last executing test programs: 16.154454399s ago: executing program 1 (id=3762): openat$ppp(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0x1, 0x58, &(0x7f0000000180)}, 0x10) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x85c6c6a6) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={0xffffffffffffffff, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0], 0x0, 0x6d, &(0x7f0000000640)=[{}], 0x8, 0x10, &(0x7f0000000680), &(0x7f00000006c0), 0x8, 0xe0, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x7, [@func={0x6, 0x0, 0x0, 0xc, 0x4}, @var={0x6, 0x0, 0x0, 0xe, 0x2, 0x1}]}, {0x0, [0x61, 0x0, 0x5f, 0x30, 0x30]}}, &(0x7f00000008c0)=""/134, 0x3b, 0x86, 0x0, 0x6}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 16.084702535s ago: executing program 1 (id=3764): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="2000000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000"], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(0xffffffffffffffff, 0x0, 0xffdd) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x20001, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) 11.679111105s ago: executing program 1 (id=3764): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="2000000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000"], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(0xffffffffffffffff, 0x0, 0xffdd) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x20001, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) 7.763073035s ago: executing program 1 (id=3764): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="2000000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000"], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(0xffffffffffffffff, 0x0, 0xffdd) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x20001, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) 4.716186174s ago: executing program 1 (id=3764): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="2000000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000"], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(0xffffffffffffffff, 0x0, 0xffdd) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x20001, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) 2.628751885s ago: executing program 4 (id=3876): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=0x1, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e01f3440cee51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cad32b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337602d3e5a815232f5e16c1b30c3a6abc85018e5ff2c91018afc9ffc2cc788bee1b47683db012469398685211dfbbae3e2ed0a50e7393bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d300006aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7af22e30d46a9d26d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977fb536a9caab37d9ac4cfc1c7b400000000000007ffc826b956ba859ac8e3c177b91bd7d5e41ff83ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d000069a16203a967c1bbe09315c29877a308bcc87dc3addb08142bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8240000e3428d2129369ee1b85af9ffffff0d0df414b315f651c8412392191fa83ee830548f11be359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92000000000f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb74d4ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905de328c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a978ee56c83a3466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342e0eaf6f330e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea95ec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf81700cd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be3827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f969369de47422604e2fc5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293b6c833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b612272d40f522d8c98c879aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbe71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd46dbd61627a2e0a74b5e6aefb7eee403502734137ff47a57f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a125e3af1130d66a7b66837ae7e7123dde7404a067ad0a6a2d6bec9411b61cad4121be3c72ff3a04713042253d438e7becf8120de3895b8ce974958bde39cb8da3427a2e9e2de936431e67fed5ab5684db07de39083d8948cc4c8a2608100000000000000000000aecb8b0b7941088f971ce17427eec32a012295cc0cdd32955176b6ad5a4bb953e58ccfa9428f452cfb5a48a9fda26db3985c8be3c2f99827da074825b01c4a3a71fb59d5798100000000000000c76b05a45d2dd8c20d971e2f3e4369168f5cb83d6ff3a18733fec726034fbfa95624135bee374414b2c8c61f52357a520efd6a10aff244bc8a62ed367981fb4d5d77f7bc093958ff46527499957da4934cd4b370cf76f72dd05fa80cdfb68c836fd81be7a58532e041a87f9222f157610a4bcdc05b2a55308c8e7568b90f7a338557e816a16972aea79dff5becefa6f9c5ce6c58fb38da9e7532dc53cfdc2e789b76f7d32aca1bfea2aa62621b78dded30fc07171866bf3d552900000000a32dda61eeda1750e157c2d569b9d08f583c0ee28daec2e8bb85f3c8e91c4448096ee953def18dc73e55cb30f9cd069d8780b00eaba382f0c3ae391c30a5f1b0f36dd0c2193b791995d2890327a10d7abac76d1202f72e97f0105184d7aaaab8d3e29c9a8d263f076b55cf53c5bb9c0662a3d19a6722d7f83ae4331d3256f90af0857788b380ccc3b266c418e66d1d756d5df6423dd0cea67bc235d3776d22270fc19301ead09f156893e9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 