code(0x0010) - not-present page [ 359.232997][T15193] PGD 1346f7067 P4D 1346f7067 PUD 1329c6067 PMD 0 [ 359.239334][T15193] Oops: 0010 [#1] PREEMPT SMP KASAN [ 359.244367][T15193] CPU: 0 PID: 15193 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 359.254349][T15193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 359.264245][T15193] RIP: 0010:0x0 [ 359.267547][T15193] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 359.274745][T15193] RSP: 0018:ffffc90000f97908 EFLAGS: 00010246 [ 359.280646][T15193] RAX: 1ffff11021fc2217 RBX: ffff88810fe110b8 RCX: 0000000000040000 [ 359.288458][T15193] RDX: ffffc90001551000 RSI: 0000000000024376 RDI: ffff88813266c540 [ 359.296271][T15193] RBP: ffffc90000f97930 R08: ffffffff841d8447 R09: 0000000000000003 [ 359.304081][T15193] R10: ffffffffffffffff R11: dffffc0000000001 R12: 0000000000000004 [ 359.311893][T15193] R13: dffffc0000000000 R14: ffff88813266c540 R15: dffffc0000000000 [ 359.319704][T15193] FS: 00007f1cacd196c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 359.328471][T15193] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 359.334893][T15193] CR2: ffffffffffffffd6 CR3: 0000000145411000 CR4: 00000000003506b0 [ 359.342709][T15193] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 359.350517][T15193] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 359.358329][T15193] Call Trace: [ 359.361453][T15193] [ 359.364232][T15193] ? __die_body+0x62/0xb0 [ 359.368397][T15193] ? __die+0x7e/0x90 [ 359.372911][T15193] ? page_fault_oops+0x7f9/0xa90 [ 359.377685][T15193] ? kernelmode_fixup_or_oops+0x270/0x270 [ 359.383238][T15193] ? queued_write_lock_slowpath+0x460/0x547 [ 359.388969][T15193] ? preempt_schedule_notrace+0x140/0x140 [ 359.394522][T15193] ? __rcu_read_unlock+0x7e/0xd0 [ 359.399294][T15193] ? is_errata93+0xc7/0x240 [ 359.403636][T15193] ? exc_page_fault+0x537/0x700 [ 359.408324][T15193] ? asm_exc_page_fault+0x27/0x30 [ 359.413184][T15193] ? sk_psock_verdict_data_ready+0xf7/0x160 [ 359.418913][T15193] sk_psock_verdict_data_ready+0x129/0x160 [ 359.424553][T15193] unix_stream_sendmsg+0x8fd/0x1070 [ 359.429588][T15193] ? unix_stream_sendmsg+0x8b1/0x1070 [ 359.434798][T15193] ? unix_show_fdinfo+0x2f0/0x2f0 [ 359.439657][T15193] ? security_socket_sendmsg+0x82/0xb0 [ 359.444948][T15193] ? unix_show_fdinfo+0x2f0/0x2f0 [ 359.449809][T15193] ____sys_sendmsg+0x5d3/0x9a0 [ 359.454413][T15193] ? __sys_sendmsg_sock+0x40/0x40 [ 359.459272][T15193] __sys_sendmsg+0x2a9/0x390 [ 359.463696][T15193] ? ____sys_sendmsg+0x9a0/0x9a0 [ 359.468469][T15193] ? __hrtimer_run_queues+0xa72/0xad0 [ 359.473687][T15193] ? restore_fpregs_from_fpstate+0xfc/0x230 [ 359.479408][T15193] ? __kasan_check_write+0x14/0x20 [ 359.484352][T15193] ? fpregs_restore_userregs+0x130/0x290 [ 359.489828][T15193] __x64_sys_sendmsg+0x7f/0x90 [ 359.494421][T15193] do_syscall_64+0x3d/0xb0 [ 359.498674][T15193] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 359.504314][T15193] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 359.510043][T15193] RIP: 0033:0x7f1cac07d0a9 [ 359.514296][T15193] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 359.533739][T15193] RSP: 002b:00007f1cacd190c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 359.541983][T15193] RAX: ffffffffffffffda RBX: 00007f1cac1b3f80 RCX: 00007f1cac07d0a9 [ 359.549794][T15193] RDX: 0000000000000003 RSI: 0000000020000980 RDI: 0000000000000004 [ 359.557606][T15193] RBP: 00007f1cac0ec074 R08: 0000000000000000 R09: 0000000000000000 [ 359.565417][T15193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 359.573228][T15193] R13: 000000000000000b R14: 00007f1cac1b3f80 R15: 00007ffdec429538 [ 359.581046][T15193] [ 359.583907][T15193] Modules linked in: [ 359.587652][T15193] CR2: 0000000000000000 [ 359.591631][T15193] ---[ end trace 0000000000000000 ]--- [ 359.596923][T15193] RIP: 0010:0x0 [ 359.600226][T15193] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 359.607425][T15193] RSP: 0018:ffffc90000f97908 EFLAGS: 00010246 [ 359.613329][T15193] RAX: 1ffff11021fc2217 RBX: ffff88810fe110b8 RCX: 0000000000040000 [ 359.621140][T15193] RDX: ffffc90001551000 RSI: 0000000000024376 RDI: ffff88813266c540 [ 359.628952][T15193] RBP: ffffc90000f97930 R08: ffffffff841d8447 R09: 0000000000000003 [ 359.636772][T15193] R10: ffffffffffffffff R11: dffffc0000000001 R12: 0000000000000004 [ 359.644573][T15193] R13: dffffc0000000000 R14: ffff88813266c540 R15: dffffc0000000000 [ 359.652384][T15193] FS: 00007f1cacd196c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 359.661150][T15193] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 359.667574][T15193] CR2: ffffffffffffffd6 CR3: 0000000145411000 CR4: 00000000003506b0 [ 359.675389][T15193] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 359.683196][T15193] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 359.691010][T15193] Kernel panic - not syncing: Fatal exception [ 359.697122][T15193] Kernel Offset: disabled [ 359.701247][T15193] Rebooting in 86400 seconds..