last executing test programs: 3.896788491s ago: executing program 1 (id=15529): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd63"], 0xfdef) recvmsg$unix(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000070018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) (fail_nth: 2) 3.356474645s ago: executing program 1 (id=15534): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0xc00, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (fail_nth: 2) 2.910478611s ago: executing program 1 (id=15539): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd"], 0xfdef) recvmsg$unix(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 2.699800648s ago: executing program 1 (id=15542): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000001300)=ANY=[@ANYBLOB="9f00000000000007000000000000006100202fc1721dd1e76927f966f69ec9ad77e33a132879260c364c99894d8cf390d57e1550a2d852ec69d6c93248ef5c952d1154ce6e1fae0519988bf1d960d3b0e179a9bce3a6897e4d37bd7a33d9a4ea26f4"], &(0x7f0000000300)=""/4096, 0x1f, 0x1000, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x7, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180006040000000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x4}, 0x90) close(0x3) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1ff, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x10e40, 0x8000000000000000, 0x0, 0x2, 0x6, 0x1, 0x5, 0x0, 0x8, 0x0, 0xc047}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000008000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000140000fbb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x2d) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x126, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f00000003c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x56}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.624456065s ago: executing program 2 (id=15545): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000370800000000d8f9ea1df8ffb40f0000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f600000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r2, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_devices(0xffffffffffffffff, 0x0, 0xffdd) 2.616219466s ago: executing program 4 (id=15546): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0xca, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000140)={0x3, 0x4, 0x4, 0xa, 0x0, r7, 0x80000001, '\x00', 0x0, r2, 0x0, 0x5, 0x5}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r7, r6, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r7}, &(0x7f0000000000), &(0x7f0000000080)=r4}, 0x20) sendmsg$inet(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000900)="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", 0xfffffd10}], 0x1}, 0x800) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r8, 0x1, 0xd, &(0x7f0000000040), 0x3b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) openat$cgroup_ro(r3, &(0x7f0000000100)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r9 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0xfdef) recvmsg$unix(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x161) write$cgroup_subtree(r10, &(0x7f0000000000)=ANY=[], 0xfdef) 2.43649151s ago: executing program 1 (id=15547): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_queued\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000ef7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x20000010) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r9}, 0x10) 2.398227873s ago: executing program 0 (id=15549): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007baaf8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x0, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000380)='mm_page_alloc\x00', r1}, 0x10) r2 = syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x1}, 0x0, 0xc8, 0xfffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x0, 0x0, 0x0, 0x0, 0x1005}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$TUNSETIFINDEX(r3, 0x400454da, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0x0}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x14, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007baaf8ff00000000b5080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r6}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYBLOB="cee134d9430685003c03533a9136132521767be93c4f844a975884a7779d7194645aac8a0d01f128d4464ca14d17caef2e4f995d63b99b45fdf8614a958ed77701d56b3a2965eb8cefdea62d1ae73bc03fbecb03c34f48fd72dde37d53baf95594212495ebdd9b40577ac5a30360f3a57c8989c9eca416fb9372d98797954d70fa2030303560", @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020018f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_open_procfs$namespace(r2, &(0x7f00000001c0)='ns/ipc\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2}, 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) 2.233885377s ago: executing program 1 (id=15551): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r0}, 0x4) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={r2, 0x58, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xfffffffffffffdec) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x19, 0x18, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000000000080000001811", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018410000f9ffffff0000000000000000186600000b0001000000010000000000850000009b0000001846000001000000000000000000000018580000010000000000000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f00000003c0)='GPL\x00', 0x4, 0x52, &(0x7f00000004c0)=""/82, 0x41100, 0x41, '\x00', r3, 0x2e, r2, 0x8, &(0x7f00000005c0)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000600)=[{0x0, 0x4, 0x0, 0x4}, {0x4, 0x3}, {0x0, 0x1, 0x9, 0x8}], 0x10, 0x8}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1, 0x0, 0x9, 0x3, 0x20, r0, 0xfffffff7, '\x00', r3, 0xffffffffffffffff, 0x5, 0x5}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x5, 0xc7, 0x2000d, 0x3681, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4, 0xa}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x5, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000cc0)=ANY=[], 0x0}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r9}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r8}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)=r4}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000800)={0x6, 0xa, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000061040000000000000900000018110000267c18151666427dc58e5748e32c13d553be12df0ead6e224910c20d6f02dbaca002370ddb7ac772d4193230f9a892e45ca0f46b2f6da7e1a2cb912f24504fde0edd478bda275e1392cb8096ef4d45cc36a254ba1d3b58cbd7a39d4ef8b899fab33fbaa3541784d6e50b7625efd7d6dcc7ab78ff65a4f7134caf8cbb66c3713816ea874556904be91b1e42a69bf006d8ce633272ba0fbc4b01eb9b475a150dc3678c43609d90d35fda29bed825855806d046f45a96d782e0f06cd30954c5190a02246e0f08ea3a2812", @ANYRES32=r10, @ANYBLOB="0000000000000000b7020000000000008500000086000000852000000400000018000000040000000000000000c803009500000000000000"], &(0x7f0000000200)='GPL\x00', 0xa, 0x0, 0x0, 0x40f00, 0x50, '\x00', r3, 0x25, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x1, 0x7, 0x1, 0x4}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000380)=[r11, r5, r7], &(0x7f00000006c0)=[{0x5, 0x4, 0x6, 0x4}], 0x10, 0x7}, 0x90) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) r13 = openat$cgroup(r10, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r13, &(0x7f00000001c0)='memory.events\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.197714069s ago: executing program 0 (id=15552): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000000000", @ANYRESHEX=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x0, 0x6, 0x0, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0), ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000380)=[0x0, 0x0], &(0x7f0000000680), 0x0, 0x8b, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000300), &(0x7f0000000880), 0x8, 0x6a, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1c, 0x80, 0x7fc, 0xfffffffc, 0x6, r1, 0x6, '\x00', 0x0, r3, 0x400005, 0x1}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0), 0x9) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000000)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x70}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0xfca804a0, 0x10, 0x10, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r5, &(0x7f0000000380)=ANY=[@ANYBLOB="1e031c003c5ca601288763608600000811"], 0xffdd) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1e, 0xe, &(0x7f0000000600)=ANY=[@ANYRESOCT=r2], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x20001400) close(r7) 2.06872055s ago: executing program 3 (id=15553): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x749c, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{}, &(0x7f0000000080), 0x0}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000200018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000a40)={{r3}, &(0x7f0000000940), &(0x7f0000000980)='%pB \x00'}, 0x20) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0xfffffffffffffffc, r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f00000000c0)='cpuset.memory_migrate\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0xeffd) r7 = openat$cgroup_procs(r5, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f0000000380), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r4}, 0x10) 1.855341478s ago: executing program 3 (id=15554): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x5, 0x6, 0x0, 0x2580, 0xffffffffffffffff, 0xffffad00, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x1000003, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) close(r2) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='mm_page_alloc\x00', r4}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xe) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e63"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r8, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r10}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r11, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000008c0)='H', 0x1}], 0x1}, 0x881) sendmsg$inet(r11, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)='u', 0x1}], 0x1, &(0x7f0000000a80)=ANY=[@ANYBLOB="78000000000000000000000007000000070fb27f000001e0000002ac1414bb8927cce0000002e0000001e0000001ffffffff00000000ac141423e00000017f000001ac14144300440cc401ac1e010100000fff94040100000bba416311049117549344142cb1e00000010000c6707f000001fffffc01000014000000000000000000000001000000f70c0000000000001c000000000000000000000008000000", @ANYRES32, @ANYBLOB="ffffffffffffffff0000000014000000000000000000000001000000090000000000000011000000000000000000000001000000b400000000000000110000000000000000000000010000007a000000000000001c"], 0x118}, 0x0) recvmsg(r12, &(0x7f0000000fc0)={0x0, 0x0, 0x0}, 0x0) 1.783797734s ago: executing program 3 (id=15555): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000370800000000d8f9ea1df8ffb40f0000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r5, r4, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r5}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) sendmsg$inet(r3, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) (fail_nth: 5) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_devices(0xffffffffffffffff, 0x0, 0xffdd) 1.742148137s ago: executing program 4 (id=15556): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuset.effective_cpus\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/249, 0xf9}], 0x1}, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) close(r1) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x66) 1.69715384s ago: executing program 2 (id=15566): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffff7f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100000100000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000200)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x0, 0x2b, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRESHEX, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x12}, 0x90) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r3, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000340)=r0}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r5, 0x58, &(0x7f0000000440)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1b}, {{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6, 0x2, 0x0, r4}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x749c, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.158542994s ago: executing program 0 (id=15557): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x103, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000002c0)=ANY=[], 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="850000007b0000003500000000000000850000000800000095000000"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x12, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xa}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000200)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000740)="2f74941211d895a2666d0a8cf14ec550c34d8ac9ac82ee3ce9033f358c07f7b9fbc3f36f0105b7aae9e50862abd0588c2873b350574432fcddd0426bd83ce2e0302b1ebddba95cc8b8affd1de97c913b7c73611c84985dc7628741799647b893bbe04a2d7254d403a8038ed48e80833a28fbdb431393cc02f4aea6515e8b013ff3fbecfcdde616325323e021a23f9ecaf833c05d55a3cb0205b81a44d73e99c20c07a203eef575af271bab482c0f909c8d37355d8f03eb885fbe38b9679a900bd10e90753e387d13775db99ebccb16c2f6dfec450f95972eca6b24b83a38f631464c2d2907182498c2dcbd002b16e2ff08c43cbb8141c072be901dbb5bd75b7d1dc6cbb8ee16225b4d27d3871dfa726dffbc77459f690e0ff5e4ae251911410ffca4536ce55b17f34f0a8629f520dd4d8067c1f5cf9f80e6dd68bcec6b8a065a55b52e1c9e53181ce438f7982ae22097379a59a7636e8ba79b9b00"/358, 0x166}], 0x1, 0x0, 0x0, 0x4}, 0x805) recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) close(r4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 1.158102855s ago: executing program 4 (id=15558): perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) socketpair(0x1, 0x8080f, 0xfffffffe, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8946, &(0x7f0000000900)={'syz_tun\x00', @random='\x00\x00\x00 \x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x5, 0x5, 0x2, 0x4}, 0x48) close(0x3) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000000), 0xc}, 0x110e00, 0x8000000000000000, 0x1, 0x2, 0x6, 0x401, 0x5, 0x0, 0x8, 0x0, 0xa9}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 913.463335ms ago: executing program 0 (id=15559): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001980)={{r0}, &(0x7f0000001780), &(0x7f0000001940)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000001700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x10, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000000c0), 0x10}, 0x90) 860.055619ms ago: executing program 3 (id=15560): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001600)=@base={0x9, 0x4, 0x3, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000580)=ANY=[], 0xfdef) (fail_nth: 5) 859.458649ms ago: executing program 4 (id=15561): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x5, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r4) close(r3) 858.858969ms ago: executing program 0 (id=15562): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_queued\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000ef7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x20000010) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r9}, 0x10) 852.13564ms ago: executing program 2 (id=15571): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x103, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000002c0)=ANY=[], 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="850000007b0000003500000000000000850000000800000095000000"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x12, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xa}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000200)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000740)="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"/358, 0x166}], 0x1, 0x0, 0x0, 0x4}, 0x805) recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) close(r4) 589.540281ms ago: executing program 3 (id=15563): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007baaf8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x0, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000380)='mm_page_alloc\x00', r1}, 0x10) r2 = syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x1}, 0x0, 0xc8, 0xfffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x0, 0x0, 0x0, 0x0, 0x1005}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$TUNSETIFINDEX(r3, 0x400454da, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0x0}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x14, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007baaf8ff00000000b5080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r6}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYBLOB="cee134d9430685003c03533a9136132521767be93c4f844a975884a7779d7194645aac8a0d01f128d4464ca14d17caef2e4f995d63b99b45fdf8614a958ed77701d56b3a2965eb8cefdea62d1ae73bc03fbecb03c34f48fd72dde37d53baf95594212495ebdd9b40577ac5a30360f3a57c8989c9eca416fb9372d98797954d70fa2030303560", @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020018f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_open_procfs$namespace(r2, &(0x7f00000001c0)='ns/ipc\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2}, 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) 587.476092ms ago: executing program 2 (id=15564): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x41000, 0x21}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e0000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000010"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x101) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'pim6reg1\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x324) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) sendmsg$tipc(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x0, 0x80, 0xb0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3500000000000000}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000200)={'ip6erspan0\x00', 0x400}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) 441.250624ms ago: executing program 3 (id=15565): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuset.effective_cpus\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/249, 0xf9}], 0x1}, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) close(r1) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) (fail_nth: 2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x66) 415.603586ms ago: executing program 0 (id=15567): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000370800000000d8f9ea1df8ffb40f0000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f600000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r2, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_devices(0xffffffffffffffff, 0x0, 0xffdd) 402.521457ms ago: executing program 4 (id=15568): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuset.effective_cpus\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x1, 0x4, 0x4}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000006007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000001000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000005000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r3}, 0xc) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/249, 0xf9}], 0x1}, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) close(r5) sendmsg$tipc(r6, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00'}, 0x80) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x66) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 401.834597ms ago: executing program 2 (id=15569): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0xffffff81, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xd4d}], 0x1}, 0x0) 330.584622ms ago: executing program 2 (id=15570): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000370800000000d8f9ea1df8ffb40f0000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f600000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r2, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_devices(0xffffffffffffffff, 0x0, 0xffdd) 0s ago: executing program 4 (id=15572): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18010000200000000000000000000000850000006d0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='tlb_flush\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='tlb_flush\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r6}, &(0x7f0000000040), &(0x7f0000000140)=r5}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffe1) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4020940d, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="b7020000f53f6314bfa300000000000024020000fffeff7f7a03f0fff0ffffff79a4f0ff00000000b7060000ffffffff2e64050000000000750afaff07cd02020404000000247d60b7030000030a00006a0a00fe0000000c8500000032000000b70000000000002995000000000000001da5ad3548ebb63d18c5071c7e821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c0ec908abb6e7325ec1956bd8660bf3664148a2c96752fe2bb328dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8ef040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdbb126eb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b782ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb9f35e4f41a6211e52bb3598e9b5d4f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75b0100000042127a8f84538a9a311c757f7169f006f3f5c95177fbd0b14b36259e2905ef911785c88a16aae46084d676d8ef8aa6ecc2d32e3f4ee367c5a769c0a606636c9f4a4413c098f4fcc96623b7c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c436432b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef100bbf76063d3f6ffffb73d70e9c3d7b90aecf48e7565efff2dbbb512218c98442406333c890923a797e00b75481739952fe87fde27ce81893f54ec0ea8e792414f639bc9ce1fea3f6ac0d7025759d4b45576c205c70631e8ad585951950e521f4e210b6494e3c52d927195737945cc03d5668483151710de246420a1b6c55b73876a6ed7fd0d9338923789a1edcd8043fe83919088383268324a25df14010c8ed6b8d43400eaa00ff9bc46e1cfecbdc0e451ac53b409d04544d3a7edd4d447d2fb431e226ae182b8dcc86fe09b404e0b7c723d3b19c3dc382fa91fb0fb8f9f3f13296bb1758b24aad0922091d49e2bc408a5a37deee7a60b903d2d9fe9d451cafcc8dc389671c2d08b6e264150a6b9445b00cee4585af04fa69e0380be0d66649dcf3bf8a906b029faca75ce34c41aec7aa86e596119109ea8b3f7c65c902499227c087301643baab1c95bb22cedd913b22dcaa197ccc34586dc50bd9f4628e3e77a0de32e356521df06f995cb57f97052fc4158250ccecfb67ea8faf509593fadc7eafb613327b052397af1ede94d87590ce90a0a7579766f0e5eb09d38ac46e99e7ec4fcd3cb0b1a8c531724d5ef6b334803cedaa9cedf16dc3af6e0b67f62a83a256474c97c925d9d447175b535c87dbdeb0dcca5303eed6689ea91e1665c691df736368dde47e6672e93a314c5f60e7b68c2242bd0f0d8c66449d8687dcf2d0f76668b2b9bf8b32b99b7daf34b2d825d192ade90a1162acfe9749d516d014cef5f99126324ea02baea5808c430985749901b09e4902a6f5addc0103756b894418e4591c624a9b206abbfb888d413d923b0d7c9d997d6d8e64787c4d397f57a15b6e0b4212b6cb55b9c207bbe08f483b1bea05f41b9a1d3af087047c568ae6ebfc0bb5ec10b6290dc757a4903a88fb2c035b2349b6d2f0c051b8b7718384eebd5fc19928cea713ff09e179c308fbe9bd64374d96ef2447a2a4af5ca0c39e7ca2e801e57560a55e9cfa095cf3f74398219ad1030a79517a88de7596429a20793e12616aa32b3e720c6521fbe93963e9536d16f3db211fca7dd99c0a0125ff8ef534b93dcb34e1da2c008a9f2a29e30823bf0ec3639cadaf9be9608358e1e5ab17eea477b1754f78f45468c9568471667f82f5e250b979b9f2bd0d1b6bc03d11811ac6eec9a3ecd9e3c3299ee5eb3c6cac8fbd06514b7ee743ece79c04566d02a08fd5fcabbab3d129c0cced3ce11dafa380700000000000000c114d0b423e64c6157fac5e4e2168f33541daeff9983d0e488a78bef538f870b84798272b2101e0abf1cd64500b79e01e11d727389653bd80a39d5bbe2e23d2f5ff10047423429981bd9b4ce680e174c266391e3e7689452654e5cd5ada6e025327a1942b5a068f15fa58eaa267d4e0881783dddbdd777f8be0824ffdf6d06c621880dbbe9534f15e8c2e364d3ec67deb6ab9f2a0f03212972dbd38500000008173553a67be48633103809eee0be51d67d7ce230b389607b4c3b18da1c48f3180f2e0d79e54565fdd9a099b5b5ba2761905b88b7cbfc39c35dd153609da3da263438f12769602c2195245ff83e249119d4f6cabfbdef84ada19ef4a67ed66d7043036515d0be5a231f99e71aba5d5ae04676eff3e85f0844c41bbcfde7a931d1ec55c01f703bfd1b97756bfe55a91f6b379f34a018906339771157c66dbd7471d1beec7f029ef552cf5e92a1a0db21b59355763967ce26a577bc514b6d22a09c385c5ba6caf524e1688fc0f29f8bb35ae7bc8eb5ba51aebdf7d972c3267cedbe77ed70d9c539bc455a6f88b39196c8a224b0acf4d796fea59a07baa34cc270fb096ef330fbebdf872d7d0bc4f9a963355c554abc5cdb91464faabcd09cd9a53f5d1b2ea7e96f428f7cd6735c19c61dc9942d30bf29ef85ed01c2fcd6060aa40eeff971477b4fde48507b7bad95a496540adff7e4a72fd1f94d7c703ab1525c946c54e0da3d7ebfcc8cea2e84c3b310aaea5a1627df898c00a9aaf2d88a36afa4c5b1816384310600001c33125ad7f7970beeb256aec06e39fc6c66544e1d1dc5fea4b68a82e3568ca30aea9a1d097f06f11dc362f4bae5ef57c67686a15855cd351bf26f40fb1348cfce79897682228e6d9643530c81bab27bf7b1c4a76a5be180bb830cf06827c3f38a9c9c580c732c30aaceda78b0297de35a922b1375b129655beb31899e26052cc216f832fdb0a0015f93c9cff77f59cda1ec5f3e358848756cebb074266a47e39ae26e80e8c65aaf73c24925458520a9ca98760d1005c9f81846459ae6d5baa4f02807939ddc29c3520f7c58ed9bc5a569c7a1bc33cf4f330a18276ffb4550b9166c3939e8041094bec034aa0ec6638b74fe34f0f1ec6903a1135808d5d8d26c9203c3f87e66c407b7c5c0888d4558dd657cc0213efad68e76fdd7b23e68064fd4b271ed79c50abacdd2871b0c1f8c971df59a5a1901ddf804bed43e391f882d2a45c51cdbba86b2a1b7c0c4923642a731ea4dcbad2b6ebbebe787a8e28e781d75beee924b3b1e390750f316648133922c021f98fd2d5d71a7a3679397ef6cf432837b7e264831ec01c4c3146ba0caac3b13d55945ec00e978a1c1712cd51187936200606c9cd6877b2f72125295c54721f8e15df2ae282a8becb99a726fd92acc92141e1f574b4b0b3c992a61af3372d0d9217776b1a42cd2cee816a70bf1ddd69b590d53e28ba356e74b38e23e50d898e95cdc7cc809e462c884b53f672aab1411ecfd4c91e7a9782fc6763f0efd4bcbaf1fc3a00000000000000000000000000000000500000000000000000000000048e510340087caf22439d5304bd704a6a78a512269a9b1cbd13bea78c807bbc73853ae187cbb768673e9d1bf74a3b0a6c234accd8506adf314f4c5e08174540b69d3c0da660052b43b86baf49e7ac64d9c21598b1e01dc1e1b5a53626b090496dbf7af441e397016c3c094d5c91ffe0a7ceacfd225ed9a6c905f79ad7052747dd6cceef4c310e0e935311118bc6bf0e5ca6c7cca7d5c03be570308da8a40578b4db14961fbccf6e2f2d56e9509c434126515b56d032e20c12e830d1bc64826fc9b318da5911e466878dbb81edeff69363fb75af5cd80536f14d2eaa7764db23acdbd394bbbbccfd8b129258bb0a93cee1d44f8665172c06933d20f184b78b435462c52a85149451ffd564c56a7cbf11a1127c77242915e43b2bc"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r7}, 0x10) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[], 0xfdef) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): 1 PID: 29818 Comm: syz.2.11191 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 1279.076734][T29818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1279.086630][T29818] Call Trace: [ 1279.089752][T29818] [ 1279.092529][T29818] dump_stack_lvl+0x151/0x1b7 [ 1279.097042][T29818] ? io_uring_drop_tctx_refs+0x190/0x190 [ 1279.102509][T29818] ? kmem_cache_free+0x116/0x2e0 [ 1279.107282][T29818] dump_stack+0x15/0x17 [ 1279.111277][T29818] should_fail+0x3c6/0x510 [ 1279.115529][T29818] should_fail_usercopy+0x1a/0x20 [ 1279.120387][T29818] _copy_from_user+0x20/0xd0 [ 1279.124815][T29818] __copy_msghdr_from_user+0xaf/0x7c0 [ 1279.130026][T29818] ? __ia32_sys_shutdown+0x70/0x70 [ 1279.134973][T29818] ___sys_sendmsg+0x166/0x2e0 [ 1279.139572][T29818] ? __sys_sendmsg+0x260/0x260 [ 1279.144182][T29818] ? __fdget+0x1bc/0x240 [ 1279.148339][T29818] __se_sys_sendmsg+0x19a/0x260 [ 1279.153023][T29818] ? __x64_sys_sendmsg+0x90/0x90 [ 1279.157795][T29818] ? ksys_write+0x260/0x2c0 [ 1279.162137][T29818] ? debug_smp_processor_id+0x17/0x20 [ 1279.167343][T29818] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1279.173331][T29818] __x64_sys_sendmsg+0x7b/0x90 [ 1279.177930][T29818] do_syscall_64+0x3d/0xb0 [ 1279.182183][T29818] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1279.187912][T29818] RIP: 0033:0x7fd52952a9f9 [ 1279.192163][T29818] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1279.211782][T29818] RSP: 002b:00007fd528189038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1279.220025][T29818] RAX: ffffffffffffffda RBX: 00007fd5296b9058 RCX: 00007fd52952a9f9 [ 1279.227838][T29818] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000008 [ 1279.235648][T29818] RBP: 00007fd528189090 R08: 0000000000000000 R09: 0000000000000000 [ 1279.243461][T29818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1279.251269][T29818] R13: 0000000000000000 R14: 00007fd5296b9058 R15: 00007fff3c232528 [ 1279.259088][T29818] [ 1280.197836][T29836] bridge0: port 2(bridge_slave_1) entered disabled state [ 1280.204962][T29836] bridge0: port 1(bridge_slave_0) entered disabled state [ 1280.262749][T29840] bridge0: port 2(bridge_slave_1) entered blocking state [ 1280.269961][T29840] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1280.278491][T29840] bridge0: port 1(bridge_slave_0) entered blocking state [ 1280.285641][T29840] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1280.294865][T29840] device bridge0 entered promiscuous mode [ 1287.845430][ T30] audit: type=1400 audit(1723089788.707:148): avc: denied { create } for pid=29940 comm="syz.2.11224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1288.760217][T29955] device syzkaller0 entered promiscuous mode [ 1289.542668][T29981] device pim6reg1 entered promiscuous mode [ 1292.174390][T30026] FAULT_INJECTION: forcing a failure. [ 1292.174390][T30026] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1292.426444][T30026] CPU: 1 PID: 30026 Comm: syz.3.11248 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 1292.436446][T30026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1292.446344][T30026] Call Trace: [ 1292.449464][T30026] [ 1292.452241][T30026] dump_stack_lvl+0x151/0x1b7 [ 1292.456754][T30026] ? io_uring_drop_tctx_refs+0x190/0x190 [ 1292.462481][T30026] ? bpf_test_run+0x8de/0xa10 [ 1292.467005][T30026] dump_stack+0x15/0x17 [ 1292.470987][T30026] should_fail+0x3c6/0x510 [ 1292.475243][T30026] should_fail_usercopy+0x1a/0x20 [ 1292.480101][T30026] _copy_to_user+0x20/0x90 [ 1292.484354][T30026] bpf_test_finish+0x265/0x5a0 [ 1292.488956][T30026] ? convert_skb_to___skb+0x360/0x360 [ 1292.494164][T30026] ? convert_skb_to___skb+0x208/0x360 [ 1292.499369][T30026] bpf_prog_test_run_skb+0xd4d/0x1420 [ 1292.504662][T30026] ? __kasan_check_write+0x14/0x20 [ 1292.509624][T30026] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 1292.515349][T30026] ? __kasan_check_write+0x14/0x20 [ 1292.520287][T30026] ? fput_many+0x160/0x1b0 [ 1292.524536][T30026] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 1292.530267][T30026] bpf_prog_test_run+0x3b0/0x630 [ 1292.535043][T30026] ? bpf_prog_query+0x220/0x220 [ 1292.539726][T30026] ? selinux_bpf+0xd2/0x100 [ 1292.544067][T30026] ? security_bpf+0x82/0xb0 [ 1292.548408][T30026] __sys_bpf+0x525/0x760 [ 1292.552483][T30026] ? fput_many+0x160/0x1b0 [ 1292.556739][T30026] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1292.561951][T30026] ? debug_smp_processor_id+0x17/0x20 [ 1292.567150][T30026] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1292.573144][T30026] __x64_sys_bpf+0x7c/0x90 [ 1292.577397][T30026] do_syscall_64+0x3d/0xb0 [ 1292.581649][T30026] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1292.587466][T30026] RIP: 0033:0x7f33b28649f9 [ 1292.591714][T30026] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1292.611156][T30026] RSP: 002b:00007f33b14e4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1292.619400][T30026] RAX: ffffffffffffffda RBX: 00007f33b29f2f80 RCX: 00007f33b28649f9 [ 1292.627301][T30026] RDX: 0000000000000048 RSI: 0000000020000900 RDI: 000000000000000a [ 1292.635109][T30026] RBP: 00007f33b14e4090 R08: 0000000000000000 R09: 0000000000000000 [ 1292.642920][T30026] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1292.650730][T30026] R13: 0000000000000000 R14: 00007f33b29f2f80 R15: 00007ffd65d9d408 [ 1292.658554][T30026] [ 1295.033509][T30073] bridge0: port 2(bridge_slave_1) entered disabled state [ 1295.040485][T30073] bridge0: port 1(bridge_slave_0) entered disabled state [ 1295.055584][T30073] device bridge0 left promiscuous mode [ 1295.149995][T30073] bridge0: port 2(bridge_slave_1) entered blocking state [ 1295.157043][T30073] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1295.165224][T30073] bridge0: port 1(bridge_slave_0) entered blocking state [ 1295.172544][T30073] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1295.198133][T30073] device bridge0 entered promiscuous mode [ 1296.739444][ T30] audit: type=1400 audit(1723089797.607:149): avc: denied { create } for pid=30099 comm="syz.4.11271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1302.732398][T30214] bridge0: port 2(bridge_slave_1) entered disabled state [ 1302.739357][T30214] bridge0: port 1(bridge_slave_0) entered disabled state [ 1302.748759][T30214] device bridge0 left promiscuous mode [ 1302.839734][T30214] bridge0: port 2(bridge_slave_1) entered blocking state [ 1302.846814][T30214] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1302.856616][T30214] bridge0: port 1(bridge_slave_0) entered blocking state [ 1302.863965][T30214] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1303.393647][T30214] device bridge0 entered promiscuous mode [ 1313.244141][T30473] FAULT_INJECTION: forcing a failure. [ 1313.244141][T30473] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1313.257134][T30473] CPU: 0 PID: 30473 Comm: syz.1.11388 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 1313.267014][T30473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1313.276903][T30473] Call Trace: [ 1313.280027][T30473] [ 1313.282931][T30473] dump_stack_lvl+0x151/0x1b7 [ 1313.287438][T30473] ? io_uring_drop_tctx_refs+0x190/0x190 [ 1313.292906][T30473] dump_stack+0x15/0x17 [ 1313.296897][T30473] should_fail+0x3c6/0x510 [ 1313.301158][T30473] should_fail_usercopy+0x1a/0x20 [ 1313.306011][T30473] _copy_from_user+0x20/0xd0 [ 1313.310530][T30473] bpf_test_init+0x13b/0x1b0 [ 1313.314954][T30473] bpf_prog_test_run_skb+0x268/0x1420 [ 1313.320157][T30473] ? __kasan_check_write+0x14/0x20 [ 1313.325104][T30473] ? proc_fail_nth_write+0x20b/0x290 [ 1313.330225][T30473] ? selinux_file_permission+0x2c4/0x570 [ 1313.335695][T30473] ? proc_fail_nth_read+0x210/0x210 [ 1313.340725][T30473] ? fsnotify_perm+0x6a/0x5d0 [ 1313.345246][T30473] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 1313.350971][T30473] ? __kasan_check_write+0x14/0x20 [ 1313.355917][T30473] ? fput_many+0x160/0x1b0 [ 1313.360191][T30473] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 1313.365895][T30473] bpf_prog_test_run+0x3b0/0x630 [ 1313.370671][T30473] ? bpf_prog_query+0x220/0x220 [ 1313.375360][T30473] ? selinux_bpf+0xd2/0x100 [ 1313.379696][T30473] ? security_bpf+0x82/0xb0 [ 1313.384039][T30473] __sys_bpf+0x525/0x760 [ 1313.388117][T30473] ? fput_many+0x160/0x1b0 [ 1313.392367][T30473] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1313.397579][T30473] ? debug_smp_processor_id+0x17/0x20 [ 1313.402785][T30473] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1313.408684][T30473] __x64_sys_bpf+0x7c/0x90 [ 1313.412936][T30473] do_syscall_64+0x3d/0xb0 [ 1313.417191][T30473] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1313.422920][T30473] RIP: 0033:0x7fcdd0a369f9 [ 1313.427175][T30473] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1313.446611][T30473] RSP: 002b:00007fcdcf6b6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1313.454862][T30473] RAX: ffffffffffffffda RBX: 00007fcdd0bc4f80 RCX: 00007fcdd0a369f9 [ 1313.462669][T30473] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 1313.470479][T30473] RBP: 00007fcdcf6b6090 R08: 0000000000000000 R09: 0000000000000000 [ 1313.478294][T30473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1313.486101][T30473] R13: 0000000000000000 R14: 00007fcdd0bc4f80 R15: 00007fff9bc69898 [ 1313.493933][T30473] [ 1317.264079][T30536] FAULT_INJECTION: forcing a failure. [ 1317.264079][T30536] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1317.325173][T30536] CPU: 1 PID: 30536 Comm: syz.2.11410 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 1317.335084][T30536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1317.344992][T30536] Call Trace: [ 1317.348104][T30536] [ 1317.350879][T30536] dump_stack_lvl+0x151/0x1b7 [ 1317.355394][T30536] ? io_uring_drop_tctx_refs+0x190/0x190 [ 1317.360872][T30536] dump_stack+0x15/0x17 [ 1317.364853][T30536] should_fail+0x3c6/0x510 [ 1317.369108][T30536] should_fail_usercopy+0x1a/0x20 [ 1317.373967][T30536] _copy_from_user+0x20/0xd0 [ 1317.378397][T30536] bpf_test_init+0x13b/0x1b0 [ 1317.382956][T30536] bpf_prog_test_run_skb+0x268/0x1420 [ 1317.388112][T30536] ? __kasan_check_write+0x14/0x20 [ 1317.393063][T30536] ? proc_fail_nth_write+0x20b/0x290 [ 1317.398180][T30536] ? selinux_file_permission+0x2c4/0x570 [ 1317.403650][T30536] ? proc_fail_nth_read+0x210/0x210 [ 1317.408682][T30536] ? fsnotify_perm+0x6a/0x5d0 [ 1317.413273][T30536] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 1317.418926][T30536] ? __kasan_check_write+0x14/0x20 [ 1317.423991][T30536] ? fput_many+0x160/0x1b0 [ 1317.428244][T30536] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 1317.433969][T30536] bpf_prog_test_run+0x3b0/0x630 [ 1317.438748][T30536] ? bpf_prog_query+0x220/0x220 [ 1317.443431][T30536] ? selinux_bpf+0xd2/0x100 [ 1317.447770][T30536] ? security_bpf+0x82/0xb0 [ 1317.452109][T30536] __sys_bpf+0x525/0x760 [ 1317.456187][T30536] ? fput_many+0x160/0x1b0 [ 1317.460439][T30536] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1317.465653][T30536] ? debug_smp_processor_id+0x17/0x20 [ 1317.470866][T30536] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1317.476759][T30536] __x64_sys_bpf+0x7c/0x90 [ 1317.481009][T30536] do_syscall_64+0x3d/0xb0 [ 1317.485263][T30536] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1317.490993][T30536] RIP: 0033:0x7fd52952a9f9 [ 1317.495243][T30536] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1317.514685][T30536] RSP: 002b:00007fd5281aa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1317.522923][T30536] RAX: ffffffffffffffda RBX: 00007fd5296b8f80 RCX: 00007fd52952a9f9 [ 1317.530736][T30536] RDX: 000000000000001e RSI: 0000000020000080 RDI: 000000000000000a [ 1317.538545][T30536] RBP: 00007fd5281aa090 R08: 0000000000000000 R09: 0000000000000000 [ 1317.546358][T30536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1317.554170][T30536] R13: 0000000000000000 R14: 00007fd5296b8f80 R15: 00007fff3c232528 [ 1317.562005][T30536] [ 1323.508080][T30772] device syzkaller0 entered promiscuous mode [ 1326.064541][T30848] device syzkaller0 entered promiscuous mode [ 1326.459075][T30869] device syzkaller0 entered promiscuous mode [ 1326.526944][ T30] audit: type=1400 audit(1723089827.387:150): avc: denied { create } for pid=30873 comm="syz.1.11538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1327.082997][T30914] device syzkaller0 entered promiscuous mode [ 1327.295789][T30923] device syzkaller0 entered promiscuous mode [ 1327.996691][ T30] audit: type=1400 audit(1723089828.857:151): avc: denied { ioctl } for pid=30952 comm="syz.0.11571" path="socket:[144305]" dev="sockfs" ino=144305 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1328.296408][T30959] device wg2 entered promiscuous mode [ 1328.614243][T30979] device syzkaller0 entered promiscuous mode [ 1329.494648][T31019] device syzkaller0 entered promiscuous mode [ 1330.325085][T31064] device syzkaller0 entered promiscuous mode [ 1330.402183][T31068] syz.2.11617[31068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1330.402260][T31068] syz.2.11617[31068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1333.078788][T31084] device wg2 entered promiscuous mode [ 1333.105997][T31066] bridge0: port 1(bridge_slave_0) entered blocking state [ 1333.132474][T31066] bridge0: port 1(bridge_slave_0) entered disabled state [ 1333.141296][T31066] device bridge_slave_0 entered promiscuous mode [ 1333.167826][T31066] bridge0: port 2(bridge_slave_1) entered blocking state [ 1333.175137][T31066] bridge0: port 2(bridge_slave_1) entered disabled state [ 1333.184170][T31066] device bridge_slave_1 entered promiscuous