2.628311925s ago: executing program 2 (id=3877): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000002000000000000000000000850000005000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sys_enter\x00', r1}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x1000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000280)="d0", 0x1}], 0x1}, 0x20040801) recvmsg$unix(r3, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x2122) sendmsg$inet(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000fc0)='\x00', 0x1}, {0x0}], 0x2}, 0x4000000) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={0xffffffffffffffff, &(0x7f00000004c0)}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2.604006967s ago: executing program 4 (id=3878): r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) openat$cgroup_devices(r2, &(0x7f00000000c0)='devices.deny\x00', 0x2, 0x0) write$cgroup_freezer_state(r2, &(0x7f0000000100)='FROZEN\x00', 0x7) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000140), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000180)={r3}, 0x8) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000200)={'wlan1\x00', 0x400}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000bc0)={&(0x7f0000000280)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000300)=""/195, 0xc3}, {&(0x7f0000000400)=""/100, 0x64}, {&(0x7f0000000480)=""/109, 0x6d}, {&(0x7f0000000500)=""/249, 0xf9}, {&(0x7f0000000600)=""/193, 0xc1}, {&(0x7f0000000700)=""/244, 0xf4}, {&(0x7f0000000800)=""/46, 0x2e}, {&(0x7f0000000840)=""/178, 0xb2}, {&(0x7f0000000900)=""/231, 0xe7}], 0x9, &(0x7f0000000ac0)=""/253, 0xfd}, 0x2) r7 = perf_event_open$cgroup(&(0x7f0000000c40)={0x4, 0x80, 0x8, 0x5, 0x3, 0x2, 0x0, 0x10000, 0x13000, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8001, 0x4, @perf_bp={&(0x7f0000000c00), 0x5}, 0x840, 0x9, 0x7, 0x5, 0x347, 0x8, 0x4, 0x0, 0x0, 0x0, 0x80000000}, r4, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_RESET(r7, 0x2403, 0xa) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000cc0), 0x4) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000d00)={0x1b, 0x0, 0x0, 0x3ff, 0x0, r2, 0x54a, '\x00', 0x0, r8, 0x5}, 0x48) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000d80)={'sit0\x00', @remote}) r10 = perf_event_open(&(0x7f0000000e00)={0x1, 0x80, 0xfd, 0x5, 0xac, 0xfb, 0x0, 0x1, 0x80020, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x3, @perf_bp={&(0x7f0000000dc0), 0x8}, 0x100, 0x1, 0x3, 0x9, 0x7, 0x45b, 0x0, 0x0, 0x7, 0x0, 0x3}, 0xffffffffffffffff, 0xd, r4, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000e80)='devices.allow\x00', 0x2, 0x0) r11 = getpid() r12 = gettid() r13 = getpid() r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001200)={0x0, 0x7, 0x10}, 0xc) sendmsg$unix(r2, &(0x7f0000001340)={&(0x7f0000000ec0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000001180)=[{&(0x7f0000000f40)="e83088aadf0b67e5e2c8c7389c76283a1a31179cbc26120d75fd3804777425ff507b2edb408ab317f220010c8d911ee85d6fb4c6e4447b7e15d4b5cc3434cefdacf5297698b4a48c09ece4fbc03cc7", 0x4f}, {&(0x7f0000000fc0)="a0a28128ba73c59024c8311add1ec1dba70dbddf4b71127e77d4fb2b9996f5c7801953d829fb9fe22742746be978f3e9fc40728eacf7502746a8c66863aa38e485621d4aff0a17acfba26328f473a8760df0d4cbf9c449d4d39db0107320b8e7b2576af7ba821a2890c5c0265cebeec40403c3388aa0a36a0b5a1358b6e85ad8c1853dc4b84d4b75787255681a58a0e3cb4d43f5", 0x94}, {&(0x7f0000001080)="7149bcdee2ce3200b3eec89f3acac3f30c20fbfd0a05ab5a77c8bcd31b7f29df52aa4f", 0x23}, {&(0x7f00000010c0)="7b5cfe51ba63", 0x6}, {&(0x7f0000001100)="e6f7912a61fa2459bd66072f1f0c5a5780ac55352b2e004e49409f646e9431648bccec00c3629550d77fe7cccf71acbab78cade25514a9658f894d57c52afcad257adbc64e6a1946482fc6", 0x4b}], 0x5, &(0x7f0000001240)=[@cred={{0x1c, 0x1, 0x2, {r11, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r12, 0x0, 0xee01}}}, @rights={{0x1c, 0x1, 0x1, [r5, r7, r8]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r13, 0xee01, 0xffffffffffffffff}}}, @rights={{0x14, 0x1, 0x1, [r9]}}, @rights={{0x24, 0x1, 0x1, [r6, r0, r10, r1, r14]}}], 0xe0, 0x4000}, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001640)={&(0x7f0000001380)="c1612d253a2fde63919518332c622d10df76ecb2783d77a4347860cb83b231750e2b3a7374478bc042ae14c61f62903c6f30daad9d010576be1f43397fb3c469f7271e241d732ac67e89808dc54f82a46f3904a44676ed6e5b57af5e980f588f9a7a8c186b24f5f9303063ac8fbf11e92704d780099d68e63bda14e3d15dac3ccf58ce6c529dd6789b3d2f8fe6d5f10837aab632afba62bf2982c73b268e600f893f48aee4863de489a399505d2a8edea5414056a5d4fb94e17d1207a3b4894d", &(0x7f0000001440)=""/148, &(0x7f0000001500)="1ef9dcd38f5107d7645e44c6879a4ffc6bfd8c05cdfcc7c78003d2bf0ce41c26afdaf87a07aa4183dad203f50cafa33c13f27ec1f7e4a8e77101e4b9e4b14823225415ff7e6375dabc93a0130b7d45d7355ac090e6d297ac0a79f7d70717147262d0619a7f90eb8f0d89f5bb81709fa247d909834e7834b394f4c73c1dda70ff97564d3d071009f0607f2184d50079311d8f5607d6d852ef4c30caea15cbf3b18f33b68b1e3b7d01a987", &(0x7f00000015c0)="5f7e2b1628de1b0e3b89b43c21c1c915486897fe1876ae74832dbc40ffa527410dc71b6f6ad0b269cb6dfe3b3e28df30f058666e25cee59aaed942644a77da7852c6bff592a029757916d53f143f5150b225f5190d28abfb978be5e400f3675ac68bd553712d2b47d69617bee6ceceafd89963ed083f64", 0x4, 0xffffffffffffffff, 0x4}, 0x38) sendmsg$inet(r4, &(0x7f0000001980)={&(0x7f0000001680)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000001880)=[{&(0x7f00000016c0)="1131e063421d3d347b180fe04faf315b086266361aea9a4d32540d699dc5ad97caf90bbe980cc44470914ce880dab55f2154e2258cfa1f71a441b87c8735f719ba200bf4e0c64d72b121e04ea90f2f5795af246e3b02", 0x56}, {&(0x7f0000001740)}, {&(0x7f0000001780)="9c8d096a55c3ac1756a1eeaf77b7b2ca7deca60aec59d7f3e22d9e1af0ac519b76b24a6e0dbd38bae7f437f2253727c34b5f80f2e1eef3503f2f1aefa3ab782d83776645d5ca7c7e4333be32d1fec404f2e377bbb826c204d6053827be661816d25a508ddc54e83c8fccf53822b458c1d3ac64624eefae5dba2eab881ff59085005f92fc23168b06a035a0bcdbc353988c25f06a709180ffa86190cd3983897f1290a432ab462865369e683dc14944995ba3139050ee04", 0xb7}, {&(0x7f0000001840)}], 0x4, &(0x7f00000018c0)=[@ip_retopts={{0x8c, 0x0, 0x7, {[@lsrr={0x83, 0x1b, 0x79, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast]}, @ssrr={0x89, 0x7, 0xf, [@multicast1]}, @end, @timestamp={0x44, 0x20, 0x91, 0x0, 0x6, [0x3, 0x80000000, 0x2, 0x101, 0x6, 0x8000, 0x6]}, @timestamp_addr={0x44, 0x1c, 0xf4, 0x1, 0x5, [{@rand_addr=0x64010101, 0x9}, {@rand_addr=0x64010101, 0x2}, {@loopback, 0x9}]}, @rr={0x7, 0x1b, 0xbc, [@multicast2, @broadcast, @empty, @broadcast, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}], 0xa8}, 0x4040804) syz_open_procfs$namespace(r13, &(0x7f00000019c0)='ns/pid_for_children\x00') r15 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001cc0)={0x6, 0x34, &(0x7f0000001a00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f1}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1792}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r14}}, @generic={0x1, 0x5, 0x8, 0xe, 0xffffffff}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @call={0x85, 0x0, 0x0, 0x54}]}, &(0x7f0000001bc0)='GPL\x00', 0x7, 0x6c, &(0x7f0000001c00)=""/108, 0x40f00, 0x20, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000001c80)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002080)={r15, 0xe0, &(0x7f0000001f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001d80)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x8, &(0x7f0000001dc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001e40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf8, &(0x7f0000001e80)=[{}, {}], 0x10, 0x10, &(0x7f0000001ec0), &(0x7f0000001f00), 0x8, 0x5a, 0x8, 0x8, &(0x7f0000001f40)}}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002140)={{r2}, &(0x7f00000020c0), &(0x7f0000002100)=r5}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002440)={r5, 0xe0, &(0x7f0000002340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000002180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f00000021c0)=[0x0, 0x0, 0x0], &(0x7f0000002200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x92, &(0x7f0000002240)=[{}], 0x8, 0x10, &(0x7f0000002280), &(0x7f00000022c0), 0x8, 0xb6, 0x8, 0x8, &(0x7f0000002300)}}, 0x10) 2.577583799s ago: executing program 4 (id=3879): openat$ppp(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000500)=0x7) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xf, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b70300000000000085417e0058000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000000000000b7000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1d, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x15, 0x4, &(0x7f00000003c0)=ANY=[@ANYRES16], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x85c6c6a6) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_discard_preallocations\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r0, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0], 0x0, 0x6d, &(0x7f0000000640)=[{}], 0x8, 0x10, &(0x7f0000000680), &(0x7f00000006c0), 0x8, 0xe0, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 2.419343772s ago: executing program 3 (id=3880): openat$ppp(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000500)=0x7) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xf, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b70300000000000085417e0058000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000000000000b7000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1d, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x15, 