mode [ 1333.206053][T31108] syz.0.11633[31108] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1333.206121][T31108] syz.0.11633[31108] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1333.206841][T31101] device syzkaller0 entered promiscuous mode [ 1333.481232][T31066] bridge0: port 2(bridge_slave_1) entered blocking state [ 1333.488133][T31066] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1333.546569][T10817] bridge0: port 2(bridge_slave_1) entered disabled state [ 1333.557426][T10817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1333.576576][T10817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1333.676163][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1333.687276][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1333.708987][ T297] bridge0: port 1(bridge_slave_0) entered blocking state [ 1333.715866][ T297] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1333.738151][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1333.750761][ T297] bridge0: port 2(bridge_slave_1) entered blocking state [ 1333.757666][ T297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1333.825892][T10817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1333.834288][T10817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1333.862274][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1333.884025][T31066] device veth0_vlan entered promiscuous mode [ 1333.899705][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1333.908506][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1333.915841][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1333.950171][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1333.961052][T31066] device veth1_macvtap entered promiscuous mode [ 1333.987991][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1334.004801][T10817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1334.213015][T31143] device syzkaller0 entered promiscuous mode [ 1334.635702][T31144] bridge0: port 1(bridge_slave_0) entered blocking state [ 1334.647167][T31144] bridge0: port 1(bridge_slave_0) entered disabled state [ 1334.655048][T31144] device bridge_slave_0 entered promiscuous mode [ 1334.666524][T31144] bridge0: port 2(bridge_slave_1) entered blocking state [ 1334.673557][T31144] bridge0: port 2(bridge_slave_1) entered disabled state [ 1334.680865][T31144] device bridge_slave_1 entered promiscuous mode [ 1334.965451][ T10] device bridge_slave_1 left promiscuous mode [ 1334.978086][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 1335.034146][ T10] device O3ãc¤± left promiscuous mode [ 1335.075209][ T10] bridge0: port 1(O3ãc¤±) entered disabled state [ 1335.131561][ T10] device veth0_vlan left promiscuous mode [ 1335.665708][T31184] device syzkaller0 entered promiscuous mode [ 1335.955647][ T7311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1335.963668][ T7311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1336.073756][T22402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1336.083785][T22402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1336.091842][T22402] bridge0: port 1(bridge_slave_0) entered blocking state [ 1336.098703][T22402] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1336.106844][T22402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1336.115321][T22402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1336.123649][T22402] bridge0: port 2(bridge_slave_1) entered blocking state [ 1336.130529][T22402] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1336.138109][T22402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1336.301190][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1336.309916][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1336.396897][T31144] device veth0_vlan entered promiscuous mode [ 1336.403391][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1336.412007][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1336.486087][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1336.515105][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1336.594980][T31144] device veth1_macvtap entered promiscuous mode [ 1336.607522][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1336.614849][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1336.707387][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1336.715461][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1336.727400][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1336.812050][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1336.820544][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1336.828843][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1336.837083][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1336.876840][T31227] syz.2.11645[31227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1336.876919][T31227] syz.2.11645[31227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1337.663602][T31260] syz.3.11688[31260] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1337.675165][T31260] syz.3.11688[31260] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1337.685313][T31255] device syzkaller0 entered promiscuous mode [ 1338.139509][ T10] device bridge_slave_1 left promiscuous mode [ 1338.145520][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 1338.252857][ T10] device bridge_slave_0 left promiscuous mode [ 1338.260936][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 1338.295146][ T10] device veth1_macvtap left promiscuous mode [ 1338.302695][ T10] device veth0_vlan left promiscuous mode [ 1338.538688][T31290] syz.3.11700[31290] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1338.538764][T31290] syz.3.11700[31290] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1338.711212][T31299] device syzkaller0 entered promiscuous mode [ 1339.556167][T31320] syz.1.11711[31320] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1339.556257][T31320] syz.1.11711[31320] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1339.868194][T31334] device syzkaller0 entered promiscuous mode [ 1340.648183][T31358] syz.3.11725[31358] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1340.648260][T31358] syz.3.11725[31358] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1347.874788][T31510] device syzkaller0 entered promiscuous mode [ 1357.888462][T31800] syz.3.11889[31800] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1357.888533][T31800] syz.3.11889[31800] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1358.836561][T31834] syz.0.11902[31834] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1358.850360][T31834] syz.0.11902[31834] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1359.251329][T31853] device syzkaller0 entered promiscuous mode [ 1360.141114][T31907] device syzkaller0 entered promiscuous mode [ 1361.033819][T31945] device syzkaller0 entered promiscuous mode [ 1361.876981][T31981] syz.1.11960[31981] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1361.877063][T31981] syz.1.11960[31981] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1362.301607][T31999] device syzkaller0 entered promiscuous mode [ 1362.407707][T32015] syz.0.11975[32015] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1362.407785][T32015] syz.0.11975[32015] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1363.261647][T32051] syz.3.11988[32051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1363.272596][T32046] device syzkaller0 entered promiscuous mode [ 1363.297249][T32051] syz.3.11988[32051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1367.741241][T32215] device syzkaller0 entered promiscuous mode [ 1372.060949][T32428] bridge0: port 1(bridge_slave_0) entered blocking state [ 1372.067891][T32428] bridge0: port 1(bridge_slave_0) entered disabled state [ 1372.075318][T32428] device bridge_slave_0 entered promiscuous mode [ 1372.082632][T32428] bridge0: port 2(bridge_slave_1) entered blocking state [ 1372.102976][T32428] bridge0: port 2(bridge_slave_1) entered disabled state [ 1372.187513][T32428] device bridge_slave_1 entered promiscuous mode [ 1373.012149][T32466] device syzkaller0 entered promiscuous mode [ 1373.395537][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1373.404461][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1373.535707][ T947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1373.545622][ T947] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1373.569487][ T947] bridge0: port 1(bridge_slave_0) entered blocking state [ 1373.576403][ T947] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1373.583979][ T947] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1373.592232][ T947] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1373.600897][ T947] bridge0: port 2(bridge_slave_1) entered blocking state [ 1373.607789][ T947] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1373.615455][ T947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1373.627059][ T947] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1373.634995][ T947] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1373.643308][ T947] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1373.652923][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1373.696785][T32428] device veth0_vlan entered promiscuous mode [ 1373.781461][T22402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1373.803503][T22402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1373.816238][T22402] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1373.851172][T22402] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1373.977881][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1373.986396][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1373.996168][T32428] device veth1_macvtap entered promiscuous mode [ 1374.144537][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1374.152329][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1374.160828][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1374.211366][T22402] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1374.219833][T22402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1375.109446][ T335] device bridge_slave_1 left promiscuous mode [ 1375.135936][ T335] bridge0: port 2(bridge_slave_1) entered disabled state [ 1375.186184][ T335] device bridge_slave_0 left promiscuous mode [ 1375.203134][ T335] bridge0: port 1(bridge_slave_0) entered disabled state [ 1375.265572][ T335] device veth1_macvtap left promiscuous mode [ 1375.285671][ T335] device veth0_vlan left promiscuous mode [ 1375.674095][T32521] device syzkaller0 entered promiscuous mode [ 1376.675655][T32571] device syzkaller0 entered promiscuous mode [ 1379.298290][T32617] bridge0: port 1(bridge_slave_0) entered blocking state [ 1379.305158][T32617] bridge0: port 1(bridge_slave_0) entered disabled state [ 1379.350933][T32617] device bridge_slave_0 entered promiscuous mode [ 1379.457809][T32617] bridge0: port 2(bridge_slave_1) entered blocking state [ 1379.501488][T32617] bridge0: port 2(bridge_slave_1) entered disabled state [ 1379.558431][T32617] device bridge_slave_1 entered promiscuous mode [ 1380.313248][T23735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1380.344625][T23735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1380.475347][T32683] device syzkaller0 entered promiscuous mode [ 1380.482082][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1380.490336][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1380.498700][T29413] bridge0: port 1(bridge_slave_0) entered blocking state [ 1380.505543][T29413] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1380.514901][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1380.523357][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1380.531392][T29413] bridge0: port 2(bridge_slave_1) entered blocking state [ 1380.538256][T29413] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1380.547079][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1380.755163][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1380.781378][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1380.818586][T10817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1380.831644][T32617] device veth0_vlan entered promiscuous mode [ 1380.841473][T10817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1380.862521][T32617] device veth1_macvtap entered promiscuous mode [ 1380.874848][T23735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1380.883337][T23735] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1380.894780][T23735] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1380.907173][T32490] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1380.915801][T32490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1380.943065][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1380.958980][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1381.301384][T32728] device syzkaller0 entered promiscuous mode [ 1381.319217][T32726] device syzkaller0 entered promiscuous mode [ 1382.144771][ T335] device bridge_slave_1 left promiscuous mode [ 1382.154103][ T335] bridge0: port 2(bridge_slave_1) entered disabled state [ 1382.163229][ T335] device bridge_slave_0 left promiscuous mode [ 1382.169283][ T335] bridge0: port 1(bridge_slave_0) entered disabled state [ 1382.177371][ T335] device veth0_vlan left promiscuous mode [ 1385.991114][ T456] device syzkaller0 entered promiscuous mode [ 1387.746838][ T503] device syzkaller0 entered promiscuous mode [ 1388.723647][ T553] device syzkaller0 entered promiscuous mode [ 1389.780852][ T623] device syzkaller0 entered promiscuous mode [ 1390.436021][ T671] device syzkaller0 entered promiscuous mode [ 1390.505179][ T673] device syzkaller0 entered promiscuous mode [ 1391.455359][ T724] device syzkaller0 entered promiscuous mode [ 1391.881841][ T745] device syzkaller0 entered promiscuous mode [ 1392.430641][ T780] device syzkaller0 entered promiscuous mode [ 1392.575122][ T785] device syzkaller0 entered promiscuous mode [ 1393.163582][ T822] device syzkaller0 entered promiscuous mode [ 1395.001264][ T870] bridge0: port 1(bridge_slave_0) entered blocking state [ 1395.008164][ T870] bridge0: port 1(bridge_slave_0) entered disabled state [ 1395.015312][ T870] device bridge_slave_0 entered promiscuous mode [ 1395.037176][ T870] bridge0: port 2(bridge_slave_1) entered blocking state [ 1395.044086][ T870] bridge0: port 2(bridge_slave_1) entered disabled state [ 1395.051440][ T870] device bridge_slave_1 entered promiscuous mode [ 1395.176600][T32490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1395.184136][T32490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1395.193626][T23735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1395.202033][T23735] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1395.210866][T23735] bridge0: port 1(bridge_slave_0) entered blocking state [ 1395.217735][T23735] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1395.224925][T19415] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1395.268104][T19415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1395.276282][T19415] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1395.397221][T19415] bridge0: port 2(bridge_slave_1) entered blocking state [ 1395.404084][T19415] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1395.411553][T19415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1395.419402][T19415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1395.448482][ T870] device veth0_vlan entered promiscuous mode [ 1395.478223][T19415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1395.486448][T19415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1395.495168][T19415] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1395.502608][T19415] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1395.562016][T22402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1395.599955][ T870] device veth1_macvtap entered promiscuous mode [ 1395.658105][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1395.687552][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1396.775822][ T909] device syzkaller0 entered promiscuous mode [ 1397.379435][ T335] device bridge_slave_1 left promiscuous mode [ 1397.420298][ T335] bridge0: port 2(bridge_slave_1) entered disabled state [ 1397.466602][ T335] device bridge_slave_0 left promiscuous mode [ 1397.488723][ T335] bridge0: port 1(bridge_slave_0) entered disabled state [ 1397.591387][ T335] device veth0_vlan left promiscuous mode [ 1398.508237][ T968] device syzkaller0 entered promiscuous mode [ 1398.943809][ T986] device syzkaller0 entered promiscuous mode [ 1400.596081][ T1019] device syzkaller0 entered promiscuous mode [ 1402.164809][ T1051] device syzkaller0 entered promiscuous mode [ 1403.492391][ T1086] device syzkaller0 entered promiscuous mode [ 1403.886168][ T1093] device syzkaller0 entered promiscuous mode [ 1403.998449][ T1096] device syzkaller0 entered promiscuous mode [ 1405.226873][ T1123] device syzkaller0 entered promiscuous mode [ 1405.568746][ T1135] device syzkaller0 entered promiscuous mode [ 1406.574255][ T1163] device syzkaller0 entered promiscuous mode [ 1408.402517][ T1206] device syzkaller0 entered promiscuous mode [ 1409.778857][ T1231] device syzkaller0 entered promiscuous mode [ 1413.653815][ T1290] device syzkaller0 entered promiscuous mode [ 1414.483424][ T1302] device syzkaller0 entered promiscuous mode [ 1415.145548][ T1328] device syzkaller0 entered promiscuous mode [ 1416.386346][ T1352] device syzkaller0 entered promiscuous mode [ 1418.404942][ T1398] device syzkaller0 entered promiscuous mode [ 1418.430026][ T1399] device syzkaller0 entered promiscuous mode [ 1420.132822][ T1452] device syzkaller0 entered promiscuous mode [ 1421.339246][ T1484] device syzkaller0 entered promiscuous mode [ 1422.792010][ T1521] device syzkaller0 entered promiscuous mode [ 1423.620089][ T1531] device syzkaller0 entered promiscuous mode [ 1423.892954][ T1536] device syzkaller0 entered promiscuous mode [ 1424.135849][ T1543] device syzkaller0 entered promiscuous mode [ 1425.390604][ T1576] device syzkaller0 entered promiscuous mode [ 1425.834178][ T1589] device syzkaller0 entered promiscuous mode [ 1426.950730][ T1624] device syzkaller0 entered promiscuous mode [ 1428.495988][ T1669] device syzkaller0 entered promiscuous mode [ 1428.705955][ T1676] device syzkaller0 entered promiscuous mode [ 1430.115422][ T1715] device syzkaller0 entered promiscuous mode [ 1434.159249][ T1814] device syzkaller0 entered promiscuous mode [ 1437.025917][ T1884] device syzkaller0 entered promiscuous mode [ 1438.080375][ T1907] device syzkaller0 entered promiscuous mode [ 1439.302302][ T1940] device syzkaller0 entered promiscuous mode [ 1442.451364][ T2011] device syzkaller0 entered promiscuous mode [ 1444.500260][ T2065] device syzkaller0 entered promiscuous mode [ 1445.535580][ T2081] device syzkaller0 entered promiscuous mode [ 1447.323420][ T2108] device syzkaller0 entered promiscuous mode [ 1450.095014][ T2154] device syzkaller0 entered promiscuous mode [ 1451.181342][ T2178] device syzkaller0 entered promiscuous mode [ 1452.084343][ T2205] device syzkaller0 entered promiscuous mode [ 1453.229651][ T2223] device syzkaller0 entered promiscuous mode [ 1454.788377][ T2251] device syzkaller0 entered promiscuous mode [ 1457.237818][ T2295] syz.2.13009[2295] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1457.237891][ T2295] syz.2.13009[2295] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1459.035613][ T2332] syz.4.13022[2332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1459.047874][ T2332] syz.4.13022[2332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1459.453691][ T2340] device syzkaller0 entered promiscuous mode [ 1460.374186][ T2367] syz.3.13033[2367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1460.374265][ T2367] syz.3.13033[2367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1461.196047][ T2384] device syzkaller0 entered promiscuous mode [ 1461.802144][ T2400] syz.2.13045[2400] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1461.802218][ T2400] syz.2.13045[2400] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1461.956449][ T2405] device syzkaller0 entered promiscuous mode [ 1463.000036][ T2436] syz.3.13058[2436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1463.000111][ T2436] syz.3.13058[2436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1463.744322][ T2449] device syzkaller0 entered promiscuous mode [ 1464.132646][ T2470] syz.1.13070[2470] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1464.132765][ T2470] syz.1.13070[2470] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1465.206204][ T2494] device syzkaller0 entered promiscuous mode [ 1465.520280][ T2506] syz.0.13082[2506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1465.520379][ T2506] syz.0.13082[2506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1467.229918][ T2551] syz.0.13103[2551] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1467.342992][ T2551] syz.0.13103[2551] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1468.559837][ T2583] syz.3.13115[2583] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1468.667092][ T2583] syz.3.13115[2583] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1469.656608][ T2628] syz.2.13130[2628] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1469.763901][ T2628] syz.2.13130[2628] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1471.230763][ T2669] syz.1.13143[2669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1471.245736][ T2669] syz.1.13143[2669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1472.464485][ T2705] syz.3.13156[2705] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1472.632461][ T2705] syz.3.13156[2705] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1472.886784][ T2712] device syzkaller0 entered promiscuous mode [ 1473.149904][ T2724] device syzkaller0 entered promiscuous mode [ 1473.915374][ T2744] syz.0.13171[2744] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1473.915451][ T2744] syz.0.13171[2744] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1474.934897][ T2761] device syzkaller0 entered promiscuous mode [ 1475.688185][ T2780] syz.3.13183[2780] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1475.688260][ T2780] syz.3.13183[2780] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1476.798215][ T2812] device syzkaller0 entered promiscuous mode [ 1477.055789][ T2824] syz.0.13198[2824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1477.055870][ T2824] syz.0.13198[2824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1477.059987][ T2823] syz.0.13198[2823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1477.217670][ T2823] syz.0.13198[2823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1478.757314][ T2862] syz.3.13210[2862] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1478.826849][ T2862] syz.3.13210[2862] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1478.842731][ T2859] device syzkaller0 entered promiscuous mode [ 1478.935875][ T2870] device syzkaller0 entered promiscuous mode [ 1480.646706][ T2907] syz.3.13224[2907] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1480.646784][ T2907] syz.3.13224[2907] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1480.763557][ T2911] device syzkaller0 entered promiscuous mode [ 1481.063174][ T2929] device syzkaller0 entered promiscuous mode [ 1484.015625][ T3020] device syzkaller0 entered promiscuous mode [ 1484.282588][ T3029] device syzkaller0 entered promiscuous mode [ 1484.551328][ T3039] device syzkaller0 entered promiscuous mode [ 1488.944299][ T3142] device syzkaller0 entered promiscuous mode [ 1489.305529][ T3151] device syzkaller0 entered promiscuous mode [ 1490.735571][ T3189] device syzkaller0 entered promiscuous mode [ 1490.982494][ T3199] device syzkaller0 entered promiscuous mode [ 1493.319035][ T3232] device syzkaller0 entered promiscuous mode [ 1496.020721][ T3286] device syzkaller0 entered promiscuous mode [ 1496.788671][ T3295] device syzkaller0 entered promiscuous mode [ 1498.555972][ T3319] device syzkaller0 entered promiscuous mode [ 1499.169021][ T3334] device syzkaller0 entered promiscuous mode [ 1501.485671][ T3395] device syzkaller0 entered promiscuous mode [ 1502.521779][ T3422] device syzkaller0 entered promiscuous mode [ 1503.502734][ T3443] device syzkaller0 entered promiscuous mode [ 1503.860006][ T3457] device syzkaller0 entered promiscuous mode [ 1505.307750][ T3486] device syzkaller0 entered promiscuous mode [ 1508.193709][ T3562] device syzkaller0 entered promiscuous mode [ 1510.580393][ T3606] device syzkaller0 entered promiscuous mode [ 1511.952715][ T3638] device syzkaller0 entered promiscuous mode [ 1514.604309][ T3680] device syzkaller0 entered promiscuous mode [ 1516.735356][ T3717] device syzkaller0 entered promiscuous mode [ 1518.404270][ T3761] device syzkaller0 entered promiscuous mode [ 1518.929695][ T3774] device syzkaller0 entered promiscuous mode [ 1519.652369][ T3798] device syzkaller0 entered promiscuous mode [ 1521.701360][ T3837] device syzkaller0 entered promiscuous mode [ 1523.276129][ T3868] device syzkaller0 entered promiscuous mode [ 1523.819645][ T3871] device syzkaller0 entered promiscuous mode [ 1524.368472][ T3884] device syzkaller0 entered promiscuous mode [ 1525.695382][ T3911] device syzkaller0 entered promiscuous mode [ 1527.351972][ T3962] device syzkaller0 entered promiscuous mode [ 1529.501814][ T4002] device syzkaller0 entered promiscuous mode [ 1530.984148][ T4038] device syzkaller0 entered promiscuous mode [ 1531.962265][ T4054] device syzkaller0 entered promiscuous mode [ 1534.055925][ T4109] device syzkaller0 entered promiscuous mode [ 1536.304883][ T4155] device syzkaller0 entered promiscuous mode [ 1536.388253][ T4158] device syzkaller0 entered promiscuous mode [ 1536.536253][ T4162] device syzkaller0 entered promiscuous mode [ 1537.013806][ T4169] device syzkaller0 entered promiscuous mode [ 1538.382396][ T4201] device syzkaller0 entered promiscuous mode [ 1539.008108][ T4216] device syzkaller0 entered promiscuous mode [ 1543.149291][ T4294] device syzkaller0 entered promiscuous mode [ 1545.014364][ T4340] device syzkaller0 entered promiscuous mode [ 1546.208847][ T4375] device syzkaller0 entered promiscuous mode [ 1547.673635][ T4426] device syzkaller0 entered promiscuous mode [ 1549.182362][ T4463] device syzkaller0 entered promiscuous mode [ 1550.097832][ T4483] device syzkaller0 entered promiscuous mode [ 1550.722513][ T4506] device syzkaller0 entered promiscuous mode [ 1553.150989][ T4583] device syzkaller0 entered promiscuous mode [ 1554.053772][ T4600] device syzkaller0 entered promiscuous mode [ 1554.563076][ T4614] device syzkaller0 entered promiscuous mode [ 1555.123430][ T4628] device syzkaller0 entered promiscuous mode [ 1555.462789][ T4644] device syzkaller0 entered promiscuous mode [ 1555.830995][ T4657] device syzkaller0 entered promiscuous mode [ 1556.339836][ T4674] device syzkaller0 entered promiscuous mode [ 1557.183942][ T4704] device syzkaller0 entered promiscuous mode [ 1559.571815][ T4768] device syzkaller0 entered promiscuous mode [ 1561.405872][ T4817] device syzkaller0 entered promiscuous mode [ 1562.950223][ T4842] device syzkaller0 entered promiscuous mode [ 1563.612704][ T4852] device syzkaller0 entered promiscuous mode [ 1564.543587][ T4877] device syzkaller0 entered promiscuous mode [ 1567.810959][ T4953] device syzkaller0 entered promiscuous mode [ 1571.677968][ T5027] device syzkaller0 entered promiscuous mode [ 1573.142426][ T5062] device syzkaller0 entered promiscuous mode [ 1575.957920][ T5149] device syzkaller0 entered promiscuous mode [ 1581.829208][ T5303] device syzkaller0 entered promiscuous mode [ 1585.905870][ T5401] device syzkaller0 entered promiscuous mode [ 1586.287866][ T5409] device syzkaller0 entered promiscuous mode [ 1586.727404][ T5423] device syzkaller0 entered promiscuous mode [ 1587.595100][ T5442] device syzkaller0 entered promiscuous mode [ 1588.601500][ T5453] device syzkaller0 entered promiscuous mode [ 1589.067490][ T5466] device syzkaller0 entered promiscuous mode [ 1590.635349][ T5506] device syzkaller0 entered promiscuous mode [ 1591.064017][ T5514] device syzkaller0 entered promiscuous mode [ 1591.977310][ T5540] device syzkaller0 entered promiscuous mode [ 1592.292439][ T5551] device syzkaller0 entered promiscuous mode [ 1594.726255][ T5594] device syzkaller0 entered promiscuous mode [ 1595.675772][ T5610] device syzkaller0 entered promiscuous mode [ 1596.095530][ T5623] device syzkaller0 entered promiscuous mode [ 1596.997372][ T5638] device syzkaller0 entered promiscuous mode [ 1597.820948][ T5651] device syzkaller0 entered promiscuous mode [ 1598.736208][ T5671] device syzkaller0 entered promiscuous mode [ 1600.278087][ T5701] device syzkaller0 entered promiscuous mode [ 1600.996245][ T5717] device syzkaller0 entered promiscuous mode [ 1602.119586][ T5744] device syzkaller0 entered promiscuous mode [ 1603.419996][ T5763] device syzkaller0 entered promiscuous mode [ 1604.514855][ T5781] device syzkaller0 entered promiscuous mode [ 1607.165046][ T5828] device syzkaller0 entered promiscuous mode [ 1607.684543][ T5839] device syzkaller0 entered promiscuous mode [ 1607.971741][ T5845] device syzkaller0 entered promiscuous mode [ 1609.049065][ T5866] device syzkaller0 entered promiscuous mode [ 1613.022319][ T5919] device syzkaller0 entered promiscuous mode [ 1613.351303][ T5924] device syzkaller0 entered promiscuous mode [ 1613.443590][ T5925] device syzkaller0 entered promiscuous mode [ 1614.582383][ T5937] device syzkaller0 entered promiscuous mode [ 1615.015777][ T5946] device syzkaller0 entered promiscuous mode [ 1615.498742][ T5960] device syzkaller0 entered promiscuous mode [ 1616.295792][ T5974] device syzkaller0 entered promiscuous mode [ 1620.150089][ T6032] device syzkaller0 entered promiscuous mode [ 1621.461669][ T6060] device syzkaller0 entered promiscuous mode [ 1623.318371][ T6094] device syzkaller0 entered promiscuous mode [ 1624.382791][ T6113] device syzkaller0 entered promiscuous mode [ 1626.270612][ T6154] device syzkaller0 entered promiscuous mode [ 1636.533562][ T6342] bridge0: port 1(bridge_slave_0) entered blocking state [ 1636.545173][ T6342] bridge0: port 1(bridge_slave_0) entered disabled state [ 1636.553743][ T6342] device bridge_slave_0 entered promiscuous mode [ 1636.560985][ T6342] bridge0: port 2(bridge_slave_1) entered blocking state [ 1636.567960][ T6342] bridge0: port 2(bridge_slave_1) entered disabled state [ 1636.575244][ T6342] device bridge_slave_1 entered promiscuous mode [ 1637.302563][ T6342] bridge0: port 2(bridge_slave_1) entered blocking state [ 1637.309460][ T6342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1637.316555][ T6342] bridge0: port 1(bridge_slave_0) entered blocking state [ 1637.323344][ T6342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1637.561450][ T7311] bridge0: port 1(bridge_slave_0) entered disabled state [ 1637.589593][ T7311] bridge0: port 2(bridge_slave_1) entered disabled state [ 1637.906192][ T7311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1638.037320][ T7311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1638.202586][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1638.227379][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1638.235407][T29413] bridge0: port 1(bridge_slave_0) entered blocking state [ 1638.242400][T29413] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1638.250344][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1638.258639][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1638.266675][T29413] bridge0: port 2(bridge_slave_1) entered blocking state [ 1638.273628][T29413] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1638.281061][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1638.289030][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1638.297027][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1638.304908][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1638.312740][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1638.320861][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1638.342562][ T6342] device veth0_vlan entered promiscuous mode [ 1638.357048][T23735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1638.364991][T23735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1638.400672][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1638.408142][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1638.422328][ T6342] device veth1_macvtap entered promiscuous mode [ 1638.432817][T19415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1638.441329][T19415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1638.449462][T19415] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1638.494042][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1638.502904][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1638.511170][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1638.519447][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1638.885857][ T8] device bridge_slave_1 left promiscuous mode [ 1638.896391][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 1638.951326][ T8] device bridge_slave_0 left promiscuous mode [ 1639.009689][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 1639.305688][ T8] device veth1_macvtap left promiscuous mode [ 1639.363946][ T8] device veth0_vlan left promiscuous mode [ 1645.133554][ T6477] device syzkaller0 entered promiscuous mode [ 1649.211772][ T6544] device syzkaller0 entered promiscuous mode [ 1651.628291][ T6589] device syzkaller0 entered promiscuous mode [ 1652.560423][ T6605] device syzkaller0 entered promiscuous mode [ 1652.581221][ T6603] device syzkaller0 entered promiscuous mode [ 1654.234397][ T6635] device syzkaller0 entered promiscuous mode [ 1655.404948][ T6656] device syzkaller0 entered promiscuous mode [ 1655.437872][ T6660] device syzkaller0 entered promiscuous mode [ 1656.091977][ T6673] device syzkaller0 entered promiscuous mode [ 1657.715236][ T6701] device syzkaller0 entered promiscuous mode [ 1657.767120][ T6703] device syzkaller0 entered promiscuous mode [ 1658.309566][ T6720] device syzkaller0 entered promiscuous mode [ 1658.759630][ T6729] device syzkaller0 entered promiscuous mode [ 1659.776210][ T6746] device syzkaller0 entered promiscuous mode [ 1660.205310][ T6762] device syzkaller0 entered promiscuous mode [ 1660.581582][ T6769] device syzkaller0 entered promiscuous mode [ 1661.062680][ T6775] device syzkaller0 entered promiscuous mode [ 1661.852591][ T6795] device syzkaller0 entered promiscuous mode [ 1663.716007][ T6827] device syzkaller0 entered promiscuous mode [ 1665.170773][ T6868] device syzkaller0 entered promiscuous mode [ 1667.290325][ T6914] device syzkaller0 entered promiscuous mode [ 1669.522792][ T6967] device syzkaller0 entered promiscuous mode [ 1674.723766][ T7048] device syzkaller0 entered promiscuous mode [ 1680.103598][ T7109] device syzkaller0 entered promiscuous mode [ 1680.729811][ T7112] device syzkaller0 entered promiscuous mode [ 1682.894621][ T7151] device syzkaller0 entered promiscuous mode [ 1691.395039][ T7288] bridge0: port 1(bridge_slave_0) entered blocking state [ 1691.402703][ T7288] bridge0: port 1(bridge_slave_0) entered disabled state [ 1691.455873][ T7288] device bridge_slave_0 entered promiscuous mode [ 1691.629030][ T7288] bridge0: port 2(bridge_slave_1) entered blocking state [ 1691.642464][ T7288] bridge0: port 2(bridge_slave_1) entered disabled state [ 1691.649849][ T7288] device bridge_slave_1 entered promiscuous mode [ 1691.960708][ T7288] bridge0: port 2(bridge_slave_1) entered blocking state [ 1691.967595][ T7288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1691.974707][ T7288] bridge0: port 1(bridge_slave_0) entered blocking state [ 1691.981494][ T7288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1692.174722][T29413] bridge0: port 1(bridge_slave_0) entered disabled state [ 1692.195178][T29413] bridge0: port 2(bridge_slave_1) entered disabled state [ 1692.273854][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1692.282965][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1692.290565][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1692.299225][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1692.307912][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 1692.314785][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1692.322464][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1692.330807][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1692.339347][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 1692.346214][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1692.585805][ T7311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1692.593722][ T7311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1692.702085][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1692.710285][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1692.718430][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1692.726688][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1692.735269][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1692.743267][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1692.751666][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1692.759233][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1692.819514][ T7288] device veth0_vlan entered promiscuous mode [ 1692.839198][ T7288] device veth1_macvtap entered promiscuous mode [ 1692.849077][ T7311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1692.857458][ T7311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1692.865499][ T7311] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1692.970648][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1692.979471][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1692.989435][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1692.997807][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1693.808658][ T335] device bridge_slave_1 left promiscuous mode [ 1693.821721][ T335] bridge0: port 2(bridge_slave_1) entered disabled state [ 1693.921024][ T335] device bridge_slave_0 left promiscuous mode [ 1693.982559][ T335] bridge0: port 1(bridge_slave_0) entered disabled state [ 1693.999088][ T335] device veth1_macvtap left promiscuous mode [ 1694.005299][ T335] device veth0_vlan left promiscuous mode [ 1697.752791][ T7392] device syzkaller0 entered promiscuous mode [ 1698.554334][ T7409] syz.0.14744[7409] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1698.554411][ T7409] syz.0.14744[7409] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1698.557664][ T7408] syz.0.14744[7408] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1698.731294][ T7408] syz.0.14744[7408] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1699.179490][ T7418] device syzkaller0 entered promiscuous mode [ 1699.849046][ T7427] device syzkaller0 entered promiscuous mode [ 1701.335317][ T7456] device syzkaller0 entered promiscuous mode [ 1702.421028][ T7480] syz.0.14768[7480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1702.421106][ T7480] syz.0.14768[7480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1704.790088][ T7510] device syzkaller0 entered promiscuous mode [ 1704.978831][ T7518] syz.0.14780[7518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1704.978910][ T7518] syz.0.14780[7518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1708.316974][ T7559] syz.2.14794[7559] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1708.330647][ T7559] syz.2.14794[7559] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1708.485846][ T7565] syz.0.14805[7565] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1708.597393][ T7565] syz.0.14805[7565] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1711.022015][ T7607] syz.0.14811[7607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1711.114645][ T7607] syz.0.14811[7607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1713.613592][ T7677] syz.1.14835[7677] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1713.732634][ T7677] syz.1.14835[7677] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1714.582084][ T7688] device syzkaller0 entered promiscuous mode [ 1715.942683][ T7717] syz.0.14846[7717] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1715.942759][ T7717] syz.0.14846[7717] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1720.567335][ T7758] syz.1.14863[7758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1720.706930][ T7758] syz.1.14863[7758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1726.009617][ T7858] device syzkaller0 entered promiscuous mode [ 1734.953012][ T8003] device syzkaller0 entered promiscuous mode [ 1737.047527][ T8048] device syzkaller0 entered promiscuous mode [ 1738.036548][ T8058] device syzkaller0 entered promiscuous mode [ 1739.651613][ T8080] device syzkaller0 entered promiscuous mode [ 1740.219496][ T8087] device syzkaller0 entered promiscuous mode [ 1740.928790][ T8101] device syzkaller0 entered promiscuous mode [ 1742.473926][ T8130] device syzkaller0 entered promiscuous mode [ 1743.055104][ T8146] device syzkaller0 entered promiscuous mode [ 1743.900271][ T8158] device syzkaller0 entered promiscuous mode [ 1745.107004][ T8188] device syzkaller0 entered promiscuous mode [ 1747.974120][ T8226] device syzkaller0 entered promiscuous mode [ 1748.334724][ T8234] device syzkaller0 entered promiscuous mode [ 1752.589895][ T8289] device syzkaller0 entered promiscuous mode [ 1753.285795][ T8306] device syzkaller0 entered promiscuous mode [ 1753.394886][ T8311] device syzkaller0 entered promiscuous mode [ 1760.537274][ T8444] device syzkaller0 entered promiscuous mode [ 1768.812008][ T8634] device syzkaller0 entered promiscuous mode [ 1773.245092][ T8722] device syzkaller0 entered promiscuous mode [ 1774.286084][ T8741] device syzkaller0 entered promiscuous mode [ 1775.986875][ T8759] bridge0: port 1(bridge_slave_0) entered blocking state [ 1775.993898][ T8759] bridge0: port 1(bridge_slave_0) entered disabled state [ 1776.001273][ T8759] device bridge_slave_0 entered promiscuous mode [ 1776.059937][ T8759] bridge0: port 2(bridge_slave_1) entered blocking state [ 1776.067007][ T8759] bridge0: port 2(bridge_slave_1) entered disabled state [ 1776.074344][ T8759] device bridge_slave_1 entered promiscuous mode [ 1776.817848][ T10] device bridge_slave_1 left promiscuous mode [ 1776.826117][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 1776.879586][ T10] device bridge_slave_0 left promiscuous mode [ 1776.923942][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 1776.943206][ T10] device veth1_macvtap left promiscuous mode [ 1776.951042][ T10] device veth0_vlan left promiscuous mode [ 1777.699185][T22402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1777.706398][T22402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1777.714156][T22402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1777.722917][T22402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1777.731163][T22402] bridge0: port 1(bridge_slave_0) entered blocking state [ 1777.738021][T22402] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1777.745955][T22402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1777.754187][T22402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1777.785150][T22402] bridge0: port 2(bridge_slave_1) entered blocking state [ 1777.792053][T22402] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1777.807079][T22402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1777.896269][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1777.967177][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1777.975116][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1777.983375][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1778.050495][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1778.102601][ T8759] device veth0_vlan entered promiscuous mode [ 1778.157713][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1778.166073][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1778.173835][T29413] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1778.314753][ T8759] device veth1_macvtap entered promiscuous mode [ 1778.331379][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1778.361078][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1778.408529][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1778.568918][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1778.577538][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1778.731846][T19415] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1778.740063][T19415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1782.641294][ T8847] device syzkaller0 entered promiscuous mode [ 1785.983872][ T8898] device syzkaller0 entered promiscuous mode [ 1790.630487][ T8951] device syzkaller0 entered promiscuous mode [ 1793.898150][ T8999] bridge0: port 1(bridge_slave_0) entered blocking state [ 1793.963827][ T8999] bridge0: port 1(bridge_slave_0) entered disabled state [ 1793.999010][ T8999] device bridge_slave_0 entered promiscuous mode [ 1794.060323][ T8999] bridge0: port 2(bridge_slave_1) entered blocking state [ 1794.068767][ T8999] bridge0: port 2(bridge_slave_1) entered disabled state [ 1794.076239][ T8999] device bridge_slave_1 entered promiscuous mode [ 1794.729072][ T8] device bridge_slave_1 left promiscuous mode [ 1794.735069][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 1795.113166][ T8] device bridge_slave_0 left promiscuous mode [ 1795.119545][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 1795.311303][ T8] device veth1_macvtap left promiscuous mode [ 1795.331773][ T8] device veth0_vlan left promiscuous mode [ 1795.881350][T10817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1795.889114][T10817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1795.927337][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1795.935979][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1795.944862][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 1795.951738][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1795.959252][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1795.971819][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1795.987054][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 1795.993923][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1796.001368][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1796.014184][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1796.022425][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1796.030571][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1796.065386][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1796.088110][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1796.096426][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1796.108679][ T8999] device veth0_vlan entered promiscuous mode [ 1796.148893][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1796.156721][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1796.220064][ T8999] device veth1_macvtap entered promiscuous mode [ 1796.248152][T19415] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1796.255503][T19415] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1796.354256][T19415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1796.415037][T19415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1796.475676][T19415] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1796.569684][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1796.580234][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1796.594659][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1796.637714][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1820.132590][ T9458] FAULT_INJECTION: forcing a failure. [ 1820.132590][ T9458] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1820.177071][ T9458] CPU: 0 PID: 9458 Comm: syz.3.15400 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 1820.186988][ T9458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1820.196877][ T9458] Call Trace: [ 1820.200001][ T9458] [ 1820.202778][ T9458] dump_stack_lvl+0x151/0x1b7 [ 1820.207525][ T9458] ? io_uring_drop_tctx_refs+0x190/0x190 [ 1820.212982][ T9458] ? bpf_test_run+0x8de/0xa10 [ 1820.217493][ T9458] dump_stack+0x15/0x17 [ 1820.221486][ T9458] should_fail+0x3c6/0x510 [ 1820.225745][ T9458] should_fail_usercopy+0x1a/0x20 [ 1820.230598][ T9458] _copy_to_user+0x20/0x90 [ 1820.234852][ T9458] bpf_test_finish+0x265/0x5a0 [ 1820.239451][ T9458] ? convert_skb_to___skb+0x360/0x360 [ 1820.244749][ T9458] ? convert_skb_to___skb+0x208/0x360 [ 1820.249953][ T9458] bpf_prog_test_run_skb+0xd4d/0x1420 [ 1820.255161][ T9458] ? __kasan_check_write+0x14/0x20 [ 1820.260115][ T9458] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 1820.265835][ T9458] ? __kasan_check_write+0x14/0x20 [ 1820.270780][ T9458] ? fput_many+0x160/0x1b0 [ 1820.275034][ T9458] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 1820.280937][ T9458] bpf_prog_test_run+0x3b0/0x630 [ 1820.285715][ T9458] ? bpf_prog_query+0x220/0x220 [ 1820.290404][ T9458] ? selinux_bpf+0xd2/0x100 [ 1820.294738][ T9458] ? security_bpf+0x82/0xb0 [ 1820.299078][ T9458] __sys_bpf+0x525/0x760 [ 1820.303156][ T9458] ? fput_many+0x160/0x1b0 [ 1820.307551][ T9458] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1820.312759][ T9458] ? debug_smp_processor_id+0x17/0x20 [ 1820.317960][ T9458] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1820.323861][ T9458] __x64_sys_bpf+0x7c/0x90 [ 1820.328116][ T9458] do_syscall_64+0x3d/0xb0 [ 1820.332373][ T9458] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1820.338094][ T9458] RIP: 0033:0x7f1260bdd9f9 [ 1820.342348][ T9458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1820.361876][ T9458] RSP: 002b:00007f125f85d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1820.370119][ T9458] RAX: ffffffffffffffda RBX: 00007f1260d6bf80 RCX: 00007f1260bdd9f9 [ 1820.377929][ T9458] RDX: 000000000000001e RSI: 0000000020000080 RDI: 000000000000000a [ 1820.385749][ T9458] RBP: 00007f125f85d090 R08: 0000000000000000 R09: 0000000000000000 [ 1820.393557][ T9458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1820.401367][ T9458] R13: 0000000000000000 R14: 00007f1260d6bf80 R15: 00007ffcf1319148 [ 1820.409186][ T9458] [ 1821.109436][ T9493] syz.1.15410[9493] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1821.109533][ T9493] syz.1.15410[9493] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1821.391787][ T9499] device pim6reg1 entered promiscuous mode [ 1823.110110][ T9575] FAULT_INJECTION: forcing a failure. [ 1823.110110][ T9575] name failslab, interval 1, probability 0, space 0, times 0 [ 1823.164275][ T9575] CPU: 0 PID: 9575 Comm: syz.2.15437 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 1823.174099][ T9575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1823.184007][ T9575] Call Trace: [ 1823.187116][ T9575] [ 1823.189894][ T9575] dump_stack_lvl+0x151/0x1b7 [ 1823.194406][ T9575] ? io_uring_drop_tctx_refs+0x190/0x190 [ 1823.199875][ T9575] dump_stack+0x15/0x17 [ 1823.203867][ T9575] should_fail+0x3c6/0x510 [ 1823.208117][ T9575] __should_failslab+0xa4/0xe0 [ 1823.212717][ T9575] ? security_file_alloc+0x29/0x120 [ 1823.217752][ T9575] should_failslab+0x9/0x20 [ 1823.222091][ T9575] slab_pre_alloc_hook+0x37/0xd0 [ 1823.226864][ T9575] ? security_file_alloc+0x29/0x120 [ 1823.231897][ T9575] kmem_cache_alloc+0x44/0x200 [ 1823.236500][ T9575] security_file_alloc+0x29/0x120 [ 1823.241362][ T9575] __alloc_file+0xb2/0x2a0 [ 1823.245615][ T9575] alloc_empty_file+0x95/0x180 [ 1823.250353][ T9575] path_openat+0xfe/0x2f40 [ 1823.254601][ T9575] ? stack_trace_snprint+0xf0/0xf0 [ 1823.259581][ T9575] ? __kasan_slab_alloc+0xc3/0xe0 [ 1823.264413][ T9575] ? __kasan_slab_alloc+0xb1/0xe0 [ 1823.269273][ T9575] ? slab_post_alloc_hook+0x53/0x2c0 [ 1823.274401][ T9575] ? kmem_cache_alloc+0xf5/0x200 [ 1823.279253][ T9575] ? getname_flags+0xba/0x520 [ 1823.283765][ T9575] ? getname+0x19/0x20 [ 1823.287668][ T9575] ? do_sys_openat2+0xd7/0x830 [ 1823.292276][ T9575] ? __x64_sys_openat+0x243/0x290 [ 1823.297214][ T9575] ? do_syscall_64+0x3d/0xb0 [ 1823.301640][ T9575] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1823.307551][ T9575] ? do_filp_open+0x460/0x460 [ 1823.312069][ T9575] do_filp_open+0x21c/0x460 [ 1823.316398][ T9575] ? vfs_tmpfile+0x2c0/0x2c0 [ 1823.320838][ T9575] do_sys_openat2+0x13f/0x830 [ 1823.325341][ T9575] ? __kasan_check_write+0x14/0x20 [ 1823.330284][ T9575] ? mutex_unlock+0xb2/0x260 [ 1823.334711][ T9575] ? wait_for_completion_killable_timeout+0x10/0x10 [ 1823.341145][ T9575] ? do_sys_open+0x220/0x220 [ 1823.345565][ T9575] ? __kasan_check_write+0x14/0x20 [ 1823.350509][ T9575] ? fput_many+0x160/0x1b0 [ 1823.354765][ T9575] ? fput+0x1a/0x20 [ 1823.358409][ T9575] __x64_sys_openat+0x243/0x290 [ 1823.363094][ T9575] ? __ia32_sys_open+0x270/0x270 [ 1823.367863][ T9575] ? debug_smp_processor_id+0x17/0x20 [ 1823.373070][ T9575] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1823.378975][ T9575] ? exit_to_user_mode_prepare+0x39/0xa0 [ 1823.384443][ T9575] do_syscall_64+0x3d/0xb0 [ 1823.388696][ T9575] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1823.394423][ T9575] RIP: 0033:0x7fcbb50329f9 [ 1823.398679][ T9575] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1823.418123][ T9575] RSP: 002b:00007fcbb3cb2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1823.426365][ T9575] RAX: ffffffffffffffda RBX: 00007fcbb51c0f80 RCX: 00007fcbb50329f9 [ 1823.434175][ T9575] RDX: 0000000000000002 RSI: 0000000020000000 RDI: ffffffffffffffff [ 1823.441985][ T9575] RBP: 00007fcbb3cb2090 R08: 0000000000000000 R09: 0000000000000000 [ 1823.449795][ T9575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1823.457702][ T9575] R13: 0000000000000000 R14: 00007fcbb51c0f80 R15: 00007ffded251da8 [ 1823.465521][ T9575] [ 1823.503706][ T9583] FAULT_INJECTION: forcing a failure. [ 1823.503706][ T9583] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1823.567026][ T9583] CPU: 0 PID: 9583 Comm: syz.0.15441 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 1823.576861][ T9583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1823.586771][ T9583] Call Trace: [ 1823.589875][ T9583] [ 1823.592652][ T9583] dump_stack_lvl+0x151/0x1b7 [ 1823.597166][ T9583] ? io_uring_drop_tctx_refs+0x190/0x190 [ 1823.602638][ T9583] dump_stack+0x15/0x17 [ 1823.606629][ T9583] should_fail+0x3c6/0x510 [ 1823.610882][ T9583] should_fail_usercopy+0x1a/0x20 [ 1823.615743][ T9583] _copy_from_user+0x20/0xd0 [ 1823.620165][ T9583] __sys_bpf+0x1e9/0x760 [ 1823.624245][ T9583] ? fput_many+0x160/0x1b0 [ 1823.628498][ T9583] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1823.633710][ T9583] ? debug_smp_processor_id+0x17/0x20 [ 1823.638914][ T9583] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1823.644822][ T9583] __x64_sys_bpf+0x7c/0x90 [ 1823.649070][ T9583] do_syscall_64+0x3d/0xb0 [ 1823.653320][ T9583] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1823.659047][ T9583] RIP: 0033:0x7f3c3186e9f9 [ 1823.663319][ T9583] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1823.682744][ T9583] RSP: 002b:00007f3c304ee038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1823.690988][ T9583] RAX: ffffffffffffffda RBX: 00007f3c319fcf80 RCX: 00007f3c3186e9f9 [ 1823.698796][ T9583] RDX: 0000000000000018 RSI: 0000000020000600 RDI: 0000000000000007 [ 1823.706609][ T9583] RBP: 00007f3c304ee090 R08: 0000000000000000 R09: 0000000000000000 [ 1823.714423][ T9583] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1823.722235][ T9583] R13: 0000000000000000 R14: 00007f3c319fcf80 R15: 00007fff45b8fc78 [ 1823.730051][ T9583] [ 1823.758619][ T9592] FAULT_INJECTION: forcing a failure. [ 1823.758619][ T9592] name failslab, interval 1, probability 0, space 0, times 0 [ 1823.771429][ T9592] CPU: 1 PID: 9592 Comm: syz.4.15443 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 1823.781233][ T9592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1823.791229][ T9592] Call Trace: [ 1823.794363][ T9592] [ 1823.797135][ T9592] dump_stack_lvl+0x151/0x1b7 [ 1823.801822][ T9592] ? io_uring_drop_tctx_refs+0x190/0x190 [ 1823.807284][ T9592] ? ____kasan_kmalloc+0xed/0x110 [ 1823.812144][ T9592] ? __kasan_kmalloc+0x9/0x10 [ 1823.816660][ T9592] ? __kmalloc_track_caller+0x139/0x260 [ 1823.822039][ T9592] ? strndup_user+0x76/0x150 [ 1823.826463][ T9592] ? perf_uprobe_init+0x66/0x1a0 [ 1823.831242][ T9592] dump_stack+0x15/0x17 [ 1823.835231][ T9592] should_fail+0x3c6/0x510 [ 1823.839486][ T9592] __should_failslab+0xa4/0xe0 [ 1823.844084][ T9592] ? getname_kernel+0x59/0x2e0 [ 1823.848682][ T9592] should_failslab+0x9/0x20 [ 1823.853022][ T9592] slab_pre_alloc_hook+0x37/0xd0 [ 1823.857797][ T9592] ? getname_kernel+0x59/0x2e0 [ 1823.862399][ T9592] kmem_cache_alloc+0x44/0x200 [ 1823.866998][ T9592] getname_kernel+0x59/0x2e0 [ 1823.871424][ T9592] kern_path+0x23/0x1a0 [ 1823.875424][ T9592] create_local_trace_uprobe+0xa2/0x710 [ 1823.880802][ T9592] ? bpf_get_uprobe_info+0x4e0/0x4e0 [ 1823.885929][ T9592] ? __kasan_check_write+0x14/0x20 [ 1823.890869][ T9592] perf_uprobe_init+0xfa/0x1a0 [ 1823.895466][ T9592] perf_uprobe_event_init+0x106/0x190 [ 1823.900689][ T9592] perf_try_init_event+0x143/0x410 [ 1823.905622][ T9592] perf_event_alloc+0x1256/0x1b00 [ 1823.910487][ T9592] __se_sys_perf_event_open+0x7b4/0x3ce0 [ 1823.915947][ T9592] ? file_end_write+0x1c0/0x1c0 [ 1823.920638][ T9592] ? wait_for_completion_killable_timeout+0x10/0x10 [ 1823.927055][ T9592] ? __mutex_lock_slowpath+0x10/0x10 [ 1823.932181][ T9592] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 1823.937647][ T9592] ? __kasan_check_write+0x14/0x20 [ 1823.942597][ T9592] ? fput_many+0x160/0x1b0 [ 1823.946855][ T9592] ? debug_smp_processor_id+0x17/0x20 [ 1823.952143][ T9592] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1823.958045][ T9592] __x64_sys_perf_event_open+0xbf/0xd0 [ 1823.963342][ T9592] do_syscall_64+0x3d/0xb0 [ 1823.967591][ T9592] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1823.973315][ T9592] RIP: 0033:0x7fc444dc69f9 [ 1823.977572][ T9592] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1823.997014][ T9592] RSP: 002b:00007fc443a25038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1824.005253][ T9592] RAX: ffffffffffffffda RBX: 00007fc444f55058 RCX: 00007fc444dc69f9 [ 1824.013158][ T9592] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000000 [ 1824.020968][ T9592] RBP: 00007fc443a25090 R08: 0000000000000000 R09: 0000000000000000 [ 1824.028779][ T9592] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1824.036588][ T9592] R13: 0000000000000000 R14: 00007fc444f55058 R15: 00007ffd666e6028 [ 1824.044431][ T9592] [ 1824.196272][ T9603] FAULT_INJECTION: forcing a failure. [ 1824.196272][ T9603] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1824.270907][ T9603] CPU: 1 PID: 9603 Comm: syz.1.15445 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 1824.280999][ T9603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1824.290903][ T9603] Call Trace: [ 1824.294014][ T9603] [ 1824.296791][ T9603] dump_stack_lvl+0x151/0x1b7 [ 1824.301308][ T9603] ? io_uring_drop_tctx_refs+0x190/0x190 [ 1824.306780][ T9603] dump_stack+0x15/0x17 [ 1824.310765][ T9603] should_fail+0x3c6/0x510 [ 1824.315018][ T9603] should_fail_usercopy+0x1a/0x20 [ 1824.319965][ T9603] _copy_from_user+0x20/0xd0 [ 1824.324389][ T9603] iovec_from_user+0xc7/0x330 [ 1824.328912][ T9603] __import_iovec+0x6d/0x420 [ 1824.333418][ T9603] ? __ia32_sys_shutdown+0x70/0x70 [ 1824.338466][ T9603] import_iovec+0xe5/0x120 [ 1824.342706][ T9603] ___sys_sendmsg+0x215/0x2e0 [ 1824.347219][ T9603] ? __sys_sendmsg+0x260/0x260 [ 1824.351829][ T9603] __se_sys_sendmsg+0x19a/0x260 [ 1824.356501][ T9603] ? hrtimer_interrupt+0x867/0xaa0 [ 1824.361451][ T9603] ? __x64_sys_sendmsg+0x90/0x90 [ 1824.366226][ T9603] ? debug_smp_processor_id+0x17/0x20 [ 1824.371429][ T9603] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1824.377332][ T9603] __x64_sys_sendmsg+0x7b/0x90 [ 1824.382106][ T9603] do_syscall_64+0x3d/0xb0 [ 1824.386355][ T9603] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 1824.392002][ T9603] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1824.397736][ T9603] RIP: 0033:0x7f3dabe659f9 [ 1824.401982][ T9603] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1824.421509][ T9603] RSP: 002b:00007f3daaae5038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1824.429752][ T9603] RAX: ffffffffffffffda RBX: 00007f3dabff3f80 RCX: 00007f3dabe659f9 [ 1824.437566][ T9603] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000007 [ 1824.445380][ T9603] RBP: 00007f3daaae5090 R08: 0000000000000000 R09: 0000000000000000 [ 1824.453193][ T9603] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1824.460998][ T9603] R13: 0000000000000000 R14: 00007f3dabff3f80 R15: 00007ffe8cf25208 [ 1824.468815][ T9603] [ 1824.712926][ T9609] bridge0: port 1(bridge_slave_0) entered blocking state [ 1824.724195][ T9609] bridge0: port 1(bridge_slave_0) entered disabled state [ 1824.744118][ T9609] device bridge_slave_0 entered promiscuous mode [ 1824.797788][ T9609] bridge0: port 2(bridge_slave_1) entered blocking state [ 1824.845549][ T9609] bridge0: port 2(bridge_slave_1) entered disabled state [ 1824.921546][ T9609] device bridge_slave_1 entered promiscuous mode [ 1825.433204][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1825.446032][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1825.482937][T10817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1825.496645][T10817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1825.521563][T10817] bridge0: port 1(bridge_slave_0) entered blocking state [ 1825.528468][T10817] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1825.555946][T10817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1825.575402][T10817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1825.592376][T10817] bridge0: port 2(bridge_slave_1) entered blocking state [ 1825.599280][T10817] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1825.631738][T10817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1825.644464][T10817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1825.662780][T10817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1825.685802][ T9609] device veth0_vlan entered promiscuous mode [ 1825.706032][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1825.716293][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1825.799324][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1825.847420][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1825.874216][ T9609] device veth1_macvtap entered promiscuous mode [ 1826.078527][T10817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1826.117294][T10817] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1826.148886][T10817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1826.288878][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1826.340789][ T9639] FAULT_INJECTION: forcing a failure. [ 1826.340789][ T9639] name failslab, interval 1, probability 0, space 0, times 0 [ 1826.354680][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1826.411077][ T9639] CPU: 0 PID: 9639 Comm: syz.0.15448 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 1826.420905][ T9639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1826.430798][ T9639] Call Trace: [ 1826.433920][ T9639] [ 1826.436699][ T9639] dump_stack_lvl+0x151/0x1b7 [ 1826.441212][ T9639] ? io_uring_drop_tctx_refs+0x190/0x190 [ 1826.446687][ T9639] dump_stack+0x15/0x17 [ 1826.450672][ T9639] should_fail+0x3c6/0x510 [ 1826.454929][ T9639] __should_failslab+0xa4/0xe0 [ 1826.459531][ T9639] should_failslab+0x9/0x20 [ 1826.463863][ T9639] slab_pre_alloc_hook+0x37/0xd0 [ 1826.468640][ T9639] kmem_cache_alloc_trace+0x48/0x210 [ 1826.473757][ T9639] ? alloc_fdtable+0xaf/0x2a0 [ 1826.478274][ T9639] alloc_fdtable+0xaf/0x2a0 [ 1826.482619][ T9639] dup_fd+0x759/0xb00 [ 1826.486431][ T9639] ? avc_has_perm+0x16f/0x260 [ 1826.490948][ T9639] copy_files+0xe6/0x200 [ 1826.495022][ T9639] ? perf_event_attrs+0x30/0x30 [ 1826.499707][ T9639] ? dup_task_struct+0xc60/0xc60 [ 1826.504484][ T9639] ? security_task_alloc+0xf9/0x130 [ 1826.509515][ T9639] copy_process+0x1080/0x3290 [ 1826.514034][ T9639] ? proc_fail_nth_write+0x20b/0x290 [ 1826.519154][ T9639] ? fsnotify_perm+0x6a/0x5d0 [ 1826.523683][ T9639] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1826.528619][ T9639] ? vfs_write+0x9ec/0x1110 [ 1826.532952][ T9639] ? kmem_cache_free+0x116/0x2e0 [ 1826.537725][ T9639] kernel_clone+0x21e/0x9e0 [ 1826.542083][ T9639] ? file_end_write+0x1c0/0x1c0 [ 1826.546751][ T9639] ? create_io_thread+0x1e0/0x1e0 [ 1826.551612][ T9639] ? mutex_unlock+0xb2/0x260 [ 1826.556051][ T9639] ? __mutex_lock_slowpath+0x10/0x10 [ 1826.561160][ T9639] __x64_sys_clone+0x23f/0x290 [ 1826.565762][ T9639] ? __do_sys_vfork+0x130/0x130 [ 1826.570440][ T9639] ? ksys_write+0x260/0x2c0 [ 1826.574788][ T9639] ? debug_smp_processor_id+0x17/0x20 [ 1826.579992][ T9639] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1826.585909][ T9639] ? exit_to_user_mode_prepare+0x39/0xa0 [ 1826.591362][ T9639] do_syscall_64+0x3d/0xb0 [ 1826.595618][ T9639] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1826.601338][ T9639] RIP: 0033:0x7f05c0b239f9 [ 1826.605603][ T9639] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1826.625037][ T9639] RSP: 002b:00007f05bf7a2fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1826.633278][ T9639] RAX: ffffffffffffffda RBX: 00007f05c0cb1f80 RCX: 00007f05c0b239f9 [ 1826.641087][ T9639] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 1826.648898][ T9639] RBP: 00007f05bf7a3090 R08: 0000000000000000 R09: 0000000000000000 [ 1826.656715][ T9639] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1826.664523][ T9639] R13: 0000000000000000 R14: 00007f05c0cb1f80 R15: 00007ffd12d06bc8 [ 1826.672348][ T9639] [ 1826.840728][ T9656] FAULT_INJECTION: forcing a failure. [ 1826.840728][ T9656] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1826.856689][ T9656] CPU: 1 PID: 9656 Comm: syz.3.15459 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 1826.866580][ T9656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1826.876481][ T9656] Call Trace: [ 1826.879601][ T9656] [ 1826.882377][ T9656] dump_stack_lvl+0x151/0x1b7 [ 1826.886891][ T9656] ? io_uring_drop_tctx_refs+0x190/0x190 [ 1826.892356][ T9656] ? sched_clock+0x9/0x10 [ 1826.896527][ T9656] ? native_set_ldt+0x360/0x360 [ 1826.901213][ T9656] dump_stack+0x15/0x17 [ 1826.905205][ T9656] should_fail+0x3c6/0x510 [ 1826.909460][ T9656] should_fail_alloc_page+0x5a/0x80 [ 1826.914491][ T9656] prepare_alloc_pages+0x15c/0x700 [ 1826.919438][ T9656] ? __alloc_pages+0x8f0/0x8f0 [ 1826.924042][ T9656] ? __alloc_pages_bulk+0xe40/0xe40 [ 1826.929076][ T9656] __alloc_pages+0x18c/0x8f0 [ 1826.933503][ T9656] ? prep_new_page+0x110/0x110 [ 1826.938104][ T9656] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 1826.943747][ T9656] pcpu_populate_chunk+0x18c/0xe30 [ 1826.948696][ T9656] ? pcpu_chunk_relocate+0x139/0x430 [ 1826.953813][ T9656] pcpu_alloc+0x984/0x13e0 [ 1826.958064][ T9656] __alloc_percpu_gfp+0x27/0x30 [ 1826.962747][ T9656] bpf_map_alloc_percpu+0xe6/0x160 [ 1826.967698][ T9656] array_map_alloc+0x3a5/0x6d0 [ 1826.972297][ T9656] map_create+0x411/0x2050 [ 1826.976550][ T9656] __sys_bpf+0x296/0x760 [ 1826.980629][ T9656] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1826.985841][ T9656] __x64_sys_bpf+0x7c/0x90 [ 1826.990097][ T9656] do_syscall_64+0x3d/0xb0 [ 1826.994335][ T9656] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 1826.999977][ T9656] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1827.005705][ T9656] RIP: 0033:0x7f1260bdd9f9 [ 1827.009963][ T9656] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1827.029405][ T9656] RSP: 002b:00007f125f85d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1827.037648][ T9656] RAX: ffffffffffffffda RBX: 00007f1260d6bf80 RCX: 00007f1260bdd9f9 [ 1827.045544][ T9656] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 2000000000000000 [ 1827.053441][ T9656] RBP: 00007f125f85d090 R08: 0000000000000000 R09: 0000000000000000 [ 1827.061253][ T9656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1827.069066][ T9656] R13: 0000000000000000 R14: 00007f1260d6bf80 R15: 00007ffcf1319148 [ 1827.076992][ T9656] [ 1827.106565][ T9652] device pim6reg1 entered promiscuous mode [ 1827.397451][ T335] device bridge_slave_1 left promiscuous mode [ 1827.404755][ T335] bridge0: port 2(bridge_slave_1) entered disabled state [ 1827.489780][ T335] device bridge_slave_0 left promiscuous mode [ 1827.525603][ T335] bridge0: port 1(bridge_slave_0) entered disabled state [ 1827.573569][ T335] device veth1_macvtap left promiscuous mode [ 1827.586072][ T335] device veth0_vlan left promiscuous mode [ 1827.741287][ T30] audit: type=1400 audit(1723090328.607:152): avc: denied { create } for pid=9675 comm="syz.2.15466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 1827.851817][ T9678] device pim6reg1 entered promiscuous mode [ 1828.157071][ T9691] FAULT_INJECTION: forcing a failure. [ 1828.157071][ T9691] name failslab, interval 1, probability 0, space 0, times 0 [ 1828.287153][ T9691] CPU: 1 PID: 9691 Comm: syz.1.15471 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 1828.296976][ T9691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1828.306871][ T9691] Call Trace: [ 1828.309998][ T9691] [ 1828.312775][ T9691] dump_stack_lvl+0x151/0x1b7 [ 1828.317292][ T9691] ? io_uring_drop_tctx_refs+0x190/0x190 [ 1828.322754][ T9691] ? __queue_delayed_work+0x182/0x1f0 [ 1828.327965][ T9691] dump_stack+0x15/0x17 [ 1828.331953][ T9691] should_fail+0x3c6/0x510 [ 1828.336212][ T9691] __should_failslab+0xa4/0xe0 [ 1828.340808][ T9691] ? __alloc_skb+0xbe/0x550 [ 1828.345146][ T9691] should_failslab+0x9/0x20 [ 1828.349483][ T9691] slab_pre_alloc_hook+0x37/0xd0 [ 1828.354262][ T9691] ? __alloc_skb+0xbe/0x550 [ 1828.358600][ T9691] kmem_cache_alloc+0x44/0x200 [ 1828.363200][ T9691] __alloc_skb+0xbe/0x550 [ 1828.367484][ T9691] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 1828.372678][ T9691] rtmsg_ifinfo+0x78/0x120 [ 1828.376937][ T9691] __dev_notify_flags+0xdd/0x610 [ 1828.381703][ T9691] ? __dev_change_flags+0x6e0/0x6e0 [ 1828.386734][ T9691] ? __dev_change_flags+0x505/0x6e0 [ 1828.391862][ T9691] ? dev_get_flags+0x1e0/0x1e0 [ 1828.396461][ T9691] dev_change_flags+0xf0/0x1a0 [ 1828.401067][ T9691] dev_ifsioc+0x147/0x10c0 [ 1828.405315][ T9691] ? dev_ioctl+0xe70/0xe70 [ 1828.409566][ T9691] ? mutex_lock+0xb6/0x1e0 [ 1828.413825][ T9691] ? wait_for_completion_killable_timeout+0x10/0x10 [ 1828.420241][ T9691] dev_ioctl+0x54d/0xe70 [ 1828.424328][ T9691] sock_do_ioctl+0x34f/0x5a0 [ 1828.428748][ T9691] ? sock_show_fdinfo+0xa0/0xa0 [ 1828.433442][ T9691] ? selinux_file_ioctl+0x3cc/0x540 [ 1828.438555][ T9691] sock_ioctl+0x455/0x740 [ 1828.442719][ T9691] ? sock_poll+0x400/0x400 [ 1828.446972][ T9691] ? __fget_files+0x31e/0x380 [ 1828.451491][ T9691] ? security_file_ioctl+0x84/0xb0 [ 1828.456430][ T9691] ? sock_poll+0x400/0x400 [ 1828.460683][ T9691] __se_sys_ioctl+0x114/0x190 [ 1828.465199][ T9691] __x64_sys_ioctl+0x7b/0x90 [ 1828.469625][ T9691] do_syscall_64+0x3d/0xb0 [ 1828.473877][ T9691] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1828.479606][ T9691] RIP: 0033:0x7f3dabe659f9 [ 1828.483856][ T9691] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1828.503301][ T9691] RSP: 002b:00007f3daaae5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1828.511544][ T9691] RAX: ffffffffffffffda RBX: 00007f3dabff3f80 RCX: 00007f3dabe659f9 [ 1828.519353][ T9691] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000007 [ 1828.527164][ T9691] RBP: 00007f3daaae5090 R08: 0000000000000000 R09: 0000000000000000 [ 1828.534980][ T9691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1828.542790][ T9691] R13: 0000000000000000 R14: 00007f3dabff3f80 R15: 00007ffe8cf25208 [ 1828.550610][ T9691] [ 1828.707904][ T9691] bridge0: port 1(bridge_slave_0) entered disabled state [ 1828.735240][ T9698] O3ãc¤±: renamed from bridge_slave_0 [ 1828.931251][ T9705] FAULT_INJECTION: forcing a failure. [ 1828.931251][ T9705] name failslab, interval 1, probability 0, space 0, times 0 [ 1829.004037][ T9705] CPU: 1 PID: 9705 Comm: syz.1.15476 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 1829.013855][ T9705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1829.023748][ T9705] Call Trace: [ 1829.026873][ T9705] [ 1829.029649][ T9705] dump_stack_lvl+0x151/0x1b7 [ 1829.034166][ T9705] ? io_uring_drop_tctx_refs+0x190/0x190 [ 1829.039630][ T9705] ? avc_has_perm_noaudit+0x2dd/0x430 [ 1829.044841][ T9705] dump_stack+0x15/0x17 [ 1829.048835][ T9705] should_fail+0x3c6/0x510 [ 1829.053086][ T9705] __should_failslab+0xa4/0xe0 [ 1829.057685][ T9705] ? perf_event_alloc+0x122/0x1b00 [ 1829.062631][ T9705] should_failslab+0x9/0x20 [ 1829.066971][ T9705] slab_pre_alloc_hook+0x37/0xd0 [ 1829.071745][ T9705] ? perf_event_alloc+0x122/0x1b00 [ 1829.076696][ T9705] kmem_cache_alloc+0x44/0x200 [ 1829.081295][ T9705] perf_event_alloc+0x122/0x1b00 [ 1829.086063][ T9705] ? _raw_spin_unlock+0x4d/0x70 [ 1829.090752][ T9705] ? alloc_fd+0x4c6/0x590 [ 1829.094922][ T9705] __se_sys_perf_event_open+0x7b4/0x3ce0 [ 1829.100387][ T9705] ? file_end_write+0x1c0/0x1c0 [ 1829.105076][ T9705] ? wait_for_completion_killable_timeout+0x10/0x10 [ 1829.111498][ T9705] ? __mutex_lock_slowpath+0x10/0x10 [ 1829.116619][ T9705] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 1829.122103][ T9705] ? __kasan_check_write+0x14/0x20 [ 1829.127030][ T9705] ? fput_many+0x160/0x1b0 [ 1829.131288][ T9705] ? debug_smp_processor_id+0x17/0x20 [ 1829.136491][ T9705] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1829.142412][ T9705] __x64_sys_perf_event_open+0xbf/0xd0 [ 1829.147709][ T9705] do_syscall_64+0x3d/0xb0 [ 1829.151952][ T9705] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1829.157668][ T9705] RIP: 0033:0x7f3dabe659f9 [ 1829.161921][ T9705] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1829.181447][ T9705] RSP: 002b:00007f3daaae5038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1829.189695][ T9705] RAX: ffffffffffffffda RBX: 00007f3dabff3f80 RCX: 00007f3dabe659f9 [ 1829.197505][ T9705] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000000 [ 1829.205324][ T9705] RBP: 00007f3daaae5090 R08: 0000000000000000 R09: 0000000000000000 [ 1829.213127][ T9705] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1829.220938][ T9705] R13: 0000000000000000 R14: 00007f3dabff3f80 R15: 00007ffe8cf25208 [ 1829.228757][ T9705] [ 1829.834467][ T9724] FAULT_INJECTION: forcing a failure. [ 1829.834467][ T9724] name failslab, interval 1, probability 0, space 0, times 0 [ 1829.870492][ T9724] CPU: 0 PID: 9724 Comm: syz.4.15482 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 1829.880308][ T9724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1829.890199][ T9724] Call Trace: [ 1829.893324][ T9724] [ 1829.896100][ T9724] dump_stack_lvl+0x151/0x1b7 [ 1829.900614][ T9724] ? io_uring_drop_tctx_refs+0x190/0x190 [ 1829.906080][ T9724] ? __sched_text_start+0x8/0x8 [ 1829.910774][ T9724] dump_stack+0x15/0x17 [ 1829.914765][ T9724] should_fail+0x3c6/0x510 [ 1829.919016][ T9724] __should_failslab+0xa4/0xe0 [ 1829.923614][ T9724] ? prepare_creds+0x2f/0x6a0 [ 1829.928125][ T9724] should_failslab+0x9/0x20 [ 1829.932469][ T9724] slab_pre_alloc_hook+0x37/0xd0 [ 1829.937240][ T9724] ? prepare_creds+0x2f/0x6a0 [ 1829.941757][ T9724] kmem_cache_alloc+0x44/0x200 [ 1829.946355][ T9724] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 1829.951647][ T9724] prepare_creds+0x2f/0x6a0 [ 1829.955989][ T9724] copy_creds+0xf0/0x630 [ 1829.960071][ T9724] copy_process+0x7c3/0x3290 [ 1829.964498][ T9724] ? timerqueue_add+0x250/0x270 [ 1829.969182][ T9724] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1829.974125][ T9724] ? enqueue_hrtimer+0xca/0x240 [ 1829.978820][ T9724] ? __hrtimer_run_queues+0x46b/0xad0 [ 1829.984023][ T9724] kernel_clone+0x21e/0x9e0 [ 1829.988360][ T9724] ? irqentry_exit+0x30/0x40 [ 1829.992784][ T9724] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 1829.998427][ T9724] ? create_io_thread+0x1e0/0x1e0 [ 1830.003291][ T9724] __x64_sys_clone+0x23f/0x290 [ 1830.007888][ T9724] ? __do_sys_vfork+0x130/0x130 [ 1830.012576][ T9724] ? debug_smp_processor_id+0x17/0x20 [ 1830.017780][ T9724] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1830.023686][ T9724] ? exit_to_user_mode_prepare+0x39/0xa0 [ 1830.029153][ T9724] do_syscall_64+0x3d/0xb0 [ 1830.033520][ T9724] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 1830.039154][ T9724] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1830.044882][ T9724] RIP: 0033:0x7fc444dc69f9 [ 1830.049137][ T9724] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1830.068573][ T9724] RSP: 002b:00007fc443a45fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1830.076817][ T9724] RAX: ffffffffffffffda RBX: 00007fc444f54f80 RCX: 00007fc444dc69f9 [ 1830.084629][ T9724] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 1830.092442][ T9724] RBP: 00007fc443a46090 R08: 0000000000000000 R09: 0000000000000000 [ 1830.100252][ T9724] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1830.108062][ T9724] R13: 0000000000000000 R14: 00007fc444f54f80 R15: 00007ffd666e6028 [ 1830.115882][ T9724] [ 1830.589833][ T9744] FAULT_INJECTION: forcing a failure. [ 1830.589833][ T9744] name failslab, interval 1, probability 0, space 0, times 0 [ 1830.817138][ T9744] CPU: 1 PID: 9744 Comm: syz.3.15488 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 1830.826965][ T9744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1830.836854][ T9744] Call Trace: [ 1830.839978][ T9744] [ 1830.842754][ T9744] dump_stack_lvl+0x151/0x1b7 [ 1830.847276][ T9744] ? io_uring_drop_tctx_refs+0x190/0x190 [ 1830.852737][ T9744] ? kmem_cache_free+0x116/0x2e0 [ 1830.857526][ T9744] ? kasan_set_track+0x5d/0x70 [ 1830.862109][ T9744] ? kasan_set_free_info+0x23/0x40 [ 1830.867059][ T9744] ? ____kasan_slab_free+0x126/0x160 [ 1830.872175][ T9744] ? __kasan_slab_free+0x11/0x20 [ 1830.876947][ T9744] ? kmem_cache_free+0x116/0x2e0 [ 1830.881721][ T9744] ? putname+0xfa/0x150 [ 1830.885715][ T9744] dump_stack+0x15/0x17 [ 1830.889706][ T9744] should_fail+0x3c6/0x510 [ 1830.893962][ T9744] __should_failslab+0xa4/0xe0 [ 1830.898558][ T9744] should_failslab+0x9/0x20 [ 1830.902898][ T9744] slab_pre_alloc_hook+0x37/0xd0 [ 1830.907672][ T9744] __kmalloc+0x6d/0x270 [ 1830.911665][ T9744] ? bpf_test_init+0x101/0x1b0 [ 1830.916267][ T9744] bpf_test_init+0x101/0x1b0 [ 1830.920692][ T9744] bpf_prog_test_run_skb+0x268/0x1420 [ 1830.925898][ T9744] ? __kasan_check_write+0x14/0x20 [ 1830.930848][ T9744] ? proc_fail_nth_write+0x20b/0x290 [ 1830.935966][ T9744] ? selinux_file_permission+0x2c4/0x570 [ 1830.941434][ T9744] ? proc_fail_nth_read+0x210/0x210 [ 1830.946466][ T9744] ? fsnotify_perm+0x6a/0x5d0 [ 1830.950984][ T9744] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 1830.956709][ T9744] ? __kasan_check_write+0x14/0x20 [ 1830.961656][ T9744] ? fput_many+0x160/0x1b0 [ 1830.965909][ T9744] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 1830.971639][ T9744] bpf_prog_test_run+0x3b0/0x630 [ 1830.976412][ T9744] ? bpf_prog_query+0x220/0x220 [ 1830.981098][ T9744] ? selinux_bpf+0xd2/0x100 [ 1830.985437][ T9744] ? security_bpf+0x82/0xb0 [ 1830.989777][ T9744] __sys_bpf+0x525/0x760 [ 1830.994212][ T9744] ? fput_many+0x160/0x1b0 [ 1830.998571][ T9744] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1831.003777][ T9744] ? debug_smp_processor_id+0x17/0x20 [ 1831.008980][ T9744] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1831.014887][ T9744] __x64_sys_bpf+0x7c/0x90 [ 1831.019140][ T9744] do_syscall_64+0x3d/0xb0 [ 1831.023389][ T9744] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1831.029117][ T9744] RIP: 0033:0x7f1260bdd9f9 [ 1831.033374][ T9744] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1831.052811][ T9744] RSP: 