0x4, &(0x7f00000003c0)=ANY=[@ANYRES16], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x85c6c6a6) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_discard_preallocations\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r0, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0], 0x0, 0x6d, &(0x7f0000000640)=[{}], 0x8, 0x10, &(0x7f0000000680), &(0x7f00000006c0), 0x8, 0xe0, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 2.148869454s ago: executing program 3 (id=3881): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000002000000000000000000000850000005000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sys_enter\x00', r1}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x1000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000280)="d0", 0x1}], 0x1}, 0x20040801) recvmsg$unix(r3, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x2122) sendmsg$inet(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000fc0)='\x00', 0x1}], 0x1}, 0x4000000) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={0xffffffffffffffff, &(0x7f00000004c0)}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2.036122973s ago: executing program 4 (id=3882): bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{}, &(0x7f00000005c0), &(0x7f0000000600)='%-010d \x00'}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffffff, 0xe0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x54, &(0x7f0000000c80)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000cc0), &(0x7f0000000d00), 0x8, 0xbc, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x7, 0xf6bb, 0x0, 0x4002, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB='+blkio +ne\x00'], 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000300)='tlb_flush\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xfffffffd, 0x7fe2, 0x2}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ff"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r3) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x498180, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x15) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32=r6], 0x18}, 0x0) sendmsg$unix(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r6], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) close(r7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00'}, 0x10) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r8}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r8}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.791252893s ago: executing program 2 (id=3883): openat$ppp(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0x1, 0x58, &(0x7f0000000180)}, 0x10) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x85c6c6a6) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={0xffffffffffffffff, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0], 0x0, 0x6d, &(0x7f0000000640)=[{}], 0x8, 0x10, &(0x7f0000000680), &(0x7f00000006c0), 0x8, 0xe0, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x7, [@func={0x6, 0x0, 0x0, 0xc, 0x4}, @var={0x6, 0x0, 0x0, 0xe, 0x2, 0x1}]}, {0x0, [0x61, 0x0, 0x5f, 0x30, 0x30]}}, &(0x7f00000008c0)=""/134, 0x3b, 0x86, 0x0, 0x6}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 1.750969086s ago: executing program 2 (id=3884): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x17, 0x18, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000051000000bf0900000000000055090100000000009500000000000000180100002020702500000000002020207b1af8ff00000000bda100000000000097010000f8ffffffb702000008000400b70300000000000015000000060000006100000000000000bf91000000000000b5020000000000008500000085000000b70000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000002000000000000000000000850000005000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sys_enter\x00', r2}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x1000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000)={r3, r4}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000280)="d0", 0x1}], 0x1}, 0x20040801) recvmsg$unix(r5, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x2122) sendmsg$inet(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000fc0)='\x00', 0xfdbc}, {&(0x7f0000000780)="c95cfaed8da6f3e45af2d260a69e79adb2f6558e1214f3a48fecbace697a4dee5f001570db51d9e118aeac7759b9e7e78f229b9ada0a9b897fdc4610555e52c4b6c1ba9eca080a047d0b1ade1ce95970e1a5c34eaa8b284b202f24694c0cb71b61766b26a129588bddc19f277990b0568a8faf50fac79c57753b1a342798bd62cc2eb5ce39ace8baba0d3a7c954a80460727bab4d16fcae6b636a50a492a657b5d25e3ed625840727efe59ef795aa7ca"}], 0x1}, 0x4000000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x13, 0x16, &(0x7f0000000540)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x90) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={0xffffffffffffffff, &(0x7f00000004c0)}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x6}, 0x180a0, 0xc8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x8, 0xffffffffffffffff, 0x1) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{0x1}, &(0x7f0000000040), &(0x7f0000000080)='%pI4 \x00'}, 0x20) 1.243835978s ago: executing program 0 (id=3885): bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x0, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) socketpair$nbd(0x1, 0x1, 0x0, 0x0) (async) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x8, 0x9, 0x400, 0xffffffffffffffff, 0xfffffffc}, 0x48) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x9, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x4}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0x4, 0x6, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r3}, 0x38) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r3}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000480)={r3, 0x0, &(0x7f0000000380)=""/195}, 0x20) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) (async) recvmsg$unix(r6, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r8, 0x1, 0x2e, &(0x7f00000000c0)=r7, 0x4) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff}, 0x48) (async) r10 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r10, &(0x7f00000001c0)={'b', ' *:* ', 'w\x00'}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r9}, 0x0, &(0x7f00000002c0)}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.190318422s ago: executing program 3 (id=3886): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000060000000000000000000000850000009e00000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 1.155053385s ago: executing program 4 (id=3887): close(0xffffffffffffffff) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) unlink(0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYRES16=0x0], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x73}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x10000000, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x9}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1}, 0x48) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e00)={{r5}, &(0x7f0000000d80), &(0x7f0000000dc0)=r6}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r7}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="b400000000000000791048000000000071114300000000009500000000000000db74589d4b38cc306ac390649f72dea0e50e2317db042855d6c74ff3493c7e31e3f6c643155a8e2e01d50bc3347475750472719cc516fa14b769e7f385ba72c60242263c05ddab05e37efe81b8bffc35cdf2ac0d93263ff755d611c4cca1684b1470af6a83366aa430ad2d700b186da622d6fba70000000000000000000000000200"/173], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 1.079845972s ago: executing program 1 (id=3764): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="2000000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000"], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(0xffffffffffffffff, 0x0, 0xffdd) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x20001, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) 519.675397ms ago: executing program 0 (id=3888): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) write$cgroup_devices(0xffffffffffffffff, 0x0, 0xffdd) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x3, 0x9}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x20001, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) 518.999827ms ago: executing program 2 (id=3889): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) (async) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)=0x9, 0x12) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0xc, &(0x7f00000004c0)=@framed={{}, [@ringbuf_output]}, 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0xc, &(0x7f00000004c0)=@framed={{}, [@ringbuf_output]}, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x100, 0x100, 0x9, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0xcff5, r0}, 0x38) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'veth1_to_batadv\x00', 0x400}) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r5, r4, 0x26}, 0x10) (async) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r5, r4, 0x26}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f00000001c0)={r1, r5}, 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) syz_clone(0x4d900000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b7030000000000208500000072"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 518.003528ms ago: executing program 3 (id=3890): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x93, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) (async) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x18, 0x8ed, 0xb9db0fa0, 0x7, 0x20, r0, 0x8, '\x00', 0x0, r3, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) sendmsg$tipc(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db040400d2c579496b229c339b1f91201c27", 