002b:00007f125f83c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1831.061078][ T9744] RAX: ffffffffffffffda RBX: 00007f1260d6c058 RCX: 00007f1260bdd9f9 [ 1831.068873][ T9744] RDX: 0000000000000048 RSI: 0000000020000280 RDI: 000000000000000a [ 1831.076680][ T9744] RBP: 00007f125f83c090 R08: 0000000000000000 R09: 0000000000000000 [ 1831.084490][ T9744] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1831.092302][ T9744] R13: 0000000000000000 R14: 00007f1260d6c058 R15: 00007ffcf1319148 [ 1831.100338][ T9744] [ 1833.200244][ T9799] FAULT_INJECTION: forcing a failure. [ 1833.200244][ T9799] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1833.241888][ T9799] CPU: 1 PID: 9799 Comm: syz.0.15507 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 1833.251709][ T9799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1833.261602][ T9799] Call Trace: [ 1833.264725][ T9799] [ 1833.267505][ T9799] dump_stack_lvl+0x151/0x1b7 [ 1833.272024][ T9799] ? io_uring_drop_tctx_refs+0x190/0x190 [ 1833.277503][ T9799] ? kasan_set_track+0x5d/0x70 [ 1833.282099][ T9799] ? __kasan_slab_free+0x11/0x20 [ 1833.286862][ T9799] ? kmem_cache_free+0x116/0x2e0 [ 1833.291629][ T9799] ? putname+0xfa/0x150 [ 1833.295629][ T9799] ? do_sys_openat2+0x71c/0x830 [ 1833.300312][ T9799] ? do_syscall_64+0x3d/0xb0 [ 1833.304745][ T9799] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1833.310648][ T9799] dump_stack+0x15/0x17 [ 1833.314633][ T9799] should_fail+0x3c6/0x510 [ 1833.318886][ T9799] should_fail_usercopy+0x1a/0x20 [ 1833.323744][ T9799] _copy_from_user+0x20/0xd0 [ 1833.328180][ T9799] iovec_from_user+0xc7/0x330 [ 1833.332684][ T9799] __import_iovec+0x6d/0x420 [ 1833.337110][ T9799] import_iovec+0xe5/0x120 [ 1833.341364][ T9799] ___sys_recvmsg+0x56b/0x690 [ 1833.345883][ T9799] ? __sys_recvmsg+0x260/0x260 [ 1833.350474][ T9799] ? vfs_write+0x9ec/0x1110 [ 1833.354823][ T9799] ? __fdget+0x1bc/0x240 [ 1833.358896][ T9799] __x64_sys_recvmsg+0x1dc/0x2b0 [ 1833.363665][ T9799] ? fput+0x1a/0x20 [ 1833.367312][ T9799] ? ___sys_recvmsg+0x690/0x690 [ 1833.371998][ T9799] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1833.377901][ T9799] ? exit_to_user_mode_prepare+0x39/0xa0 [ 1833.383369][ T9799] do_syscall_64+0x3d/0xb0 [ 1833.387624][ T9799] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1833.393364][ T9799] RIP: 0033:0x7f05c0b239f9 [ 1833.397602][ T9799] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1833.417048][ T9799] RSP: 002b:00007f05bf7a3038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1833.425287][ T9799] RAX: ffffffffffffffda RBX: 00007f05c0cb1f80 RCX: 00007f05c0b239f9 [ 1833.433100][ T9799] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000003 [ 1833.441020][ T9799] RBP: 00007f05bf7a3090 R08: 0000000000000000 R09: 0000000000000000 [ 1833.448828][ T9799] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1833.456639][ T9799] R13: 0000000000000000 R14: 00007f05c0cb1f80 R15: 00007ffd12d06bc8 [ 1833.464463][ T9799] [ 1833.495309][ T9804] device syzkaller0 entered promiscuous mode [ 1833.507388][ T9809] FAULT_INJECTION: forcing a failure. [ 1833.507388][ T9809] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1833.521912][ T9809] CPU: 1 PID: 9809 Comm: syz.3.15510 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 1833.531744][ T9809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1833.541624][ T9809] Call Trace: [ 1833.544750][ T9809] [ 1833.547523][ T9809] dump_stack_lvl+0x151/0x1b7 [ 1833.552042][ T9809] ? io_uring_drop_tctx_refs+0x190/0x190 [ 1833.557509][ T9809] dump_stack+0x15/0x17 [ 1833.561498][ T9809] should_fail+0x3c6/0x510 [ 1833.565755][ T9809] should_fail_usercopy+0x1a/0x20 [ 1833.570611][ T9809] _copy_from_user+0x20/0xd0 [ 1833.575045][ T9809] __sys_bpf+0x1e9/0x760 [ 1833.579118][ T9809] ? fput_many+0x160/0x1b0 [ 1833.583374][ T9809] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1833.588582][ T9809] ? debug_smp_processor_id+0x17/0x20 [ 1833.593793][ T9809] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1833.599689][ T9809] __x64_sys_bpf+0x7c/0x90 [ 1833.603942][ T9809] do_syscall_64+0x3d/0xb0 [ 1833.608193][ T9809] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1833.613921][ T9809] RIP: 0033:0x7f1260bdd9f9 [ 1833.618171][ T9809] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1833.637614][ T9809] RSP: 002b:00007f125f85d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1833.645861][ T9809] RAX: ffffffffffffffda RBX: 00007f1260d6bf80 RCX: 00007f1260bdd9f9 [ 1833.653669][ T9809] RDX: 0000000000000018 RSI: 0000000020000600 RDI: 0000000000000007 [ 1833.661476][ T9809] RBP: 00007f125f85d090 R08: 0000000000000000 R09: 0000000000000000 [ 1833.669288][ T9809] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1833.677100][ T9809] R13: 0000000000000000 R14: 00007f1260d6bf80 R15: 00007ffcf1319148 [ 1833.684922][ T9809] [ 1833.967164][ T9822] FAULT_INJECTION: forcing a failure. [ 1833.967164][ T9822] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1833.989662][ T9822] CPU: 1 PID: 9822 Comm: syz.2.15515 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 1833.999506][ T9822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1834.009398][ T9822] Call Trace: [ 1834.012524][ T9822] [ 1834.015301][ T9822] dump_stack_lvl+0x151/0x1b7 [ 1834.019813][ T9822] ? io_uring_drop_tctx_refs+0x190/0x190 [ 1834.025282][ T9822] dump_stack+0x15/0x17 [ 1834.029271][ T9822] should_fail+0x3c6/0x510 [ 1834.033528][ T9822] should_fail_usercopy+0x1a/0x20 [ 1834.038386][ T9822] _copy_from_user+0x20/0xd0 [ 1834.042809][ T9822] __sys_bpf+0x1e9/0x760 [ 1834.046890][ T9822] ? fput_many+0x160/0x1b0 [ 1834.051139][ T9822] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1834.056349][ T9822] ? debug_smp_processor_id+0x17/0x20 [ 1834.061555][ T9822] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1834.067572][ T9822] __x64_sys_bpf+0x7c/0x90 [ 1834.071822][ T9822] do_syscall_64+0x3d/0xb0 [ 1834.076073][ T9822] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1834.081804][ T9822] RIP: 0033:0x7fcbb50329f9 [ 1834.086060][ T9822] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1834.105497][ T9822] RSP: 002b:00007fcbb3cb2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1834.113749][ T9822] RAX: ffffffffffffffda RBX: 00007fcbb51c0f80 RCX: 00007fcbb50329f9 [ 1834.121552][ T9822] RDX: 0000000000000018 RSI: 0000000020000600 RDI: 0000000000000007 [ 1834.129365][ T9822] RBP: 00007fcbb3cb2090 R08: 0000000000000000 R09: 0000000000000000 [ 1834.137174][ T9822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1834.144989][ T9822] R13: 0000000000000000 R14: 00007fcbb51c0f80 R15: 00007ffded251da8 [ 1834.152822][ T9822] [ 1834.869127][ T9850] device wg2 entered promiscuous mode [ 1835.248127][ T9868] FAULT_INJECTION: forcing a failure. [ 1835.248127][ T9868] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1835.324775][ T9868] CPU: 1 PID: 9868 Comm: syz.1.15529 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 1835.334604][ T9868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1835.344497][ T9868] Call Trace: [ 1835.347709][ T9868] [ 1835.350484][ T9868] dump_stack_lvl+0x151/0x1b7 [ 1835.354996][ T9868] ? io_uring_drop_tctx_refs+0x190/0x190 [ 1835.360467][ T9868] ? stack_trace_save+0x113/0x1c0 [ 1835.365331][ T9868] dump_stack+0x15/0x17 [ 1835.369317][ T9868] should_fail+0x3c6/0x510 [ 1835.373571][ T9868] should_fail_alloc_page+0x5a/0x80 [ 1835.378695][ T9868] prepare_alloc_pages+0x15c/0x700 [ 1835.383639][ T9868] ? __alloc_pages_bulk+0xe40/0xe40 [ 1835.388667][ T9868] ? do_syscall_64+0x3d/0xb0 [ 1835.393102][ T9868] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1835.399004][ T9868] __alloc_pages+0x18c/0x8f0 [ 1835.403512][ T9868] ? prep_new_page+0x110/0x110 [ 1835.408114][ T9868] kmalloc_order+0x4a/0x160 [ 1835.412449][ T9868] kmalloc_order_trace+0x1a/0xb0 [ 1835.417222][ T9868] ? alloc_skb_with_frags+0xa6/0x680 [ 1835.422347][ T9868] __kmalloc_track_caller+0x19b/0x260 [ 1835.427549][ T9868] ? kmem_cache_alloc+0xf5/0x200 [ 1835.432324][ T9868] ? alloc_skb_with_frags+0xa6/0x680 [ 1835.437451][ T9868] __alloc_skb+0x10c/0x550 [ 1835.441702][ T9868] alloc_skb_with_frags+0xa6/0x680 [ 1835.446666][ T9868] ? 0xffffffffa002a54c [ 1835.450640][ T9868] ? is_bpf_text_address+0x172/0x190 [ 1835.455763][ T9868] ? stack_trace_save+0x1c0/0x1c0 [ 1835.460631][ T9868] sock_alloc_send_pskb+0x915/0xa50 [ 1835.465660][ T9868] ? sock_kzfree_s+0x60/0x60 [ 1835.470090][ T9868] ? stack_trace_snprint+0xf0/0xf0 [ 1835.475029][ T9868] ? __stack_depot_save+0x34/0x470 [ 1835.479979][ T9868] tun_get_user+0xf1b/0x3aa0 [ 1835.484404][ T9868] ? kasan_set_track+0x4b/0x70 [ 1835.489000][ T9868] ? kasan_set_free_info+0x23/0x40 [ 1835.493959][ T9868] ? _kstrtoull+0x3a0/0x4a0 [ 1835.498296][ T9868] ? tun_do_read+0x1ef0/0x1ef0 [ 1835.502892][ T9868] ? kstrtouint_from_user+0x20a/0x2a0 [ 1835.508102][ T9868] ? kstrtol_from_user+0x310/0x310 [ 1835.513050][ T9868] ? avc_policy_seqno+0x1b/0x70 [ 1835.517733][ T9868] ? selinux_file_permission+0x2c4/0x570 [ 1835.523201][ T9868] tun_chr_write_iter+0x1e1/0x2e0 [ 1835.528060][ T9868] vfs_write+0xd5d/0x1110 [ 1835.532222][ T9868] ? kmem_cache_free+0x2c3/0x2e0 [ 1835.536998][ T9868] ? file_end_write+0x1c0/0x1c0 [ 1835.541689][ T9868] ? __fdget_pos+0x209/0x3a0 [ 1835.546111][ T9868] ? ksys_write+0x77/0x2c0 [ 1835.550366][ T9868] ksys_write+0x199/0x2c0 [ 1835.554531][ T9868] ? __ia32_sys_read+0x90/0x90 [ 1835.559131][ T9868] ? debug_smp_processor_id+0x17/0x20 [ 1835.564337][ T9868] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1835.570240][ T9868] __x64_sys_write+0x7b/0x90 [ 1835.574664][ T9868] do_syscall_64+0x3d/0xb0 [ 1835.579006][ T9868] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1835.584733][ T9868] RIP: 0033:0x7f3dabe659f9 [ 1835.588997][ T9868] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1835.608426][ T9868] RSP: 002b:00007f3daaae5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1835.616673][ T9868] RAX: ffffffffffffffda RBX: 00007f3dabff3f80 RCX: 00007f3dabe659f9 [ 1835.624484][ T9868] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 1835.632293][ T9868] RBP: 00007f3daaae5090 R08: 0000000000000000 R09: 0000000000000000 [ 1835.640102][ T9868] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1835.648004][ T9868] R13: 0000000000000000 R14: 00007f3dabff3f80 R15: 00007ffe8cf25208 [ 1835.655823][ T9868] [ 1835.773044][ T9881] FAULT_INJECTION: forcing a failure. [ 1835.773044][ T9881] name failslab, interval 1, probability 0, space 0, times 0 [ 1835.824646][ T9881] CPU: 0 PID: 9881 Comm: syz.1.15534 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 1835.834466][ T9881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1835.844457][ T9881] Call Trace: [ 1835.847678][ T9881] [ 1835.850447][ T9881] dump_stack_lvl+0x151/0x1b7 [ 1835.854965][ T9881] ? io_uring_drop_tctx_refs+0x190/0x190 [ 1835.860424][ T9881] ? kmem_cache_free+0x116/0x2e0 [ 1835.865199][ T9881] ? kasan_set_track+0x5d/0x70 [ 1835.869803][ T9881] ? kasan_set_free_info+0x23/0x40 [ 1835.874746][ T9881] ? ____kasan_slab_free+0x126/0x160 [ 1835.879865][ T9881] ? __kasan_slab_free+0x11/0x20 [ 1835.884641][ T9881] ? kmem_cache_free+0x116/0x2e0 [ 1835.889438][ T9881] ? putname+0xfa/0x150 [ 1835.893407][ T9881] dump_stack+0x15/0x17 [ 1835.897403][ T9881] should_fail+0x3c6/0x510 [ 1835.901654][ T9881] __should_failslab+0xa4/0xe0 [ 1835.906338][ T9881] should_failslab+0x9/0x20 [ 1835.910677][ T9881] slab_pre_alloc_hook+0x37/0xd0 [ 1835.915456][ T9881] __kmalloc+0x6d/0x270 [ 1835.919443][ T9881] ? bpf_test_init+0x101/0x1b0 [ 1835.924049][ T9881] bpf_test_init+0x101/0x1b0 [ 1835.928489][ T9881] bpf_prog_test_run_skb+0x268/0x1420 [ 1835.933680][ T9881] ? __kasan_check_write+0x14/0x20 [ 1835.938623][ T9881] ? proc_fail_nth_write+0x20b/0x290 [ 1835.943747][ T9881] ? selinux_file_permission+0x2c4/0x570 [ 1835.949218][ T9881] ? proc_fail_nth_read+0x210/0x210 [ 1835.954251][ T9881] ? fsnotify_perm+0x6a/0x5d0 [ 1835.958774][ T9881] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 1835.964489][ T9881] ? __kasan_check_write+0x14/0x20 [ 1835.969435][ T9881] ? fput_many+0x160/0x1b0 [ 1835.973687][ T9881] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 1835.979423][ T9881] bpf_prog_test_run+0x3b0/0x630 [ 1835.984195][ T9881] ? bpf_prog_query+0x220/0x220 [ 1835.988884][ T9881] ? selinux_bpf+0xd2/0x100 [ 1835.993219][ T9881] ? security_bpf+0x82/0xb0 [ 1835.997559][ T9881] __sys_bpf+0x525/0x760 [ 1836.001637][ T9881] ? fput_many+0x160/0x1b0 [ 1836.005890][ T9881] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1836.011103][ T9881] ? debug_smp_processor_id+0x17/0x20 [ 1836.016308][ T9881] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1836.022208][ T9881] __x64_sys_bpf+0x7c/0x90 [ 1836.026460][ T9881] do_syscall_64+0x3d/0xb0 [ 1836.030732][ T9881] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1836.036442][ T9881] RIP: 0033:0x7f3dabe659f9 [ 1836.040692][ T9881] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1836.060235][ T9881] RSP: 002b:00007f3daaae5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1836.068476][ T9881] RAX: ffffffffffffffda RBX: 00007f3dabff3f80 RCX: 00007f3dabe659f9 [ 1836.076286][ T9881] RDX: 0000000000000050 RSI: 0000000020000000 RDI: 000000000000000a [ 1836.084121][ T9881] RBP: 00007f3daaae5090 R08: 0000000000000000 R09: 0000000000000000 [ 1836.091919][ T9881] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1836.099734][ T9881] R13: 0000000000000000 R14: 00007f3dabff3f80 R15: 00007ffe8cf25208 [ 1836.107544][ T9881] [ 1836.110776][ T9886] FAULT_INJECTION: forcing a failure. [ 1836.110776][ T9886] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1836.187001][ T9886] CPU: 0 PID: 9886 Comm: syz.4.15536 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 1836.196835][ T9886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1836.206729][ T9886] Call Trace: [ 1836.209852][ T9886] [ 1836.212631][ T9886] dump_stack_lvl+0x151/0x1b7 [ 1836.217140][ T9886] ? io_uring_drop_tctx_refs+0x190/0x190 [ 1836.222608][ T9886] ? ____sys_recvmsg+0x420/0x530 [ 1836.227380][ T9886] dump_stack+0x15/0x17 [ 1836.231372][ T9886] should_fail+0x3c6/0x510 [ 1836.235629][ T9886] should_fail_usercopy+0x1a/0x20 [ 1836.240491][ T9886] _copy_to_user+0x20/0x90 [ 1836.244740][ T9886] simple_read_from_buffer+0xc7/0x150 [ 1836.249949][ T9886] proc_fail_nth_read+0x1a3/0x210 [ 1836.254811][ T9886] ? proc_fault_inject_write+0x390/0x390 [ 1836.260273][ T9886] ? fsnotify_perm+0x470/0x5d0 [ 1836.264875][ T9886] ? security_file_permission+0x86/0xb0 [ 1836.270253][ T9886] ? proc_fault_inject_write+0x390/0x390 [ 1836.275725][ T9886] vfs_read+0x27d/0xd40 [ 1836.279717][ T9886] ? kernel_read+0x1f0/0x1f0 [ 1836.284141][ T9886] ? __kasan_check_write+0x14/0x20 [ 1836.289086][ T9886] ? mutex_lock+0xb6/0x1e0 [ 1836.293340][ T9886] ? wait_for_completion_killable_timeout+0x10/0x10 [ 1836.299776][ T9886] ? __fdget_pos+0x2e7/0x3a0 [ 1836.304190][ T9886] ? ksys_read+0x77/0x2c0 [ 1836.308464][ T9886] ksys_read+0x199/0x2c0 [ 1836.312542][ T9886] ? vfs_write+0x1110/0x1110 [ 1836.316970][ T9886] ? __kasan_check_read+0x11/0x20 [ 1836.321829][ T9886] __x64_sys_read+0x7b/0x90 [ 1836.326171][ T9886] do_syscall_64+0x3d/0xb0 [ 1836.330423][ T9886] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1836.336151][ T9886] RIP: 0033:0x7fc444dc543c [ 1836.340493][ T9886] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8d 02 00 48 [ 1836.359929][ T9886] RSP: 002b:00007fc443a25030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1836.368178][ T9886] RAX: ffffffffffffffda RBX: 00007fc444f55058 RCX: 00007fc444dc543c [ 1836.375987][ T9886] RDX: 000000000000000f RSI: 00007fc443a250a0 RDI: 0000000000000005 [ 1836.383798][ T9886] RBP: 00007fc443a25090 R08: 0000000000000000 R09: 0000000000000000 [ 1836.391611][ T9886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1836.399420][ T9886] R13: 0000000000000000 R14: 00007fc444f55058 R15: 00007ffd666e6028 [ 1836.407236][ T9886] [ 1836.487597][ T9901] device veth0_vlan left promiscuous mode [ 1836.506055][ T9901] device veth0_vlan entered promiscuous mode [ 1836.555885][T19415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1836.575730][T19415] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1836.626448][T19415] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1837.285232][ T9936] device syzkaller0 entered promiscuous mode [ 1837.427132][ T9944] FAULT_INJECTION: forcing a failure. [ 1837.427132][ T9944] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1837.444476][ T9944] CPU: 1 PID: 9944 Comm: syz.3.15555 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 1837.454285][ T9944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1837.464174][ T9944] Call Trace: [ 1837.467297][ T9944] [ 1837.470076][ T9944] dump_stack_lvl+0x151/0x1b7 [ 1837.474599][ T9944] ? io_uring_drop_tctx_refs+0x190/0x190 [ 1837.480057][ T9944] ? ____kasan_kmalloc+0xed/0x110 [ 1837.484915][ T9944] ? ____kasan_kmalloc+0xdb/0x110 [ 1837.489775][ T9944] ? __kasan_kmalloc+0x9/0x10 [ 1837.494289][ T9944] ? __kmalloc_track_caller+0x139/0x260 [ 1837.499672][ T9944] dump_stack+0x15/0x17 [ 1837.503661][ T9944] should_fail+0x3c6/0x510 [ 1837.507916][ T9944] should_fail_alloc_page+0x5a/0x80 [ 1837.512951][ T9944] prepare_alloc_pages+0x15c/0x700 [ 1837.517899][ T9944] ? __alloc_pages_bulk+0xe40/0xe40 [ 1837.522930][ T9944] __alloc_pages+0x18c/0x8f0 [ 1837.527354][ T9944] ? prep_new_page+0x110/0x110 [ 1837.531958][ T9944] ? __kasan_check_write+0x14/0x20 [ 1837.536989][ T9944] ? __alloc_skb+0x355/0x550 [ 1837.541422][ T9944] alloc_skb_with_frags+0x1b3/0x680 [ 1837.546477][ T9944] ? perf_callchain_user+0xe8d/0x1180 [ 1837.551661][ T9944] ? memcpy+0x56/0x70 [ 1837.555479][ T9944] sock_alloc_send_pskb+0x915/0xa50 [ 1837.560523][ T9944] ? sock_kzfree_s+0x60/0x60 [ 1837.564942][ T9944] ? security_socket_getpeersec_dgram+0xaa/0xc0 [ 1837.571014][ T9944] unix_stream_sendmsg+0x4b4/0x1060 [ 1837.576052][ T9944] ? unix_show_fdinfo+0xa0/0xa0 [ 1837.580735][ T9944] ? unix_show_fdinfo+0xa0/0xa0 [ 1837.585422][ T9944] ? ____sys_sendmsg+0x525/0x8f0 [ 1837.590196][ T9944] ? unix_show_fdinfo+0xa0/0xa0 [ 1837.594879][ T9944] ____sys_sendmsg+0x59e/0x8f0 [ 1837.599499][ T9944] ? __sys_sendmsg_sock+0x40/0x40 [ 1837.604342][ T9944] ? import_iovec+0xe5/0x120 [ 1837.608770][ T9944] ___sys_sendmsg+0x252/0x2e0 [ 1837.613284][ T9944] ? __sys_sendmsg+0x260/0x260 [ 1837.617892][ T9944] ? __fdget+0x1bc/0x240 [ 1837.621962][ T9944] __se_sys_sendmsg+0x19a/0x260 [ 1837.626646][ T9944] ? __x64_sys_sendmsg+0x90/0x90 [ 1837.631423][ T9944] ? ksys_write+0x260/0x2c0 [ 1837.635764][ T9944] ? debug_smp_processor_id+0x17/0x20 [ 1837.640965][ T9944] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1837.646875][ T9944] __x64_sys_sendmsg+0x7b/0x90 [ 1837.651470][ T9944] do_syscall_64+0x3d/0xb0 [ 1837.655720][ T9944] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 1837.661364][ T9944] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1837.667092][ T9944] RIP: 0033:0x7f1260bdd9f9 [ 1837.671349][ T9944] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1837.690788][ T9944] RSP: 002b:00007f125f85d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1837.699029][ T9944] RAX: ffffffffffffffda RBX: 00007f1260d6bf80 RCX: 00007f1260bdd9f9 [ 1837.706843][ T9944] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 000000000000000a [ 1837.714655][ T9944] RBP: 00007f125f85d090 R08: 0000000000000000 R09: 0000000000000000 [ 1837.722465][ T9944] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1837.730279][ T9944] R13: 0000000000000000 R14: 00007f1260d6bf80 R15: 00007ffcf1319148 [ 1837.738094][ T9944] [ 1838.173032][ T9956] device veth0_vlan left promiscuous mode [ 1838.179521][ T9956] device veth0_vlan entered promiscuous mode [ 1838.270478][ T9964] FAULT_INJECTION: forcing a failure. [ 1838.270478][ T9964] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1838.283574][ T9964] CPU: 1 PID: 9964 Comm: syz.3.15560 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 1838.293375][ T9964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1838.303269][ T9964] Call Trace: [ 1838.306389][ T9964] [ 1838.309166][ T9964] dump_stack_lvl+0x151/0x1b7 [ 1838.313679][ T9964] ? io_uring_drop_tctx_refs+0x190/0x190 [ 1838.319148][ T9964] dump_stack+0x15/0x17 [ 1838.323139][ T9964] should_fail+0x3c6/0x510 [ 1838.327391][ T9964] should_fail_usercopy+0x1a/0x20 [ 1838.332252][ T9964] copy_page_from_iter+0x2eb/0x640 [ 1838.337203][ T9964] pipe_write+0x92b/0x1930 [ 1838.341461][ T9964] ? pipe_read+0x1040/0x1040 [ 1838.345878][ T9964] ? selinux_file_permission+0x450/0x570 [ 1838.351350][ T9964] ? fsnotify_perm+0x6a/0x5d0 [ 1838.355859][ T9964] ? iov_iter_init+0x53/0x190 [ 1838.360391][ T9964] vfs_write+0xd5d/0x1110 [ 1838.364540][ T9964] ? kmem_cache_free+0x116/0x2e0 [ 1838.369316][ T9964] ? file_end_write+0x1c0/0x1c0 [ 1838.374001][ T9964] ? __fdget_pos+0x209/0x3a0 [ 1838.378427][ T9964] ? ksys_write+0x77/0x2c0 [ 1838.382680][ T9964] ksys_write+0x199/0x2c0 [ 1838.386845][ T9964] ? bpf_trace_run1+0x1c0/0x1c0 [ 1838.391529][ T9964] ? __ia32_sys_read+0x90/0x90 [ 1838.396131][ T9964] ? __bpf_trace_sys_enter+0x62/0x70 [ 1838.401260][ T9964] __x64_sys_write+0x7b/0x90 [ 1838.405679][ T9964] do_syscall_64+0x3d/0xb0 [ 1838.409932][ T9964] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1838.415659][ T9964] RIP: 0033:0x7f1260bdd9f9 [ 1838.419912][ T9964] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1838.439353][ T9964] RSP: 002b:00007f125f85d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1838.447598][ T9964] RAX: ffffffffffffffda RBX: 00007f1260d6bf80 RCX: 00007f1260bdd9f9 [ 1838.455415][ T9964] RDX: 000000000000fdef RSI: 0000000020000580 RDI: 0000000000000000 [ 1838.463223][ T9964] RBP: 00007f125f85d090 R08: 0000000000000000 R09: 0000000000000000 [ 1838.471119][ T9964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1838.478930][ T9964] R13: 0000000000000000 R14: 00007f1260d6bf80 R15: 00007ffcf1319148 [ 1838.486748][ T9964] [ 1838.747108][ T9985] FAULT_INJECTION: forcing a failure. [ 1838.747108][ T9985] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1838.850564][ T9985] CPU: 1 PID: 9985 Comm: syz.3.15565 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 1838.860389][ T9985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1838.870280][ T9985] Call Trace: [ 1838.873405][ T9985] [ 1838.876188][ T9985] dump_stack_lvl+0x151/0x1b7 [ 1838.880702][ T9985] ? io_uring_drop_tctx_refs+0x190/0x190 [ 1838.886171][ T9985] ? __stack_depot_save+0x34/0x470 [ 1838.891111][ T9985] ? kmem_cache_free+0x116/0x2e0 [ 1838.895886][ T9985] dump_stack+0x15/0x17 [ 1838.899881][ T9985] should_fail+0x3c6/0x510 [ 1838.904134][ T9985] should_fail_usercopy+0x1a/0x20 [ 1838.908990][ T9985] _copy_from_user+0x20/0xd0 [ 1838.913424][ T9985] iovec_from_user+0xc7/0x330 [ 1838.917934][ T9985] __import_iovec+0x6d/0x420 [ 1838.922359][ T9985] ? __ia32_sys_shutdown+0x70/0x70 [ 1838.927308][ T9985] import_iovec+0xe5/0x120 [ 1838.931563][ T9985] ___sys_sendmsg+0x215/0x2e0 [ 1838.936072][ T9985] ? __sys_sendmsg+0x260/0x260 [ 1838.940684][ T9985] ? __fdget+0x1bc/0x240 [ 1838.944750][ T9985] __se_sys_sendmsg+0x19a/0x260 [ 1838.949440][ T9985] ? __x64_sys_sendmsg+0x90/0x90 [ 1838.954209][ T9985] ? ksys_write+0x260/0x2c0 [ 1838.958553][ T9985] ? debug_smp_processor_id+0x17/0x20 [ 1838.963845][ T9985] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1838.969748][ T9985] __x64_sys_sendmsg+0x7b/0x90 [ 1838.974348][ T9985] do_syscall_64+0x3d/0xb0 [ 1838.978602][ T9985] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1838.984343][ T9985] RIP: 0033:0x7f1260bdd9f9 [ 1838.988667][ T9985] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1839.008108][ T9985] RSP: 002b:00007f125f83c038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1839.016352][ T9985] RAX: ffffffffffffffda RBX: 00007f1260d6c058 RCX: 00007f1260bdd9f9 [ 1839.024163][ T9985] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000008 [ 1839.031997][ T9985] RBP: 00007f125f83c090 R08: 0000000000000000 R09: 0000000000000000 [ 1839.039787][ T9985] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1839.047686][ T9985] R13: 0000000000000000 R14: 00007f1260d6c058 R15: 00007ffcf1319148 [ 1839.055518][ T9985] [ 1981.053913][ C1] watchdog: BUG: soft lockup - CPU#1 stuck for 144s! [syz.0.15567:9980] [ 1981.062182][ C1] Modules linked in: [ 1981.065910][ C1] CPU: 1 PID: 9980 Comm: syz.0.15567 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 1981.075716][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1981.085621][ C1] RIP: 0010:__pv_queued_spin_lock_slowpath+0x5ba/0xc40 [ 1981.092293][ C1] Code: 00 00 49 89 dc c6 03 00 48 8b 44 24 10 0f b6 04 10 84 c0 0f 85 48 01 00 00 48 8b 44 24 08 c6 00 01 bb 00 80 ff ff eb 06 f3 90 c3 74 5e 41 0f b6 44 15 00 84 c0 75 36 41 80 3f 00 75 ea 4c 89 [ 1981.112255][ C1] RSP: 0018:ffffc90000be6040 EFLAGS: 00000206 [ 1981.118158][ C1] RAX: 0000000000000000 RBX: 00000000ffffd333 RCX: ffffffff8155068f [ 1981.125968][ C1] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff888117f6f398 [ 1981.133781][ C1] RBP: ffffc90000be6130 R08: dffffc0000000000 R09: ffffed1022fede74 [ 1981.141589][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881f7138ad4 [ 1981.149402][ C1] R13: 1ffff11022fede73 R14: 1ffff1103ee20001 R15: ffff888117f6f398 [ 1981.157217][ C1] FS: 00007f05bf7a36c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 1981.165979][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1981.172400][ C1] CR2: 00007fc443a25d58 CR3: 0000000120b33000 CR4: 00000000003506a0 [ 1981.180220][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1981.188026][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1981.195840][ C1] Call Trace: [ 1981.198963][ C1] [ 1981.201652][ C1] ? show_regs+0x58/0x60 [ 1981.205729][ C1] ? watchdog_timer_fn+0x4b1/0x5f0 [ 1981.210676][ C1] ? proc_watchdog_cpumask+0xd0/0xd0 [ 1981.215796][ C1] ? __hrtimer_run_queues+0x41a/0xad0 [ 1981.221007][ C1] ? hrtimer_interrupt+0xaa0/0xaa0 [ 1981.225951][ C1] ? clockevents_program_event+0x236/0x300 [ 1981.231608][ C1] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 1981.237497][ C1] ? hrtimer_interrupt+0x40c/0xaa0 [ 1981.242446][ C1] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 1981.248346][ C1] ? sysvec_apic_timer_interrupt+0x95/0xc0 [ 1981.253986][ C1] [ 1981.256768][ C1] [ 1981.259539][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1981.265528][ C1] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 1981.271605][ C1] ? __pv_queued_spin_lock_slowpath+0x5ba/0xc40 [ 1981.277686][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 1981.283932][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 1981.288705][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 1981.293744][ C1] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 1981.299123][ C1] sock_hash_delete_elem+0xb1/0x2f0 [ 1981.304157][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0xc28 [ 1981.309538][ C1] bpf_trace_run4+0x13f/0x270 [ 1981.314050][ C1] ? bpf_trace_run3+0x250/0x250 [ 1981.318839][ C1] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 1981.324117][ C1] __alloc_pages+0x3cb/0x8f0 [ 1981.328541][ C1] ? prep_new_page+0x110/0x110 [ 1981.333144][ C1] __stack_depot_save+0x38d/0x470 [ 1981.338002][ C1] ? lapic_next_event+0x5f/0x70 [ 1981.342687][ C1] stack_depot_save+0xe/0x10 [ 1981.347113][ C1] save_stack+0x104/0x1e0 [ 1981.351281][ C1] ? __reset_page_owner+0x190/0x190 [ 1981.356314][ C1] ? post_alloc_hook+0x1a3/0x1b0 [ 1981.361087][ C1] ? prep_new_page+0x1b/0x110 [ 1981.365615][ C1] ? get_page_from_freelist+0x3550/0x35d0 [ 1981.371162][ C1] ? __alloc_pages+0x27e/0x8f0 [ 1981.375752][ C1] ? __stack_depot_save+0x38d/0x470 [ 1981.380788][ C1] ? kasan_set_track+0x5d/0x70 [ 1981.385389][ C1] ? kasan_set_free_info+0x23/0x40 [ 1981.390334][ C1] ? ____kasan_slab_free+0x126/0x160 [ 1981.395454][ C1] ? __kasan_slab_free+0x11/0x20 [ 1981.400316][ C1] ? slab_free_freelist_hook+0xbd/0x190 [ 1981.405695][ C1] ? kfree+0xc8/0x220 [ 1981.409515][ C1] ? sock_map_unref+0x352/0x4d0 [ 1981.414202][ C1] ? sock_hash_delete_elem+0x274/0x2f0 [ 1981.419500][ C1] ? bpf_prog_2c29ac5cdc6b1842+0x3a/0xc28 [ 1981.425051][ C1] ? bpf_trace_run4+0x13f/0x270 [ 1981.429738][ C1] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 1981.435209][ C1] __set_page_owner+0x28/0x2e0 [ 1981.439808][ C1] ? kernel_init_free_pages+0xda/0xf0 [ 1981.445013][ C1] post_alloc_hook+0x1a3/0x1b0 [ 1981.449616][ C1] prep_new_page+0x1b/0x110 [ 1981.453954][ C1] get_page_from_freelist+0x3550/0x35d0 [ 1981.459333][ C1] ? perf_pmu_nop_void+0x9/0x10 [ 1981.464026][ C1] ? ctx_pinned_sched_in+0x100/0x100 [ 1981.469147][ C1] ? lruvec_init+0x150/0x150 [ 1981.473569][ C1] ? __alloc_pages+0x8f0/0x8f0 [ 1981.478174][ C1] ? __alloc_pages_bulk+0xe40/0xe40 [ 1981.483206][ C1] ? stack_trace_save+0x1c0/0x1c0 [ 1981.488067][ C1] __alloc_pages+0x27e/0x8f0 [ 1981.492489][ C1] ? prep_new_page+0x110/0x110 [ 1981.497098][ C1] __stack_depot_save+0x38d/0x470 [ 1981.501950][ C1] ? kfree+0xc8/0x220 [ 1981.505771][ C1] kasan_set_track+0x5d/0x70 [ 1981.510193][ C1] ? kasan_set_track+0x4b/0x70 [ 1981.514796][ C1] ? kasan_set_free_info+0x23/0x40 [ 1981.519827][ C1] ? ____kasan_slab_free+0x126/0x160 [ 1981.524949][ C1] ? __kasan_slab_free+0x11/0x20 [ 1981.529724][ C1] ? slab_free_freelist_hook+0xbd/0x190 [ 1981.535104][ C1] ? kfree+0xc8/0x220 [ 1981.538926][ C1] ? sock_map_unref+0x352/0x4d0 [ 1981.543607][ C1] ? sock_hash_delete_elem+0x274/0x2f0 [ 1981.548908][ C1] ? bpf_prog_2c29ac5cdc6b1842+0x3a/0xc28 [ 1981.554461][ C1] ? bpf_trace_run4+0x13f/0x270 [ 1981.559145][ C1] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 1981.564611][ C1] ? __alloc_pages+0x3cb/0x8f0 [ 1981.569213][ C1] ? kmalloc_order+0x4a/0x160 [ 1981.573724][ C1] ? kmalloc_order_trace+0x1a/0xb0 [ 1981.578675][ C1] ? __kmalloc_track_caller+0x19b/0x260 [ 1981.584053][ C1] ? pskb_expand_head+0x113/0x1240 [ 1981.589004][ C1] ? __pskb_pull_tail+0xc4/0x15d0 [ 1981.593865][ C1] ? sk_psock_skb_ingress_enqueue+0x65/0x410 [ 1981.599679][ C1] ? sk_psock_skb_ingress_self+0x27e/0x330 [ 1981.605317][ C1] ? sk_psock_verdict_recv+0x66d/0x840 [ 1981.610611][ C1] ? unix_read_sock+0x132/0x370 [ 1981.615298][ C1] ? unix_stream_read_sock+0x5e/0x90 [ 1981.620423][ C1] ? sk_psock_verdict_data_ready+0x147/0x1a0 [ 1981.626347][ C1] ? unix_stream_sendmsg+0x8fd/0x1060 [ 1981.631552][ C1] ? ____sys_sendmsg+0x59e/0x8f0 [ 1981.636325][ C1] ? ___sys_sendmsg+0x252/0x2e0 [ 1981.641021][ C1] ? __se_sys_sendmsg+0x19a/0x260 [ 1981.645869][ C1] ? __x64_sys_sendmsg+0x7b/0x90 [ 1981.650646][ C1] ? do_syscall_64+0x3d/0xb0 [ 1981.655071][ C1] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1981.660988][ C1] ? prep_compound_page+0x271/0x4a0 [ 1981.666011][ C1] kasan_set_free_info+0x23/0x40 [ 1981.670780][ C1] ____kasan_slab_free+0x126/0x160 [ 1981.675735][ C1] __kasan_slab_free+0x11/0x20 [ 1981.680327][ C1] slab_free_freelist_hook+0xbd/0x190 [ 1981.685708][ C1] ? sock_map_unref+0x352/0x4d0 [ 1981.690395][ C1] kfree+0xc8/0x220 [ 1981.694043][ C1] sock_map_unref+0x352/0x4d0 [ 1981.698563][ C1] sock_hash_delete_elem+0x274/0x2f0 [ 1981.703680][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0xc28 [ 1981.709056][ C1] bpf_trace_run4+0x13f/0x270 [ 1981.713750][ C1] ? bpf_trace_run3+0x250/0x250 [ 1981.718520][ C1] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 1981.723807][ C1] __alloc_pages+0x3cb/0x8f0 [ 1981.728234][ C1] ? prep_new_page+0x110/0x110 [ 1981.732835][ C1] ? stack_trace_save+0x113/0x1c0 [ 1981.737695][ C1] ? __stack_depot_save+0x34/0x470 [ 1981.742641][ C1] kmalloc_order+0x4a/0x160 [ 1981.746985][ C1] ? ____kasan_kmalloc+0xed/0x110 [ 1981.751840][ C1] kmalloc_order_trace+0x1a/0xb0 [ 1981.756612][ C1] ? __pskb_pull_tail+0xc4/0x15d0 [ 1981.761473][ C1] __kmalloc_track_caller+0x19b/0x260 [ 1981.766685][ C1] ? __pskb_pull_tail+0xc4/0x15d0 [ 1981.771558][ C1] pskb_expand_head+0x113/0x1240 [ 1981.776404][ C1] __pskb_pull_tail+0xc4/0x15d0 [ 1981.781091][ C1] sk_psock_skb_ingress_enqueue+0x65/0x410 [ 1981.786732][ C1] sk_psock_skb_ingress_self+0x27e/0x330 [ 1981.792198][ C1] sk_psock_verdict_recv+0x66d/0x840 [ 1981.797324][ C1] unix_read_sock+0x132/0x370 [ 1981.801954][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1981.807944][ C1] ? sk_psock_skb_redirect+0x440/0x440 [ 1981.813235][ C1] ? unix_stream_splice_actor+0x120/0x120 [ 1981.818794][ C1] ? __kasan_check_write+0x14/0x20 [ 1981.823741][ C1] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 1981.829032][ C1] ? sk_psock_skb_redirect+0x440/0x440 [ 1981.834324][ C1] unix_stream_read_sock+0x5e/0x90 [ 1981.839273][ C1] ? unix_set_peek_off+0xa0/0xa0 [ 1981.844047][ C1] sk_psock_verdict_data_ready+0x147/0x1a0 [ 1981.849687][ C1] ? sk_psock_start_verdict+0xc0/0xc0 [ 1981.854895][ C1] ? _raw_spin_lock+0xa4/0x1b0 [ 1981.859496][ C1] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 1981.865135][ C1] ? skb_queue_tail+0xfb/0x120 [ 1981.869741][ C1] unix_stream_sendmsg+0x8fd/0x1060 [ 1981.874770][ C1] ? unix_stream_sendmsg+0x8c1/0x1060 [ 1981.879981][ C1] ? unix_show_fdinfo+0xa0/0xa0 [ 1981.884664][ C1] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 1981.890306][ C1] ? security_socket_sendmsg+0x82/0xb0 [ 1981.895600][ C1] ? unix_show_fdinfo+0xa0/0xa0 [ 1981.900287][ C1] ____sys_sendmsg+0x59e/0x8f0 [ 1981.904890][ C1] ? __sys_sendmsg_sock+0x40/0x40 [ 1981.909750][ C1] ? import_iovec+0xe5/0x120 [ 1981.914176][ C1] ___sys_sendmsg+0x252/0x2e0 [ 1981.918692][ C1] ? __sys_sendmsg+0x260/0x260 [ 1981.923298][ C1] ? __fdget+0x1bc/0x240 [ 1981.927370][ C1] __se_sys_sendmsg+0x19a/0x260 [ 1981.932053][ C1] ? __x64_sys_sendmsg+0x90/0x90 [ 1981.936827][ C1] ? switch_fpu_return+0x1ed/0x3d0 [ 1981.941776][ C1] ? __kasan_check_read+0x11/0x20 [ 1981.946634][ C1] __x64_sys_sendmsg+0x7b/0x90 [ 1981.951234][ C1] do_syscall_64+0x3d/0xb0 [ 1981.955493][ C1] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 1981.961216][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1981.966963][ C1] RIP: 0033:0x7f05c0b239f9 [ 1981.971199][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1981.990637][ C1] RSP: 002b:00007f05bf7a3038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1981.998885][ C1] RAX: ffffffffffffffda RBX: 00007f05c0cb1f80 RCX: 00007f05c0b239f9 [ 1982.006701][ C1] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000005 [ 1982.014505][ C1] RBP: 00007f05c0b918ee R08: 0000000000000000 R09: 0000000000000000 [ 1982.022319][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1982.030128][ C1] R13: 0000000000000000 R14: 00007f05c0cb1f80 R15: 00007ffd12d06bc8 [ 1982.037943][ C1] [ 1982.040812][ C1] Sending NMI from CPU 1 to CPUs 0: [ 1982.045867][ C0] NMI backtrace for cpu 0 [ 1982.045879][ C0] CPU: 0 PID: 279 Comm: syz-executor Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 1982.045899][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1982.045910][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 1982.045932][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 2b 02 13 04 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 1982.045946][ C0] RSP: 0018:ffffc90000a57040 EFLAGS: 00000246 [ 1982.045963][ C0] RAX: 0000000000000001 RBX: 1ffff9200014ae0c RCX: 1ffffffff0d5aa9c [ 1982.045976][ C0] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7038ad4 [ 1982.045989][ C0] RBP: ffffc90000a570f0 R08: dffffc0000000000 R09: ffffed103ee0715b [ 1982.046003][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 1982.046016][ C0] R13: ffff8881f7038ad4 R14: 0000000000000001 R15: 1ffff9200014ae10 [ 1982.046030][ C0] FS: 00005555557e4500(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 1982.046047][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1982.046060][ C0] CR2: 00007fd6f2ddff9c CR3: 000000011a7ac000 CR4: 00000000003506b0 [ 1982.046077][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1982.046092][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1982.046104][ C0] Call Trace: [ 1982.046109][ C0] [ 1982.046116][ C0] ? show_regs+0x58/0x60 [ 1982.046134][ C0] ? nmi_cpu_backtrace+0x29f/0x300 [ 1982.046156][ C0] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 1982.046178][ C0] ? kvm_wait+0x147/0x180 [ 1982.046194][ C0] ? kvm_wait+0x147/0x180 [ 1982.046210][ C0] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 1982.046229][ C0] ? nmi_handle+0xa8/0x280 [ 1982.046248][ C0] ? kvm_wait+0x147/0x180 [ 1982.046263][ C0] ? default_do_nmi+0x69/0x160 [ 1982.046280][ C0] ? exc_nmi+0xaf/0x120 [ 1982.046295][ C0] ? end_repeat_nmi+0x16/0x31 [ 1982.046314][ C0] ? kvm_wait+0x147/0x180 [ 1982.046330][ C0] ? kvm_wait+0x147/0x180 [ 1982.046347][ C0] ? kvm_wait+0x147/0x180 [ 1982.046363][ C0] [ 1982.046369][ C0] [ 1982.046374][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1982.046397][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 1982.046417][ C0] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 1982.046440][ C0] ? get_page_from_freelist+0x3550/0x35d0 [ 1982.046460][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 1982.046481][ C0] ? kasan_set_free_info+0x23/0x40 [ 1982.046499][ C0] ? __kasan_slab_free+0x11/0x20 [ 1982.046516][ C0] ? kmem_cache_free+0x116/0x2e0 [ 1982.046534][ C0] ? ext4_dirty_inode+0xd1/0x100 [ 1982.046555][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 1982.046574][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 1982.046593][ C0] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 1982.046616][ C0] sock_hash_delete_elem+0xb1/0x2f0 [ 1982.046639][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0xc28 [ 1982.046654][ C0] bpf_trace_run4+0x13f/0x270 [ 1982.046689][ C0] ? bpf_trace_run3+0x250/0x250 [ 1982.046711][ C0] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 1982.046732][ C0] __alloc_pages+0x3cb/0x8f0 [ 1982.046751][ C0] ? prep_new_page+0x110/0x110 [ 1982.046772][ C0] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 1982.046792][ C0] ? add_wait_queue+0x189/0x1c0 [ 1982.046811][ C0] __get_free_pages+0x10/0x30 [ 1982.046829][ C0] __pollwait+0x12d/0x3f0 [ 1982.046847][ C0] ? poll_initwait+0x160/0x160 [ 1982.046863][ C0] pipe_poll+0xf6/0x4d0 [ 1982.046879][ C0] ? __fdget+0x179/0x240 [ 1982.046895][ C0] ? pipe_write+0x1930/0x1930 [ 1982.046912][ C0] do_select+0xc64/0x1690 [ 1982.046938][ C0] ? core_sys_select+0x6e0/0x6e0 [ 1982.046955][ C0] ? poll_initwait+0x160/0x160 [ 1982.046972][ C0] ? __x64_compat_sys_ppoll_time64+0xd0/0xd0 [ 1982.046992][ C0] ? __x64_compat_sys_ppoll_time64+0xd0/0xd0 [ 1982.047011][ C0] ? __x64_compat_sys_ppoll_time64+0xd0/0xd0 [ 1982.047030][ C0] ? __x64_compat_sys_ppoll_time64+0xd0/0xd0 [ 1982.047050][ C0] ? __x64_compat_sys_ppoll_time64+0xd0/0xd0 [ 1982.047069][ C0] ? __x64_compat_sys_ppoll_time64+0xd0/0xd0 [ 1982.047093][ C0] ? __x64_compat_sys_ppoll_time64+0xd0/0xd0 [ 1982.047112][ C0] ? __x64_compat_sys_ppoll_time64+0xd0/0xd0 [ 1982.047133][ C0] ? check_stack_object+0xf4/0x130 [ 1982.047155][ C0] core_sys_select+0x57e/0x6e0 [ 1982.047173][ C0] ? poll_select_set_timeout+0x160/0x160 [ 1982.047199][ C0] ? sigprocmask+0x280/0x280 [ 1982.047220][ C0] __se_sys_pselect6+0x322/0x3f0 [ 1982.047239][ C0] ? __x64_sys_pselect6+0x100/0x100 [ 1982.047259][ C0] __x64_sys_pselect6+0xe5/0x100 [ 1982.047277][ C0] do_syscall_64+0x3d/0xb0 [ 1982.047296][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1982.047316][ C0] RIP: 0033:0x7fd6f4f2f7bc [ 1982.047331][ C0] Code: 29 44 24 30 80 3d 9b fd 15 00 00 4c 89 4c 24 40 4c 8d 4c 24 40 48 c7 44 24 48 08 00 00 00 74 2e 4c 89 ea b8 0e 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 7c 48 8b 54 24 58 64 48 2b 14 25 28 00 00 00 [ 1982.047346][ C0] RSP: 002b:00007ffd68a056d0 EFLAGS: 00000202 ORIG_RAX: 000000000000010e [ 1982.047364][ C0] RAX: ffffffffffffffda RBX: 0000000000004000 RCX: 00007fd6f4f2f7bc [ 1982.047377][ C0] RDX: 0000000000000000 RSI: 00007ffd68a05800 RDI: 0000000000000026 [ 1982.047389][ C0] RBP: 00007ffd68a05c30 R08: 00007ffd68a05700 R09: 00007ffd68a05710 [ 1982.047402][ C0] R10: 0000000000000000 R11: 0000000000000202 R12: 00007ffd68a05a80 [ 1982.047413][ C0] R13: 0000000000000000 R14: 585858582e7a7973 R15: 00007ffd68a05b00 [ 1982.047430][ C0]