0x39}], 0x1}, 0x0) (async) recvmsg(r4, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) (async) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0xfffffffd}, 0x48) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r9}, 0x10) (async) bpf$PROG_LOAD(0x2, &(0x7f0000000680)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="27a7a8dc30e52748360d1475719e99e4c2f9ac249e43eb4b76d5347b1081dd32b695a6e9e8e9b95d6c983418583fa2c6af245b4bdb12259aa0b2720d21f0ff1b3a4c2cb967db7de83027799c5abe7eec70eed014c2cb5a3b4bc15c0e5ee579fa30fd8bd60c34fdf88931019655c3bb30"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xa, 0x4, 0x4, 0x9, 0x114f, r8, 0x7fff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4}, 0x48) r10 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r10, &(0x7f0000000140)='cpuset.mems\x00', 0x2, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x8, 0x10001, 0x9, 0x1}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 517.823567ms ago: executing program 4 (id=3891): r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x20001400) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7903009875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) ioctl$TUNSETOFFLOAD(r7, 0x400454d0, 0x18) 444.686993ms ago: executing program 3 (id=3892): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r2}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1f, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000017000000000000000000000000850045fd03e10ebef100009300000095"], &(0x7f0000000180)='GPL\x00', 0x2, 0xc6, &(0x7f0000000300)=""/198, 0x0, 0x10}, 0x80) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x8, 0x0, 0x9}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r4}, &(0x7f00000001c0), &(0x7f0000000280)=r3}, 0x20) write$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="69703609767469a3214caabfed3a38c304948530123f00"], 0xb) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000003df2a1230000000000100000273d0000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r9}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000004f000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r10, 0x1, 0x32, &(0x7f00000004c0)=r3, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) 439.338624ms ago: executing program 0 (id=3893): close(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0x8, 0x42, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000003dd, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000ee0000000000001800000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0xfeff) 410.660676ms ago: executing program 0 (id=3894): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_queued\x00', 0x26e1, 0x0) close(r0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a1282, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) (async) socketpair(0x21, 0x3, 0x6, &(0x7f0000000000)) (async) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) (async) write$cgroup_subtree(r0, 0x0, 0x20000889) 332.753422ms ago: executing program 0 (id=3895): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000200000000001200000085000000230000003f0000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd63"], 0xfdef) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/249, 0xf9}], 0x1}, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x100400, 0x0) close(r4) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='mm_page_alloc\x00', r0}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r9}, &(0x7f0000000080), &(0x7f00000001c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r9, &(0x7f00000005c0)="3a208c6cff2efba22f202d38b833c6fce04dd6660c97ad1c8d80af8c740df487c47d37bad88b807adf2cd16e52d89dff73d4faee95c6484ab6bba87a5a8547166f58b1429e15a8cc5e6f24387b947731b044a107a41fe547b2d5e0ea5974f4a712065ec46d2a9f0af886b69210bfdd23f4336cc9da4c5eccd7276b21886d674e9bbd49eeb65b56dbb05f9e44c7b9232411e89ec422b418eca313a8b46d3d2581037a62d3", &(0x7f0000000680)=""/142}, 0x20) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r10, 0xc004743e, 0x20001400) 332.354942ms ago: executing program 2 (id=3896): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58, &(0x7f0000000000)={0x0, 0x0}}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="1000000000976fdb8b02000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) write$cgroup_subtree(r3, 0x0, 0xfdef) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r0, 0xff, 0x18}, 0xc) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000180)=r4, 0x4) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="1808000000000000000000000072462000000018", @ANYRES32=r6, @ANYBLOB="0000000000000000b706000014000000b7030000000d00008500000005000000bca900000000000035090100000000009500000000000000b7020000000000007b6af8ff00000000b5090000000000007baaf0ff00000000bf8700000000000047080000fffdffffbf2400000000000007060000f0ffffff740200400800000018260000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000000000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 327.439623ms ago: executing program 3 (id=3897): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x24bdb) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000500)={r1, 0x0, &(0x7f0000000400)=""/233}, 0x20) bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x40400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x9) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x0, 0x4, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x24}, 0x90) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000880)=ANY=[@ANYBLOB="a0b3e15e0183b7f6bb9b008bde9e46fb2ec82b5d294551b632d123dfeb9812d1024c770d3b63c0e9b3a59dd3bd7b6bc33ff66c7115299cb77c3ddf7856c5541b5af1cacece2a7e0b8b0ed202c549ef6b0e3ed9aa5a63fe5194ab134218cc242ecf99c551d6e40b54cafbd34bfa21803290cbbe7eba30fddb142da76c8230e591008573e9", @ANYRES32, @ANYBLOB='\x00', @ANYRES8=r2, @ANYRESOCT=0x0, @ANYBLOB="3da81a75348485702d328978f5e08a32f064f46158ebe20f57eade88cca48c157b23c2d388b9978e4b07327311cb4850b70f5a4647f6cfdde9db23a1a7aa1b1ad85b790b4fbbf3e9d8e128"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r3, 0x40047451, 0x2000000c) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) 305.078865ms ago: executing program 2 (id=3898): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x80004}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r1) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x18, 0xc, &(0x7f00000002c0)=ANY=[@ANYRES32=r2, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x0, 0x2, 0xc}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000340)={r5, r4}, 0xc) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xe68c}, 0x10210, 0x88, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r7, &(0x7f0000000140)=ANY=[], 0x32600) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000200)=ANY=[@ANYBLOB="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"/420], &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40305829, &(0x7f0000000040)) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000007d00000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x4, 0x4, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001540)={{r9}, &(0x7f00000014c0), &(0x7f0000001500)=r8}, 0x20) perf_event_open(&(0x7f0000002180)={0x2, 0x80, 0x4f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x11, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) 0s ago: executing program 0 (id=3899): close(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0x8, 0x42, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000003dd, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000ee0000000000001800000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0xfffffffffffffe8b, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x4, 0x4}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000780)={{r4}, &(0x7f0000000700), &(0x7f0000000740)=r5}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000200000000000000000818110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={r6}, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x11, &(0x7f00000012c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002e000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r7, 0x0, 0xe, 0x0, &(0x7f00000004c0)="3f6c00c2231bc4cb500170870800", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x0, 0x0, 0x7, 0x7, 0x1, 0x402}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000280)='host1x_cdma_push\x00', r3}, 0x10) kernel console output (not intermixed with test programs): 00007f00d12c1f60 R15: 00007ffe77c62798 [ 631.750648][ T6301] [ 635.710815][ T6430] bridge0: port 2(bridge_slave_1) entered blocking state [ 635.717849][ T6430] bridge0: port 2(bridge_slave_1) entered forwarding state [ 635.724947][ T6430] bridge0: port 1(bridge_slave_0) entered blocking state [ 635.731913][ T6430] bridge0: port 1(bridge_slave_0) entered forwarding state [ 635.739281][ T6430] device bridge0 entered promiscuous mode [ 635.775236][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 636.557155][ T30] audit: type=1400 audit(1721887591.777:149): avc: denied { create } for pid=6460 comm="syz.0.1791" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 636.731704][ T30] audit: type=1400 audit(1721887591.957:150): avc: denied { create } for pid=6466 comm="syz.0.1793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 638.045744][ T6509] bridge0: port 3(veth0_to_batadv) entered blocking state [ 638.053605][ T6509] bridge0: port 3(veth0_to_batadv) entered disabled state [ 638.076257][ T6509] device veth0_to_batadv entered promiscuous mode [ 638.085798][ T6509] bridge0: port 3(veth0_to_batadv) entered blocking state [ 638.093574][ T6509] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 638.115941][ T6521] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 638.124939][ T6521] device syzkaller0 entered promiscuous mode [ 641.465867][ T6683] bridge0: port 2(bridge_slave_1) entered disabled state [ 641.472982][ T6683] bridge0: port 1(bridge_slave_0) entered disabled state [ 642.490239][ T6718] FAULT_INJECTION: forcing a failure. [ 642.490239][ T6718] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 642.550517][ T6718] CPU: 1 PID: 6718 Comm: syz.3.1865 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 642.560389][ T6718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 642.570402][ T6718] Call Trace: [ 642.573514][ T6718] [ 642.576312][ T6718] dump_stack_lvl+0x151/0x1b7 [ 642.580809][ T6718] ? io_uring_drop_tctx_refs+0x190/0x190 [ 642.586274][ T6718] ? trim_init_extable+0x3d0/0x3d0 [ 642.591227][ T6718] dump_stack+0x15/0x17 [ 642.595213][ T6718] should_fail+0x3c6/0x510 [ 642.599468][ T6718] should_fail_alloc_page+0x5a/0x80 [ 642.604514][ T6718] prepare_alloc_pages+0x15c/0x700 [ 642.609680][ T6718] ? irqentry_exit+0x30/0x40 [ 642.614106][ T6718] ? __alloc_pages_bulk+0xe40/0xe40 [ 642.619135][ T6718] __alloc_pages+0x18c/0x8f0 [ 642.623561][ T6718] ? prep_new_page+0x110/0x110 [ 642.628161][ T6718] shmem_alloc_and_acct_page+0x4bd/0xa80 [ 642.633629][ T6718] ? shmem_swapin_page+0x1520/0x1520 [ 642.638750][ T6718] ? xas_start+0x333/0x3f0 [ 642.642998][ T6718] ? xas_load+0x2a9/0x2d0 [ 642.647167][ T6718] ? pagecache_get_page+0xdc2/0xeb0 [ 642.652203][ T6718] ? page_cache_prev_miss+0x410/0x410 [ 642.657411][ T6718] shmem_getpage_gfp+0x1388/0x23c0 [ 642.662361][ T6718] ? shmem_getpage+0xa0/0xa0 [ 642.666780][ T6718] ? fault_in_safe_writeable+0x240/0x240 [ 642.672246][ T6718] ? _raw_spin_lock+0xa4/0x1b0 [ 642.676846][ T6718] ? _raw_spin_trylock_bh+0x190/0x190 [ 642.682056][ T6718] shmem_write_begin+0xca/0x1b0 [ 642.686746][ T6718] generic_perform_write+0x2bc/0x5a0 [ 642.691866][ T6718] ? grab_cache_page_write_begin+0xa0/0xa0 [ 642.697507][ T6718] ? file_remove_privs+0x610/0x610 [ 642.702456][ T6718] ? rwsem_write_trylock+0x153/0x340 [ 642.707578][ T6718] ? rwsem_mark_wake+0x770/0x770 [ 642.712362][ T6718] __generic_file_write_iter+0x25b/0x4b0 [ 642.717821][ T6718] generic_file_write_iter+0xaf/0x1c0 [ 642.723022][ T6718] vfs_write+0xd5d/0x1110 [ 642.727188][ T6718] ? __hrtimer_run_queues+0x46b/0xad0 [ 642.732400][ T6718] ? file_end_write+0x1c0/0x1c0 [ 642.737086][ T6718] ? mutex_lock+0xb6/0x1e0 [ 642.741481][ T6718] ? wait_for_completion_killable_timeout+0x10/0x10 [ 642.747904][ T6718] ? __fdget_pos+0x2e7/0x3a0 [ 642.752439][ T6718] ? ksys_write+0x77/0x2c0 [ 642.756689][ T6718] ksys_write+0x199/0x2c0 [ 642.760853][ T6718] ? bpf_trace_run1+0x1c0/0x1c0 [ 642.765543][ T6718] ? __ia32_sys_read+0x90/0x90 [ 642.770141][ T6718] ? __bpf_trace_sys_enter+0x62/0x70 [ 642.775266][ T6718] __x64_sys_write+0x7b/0x90 [ 642.779690][ T6718] do_syscall_64+0x3d/0xb0 [ 642.783948][ T6718] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 642.789583][ T6718] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 642.795312][ T6718] RIP: 0033:0x7f00d1131f19 [ 642.799564][ T6718] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 642.819006][ T6718] RSP: 002b:00007f00cfdb3048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 642.827247][ T6718] RAX: ffffffffffffffda RBX: 00007f00d12c1f60 RCX: 00007f00d1131f19 [ 642.835063][ T6718] RDX: 0000000020000992 RSI: 0000000020000980 RDI: 0000000000000005 [ 642.842871][ T6718] RBP: 00007f00cfdb30a0 R08: 0000000000000000 R09: 0000000000000000 [ 642.850680][ T6718] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 642.858493][ T6718] R13: 000000000000000b R14: 00007f00d12c1f60 R15: 00007ffe77c62798 [ 642.866334][ T6718] [ 642.919708][ T30] audit: type=1400 audit(1721887598.137:151): avc: denied { create } for pid=6723 comm="syz.1.1869" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 643.981304][ T6772] FAULT_INJECTION: forcing a failure. [ 643.981304][ T6772] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 643.994442][ T6772] CPU: 0 PID: 6772 Comm: syz.0.1881 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 644.004156][ T6772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 644.014056][ T6772] Call Trace: [ 644.017188][ T6772] [ 644.019953][ T6772] dump_stack_lvl+0x151/0x1b7 [ 644.024467][ T6772] ? io_uring_drop_tctx_refs+0x190/0x190 [ 644.029935][ T6772] ? __kasan_check_read+0x11/0x20 [ 644.034793][ T6772] dump_stack+0x15/0x17 [ 644.038790][ T6772] should_fail+0x3c6/0x510 [ 644.043042][ T6772] should_fail_usercopy+0x1a/0x20 [ 644.047899][ T6772] copy_page_from_iter_atomic+0x423/0x10e0 [ 644.053642][ T6772] ? pipe_zero+0x4e0/0x4e0 [ 644.057977][ T6772] ? _raw_spin_lock+0xa4/0x1b0 [ 644.062583][ T6772] ? _raw_spin_trylock_bh+0x190/0x190 [ 644.067790][ T6772] generic_perform_write+0x337/0x5a0 [ 644.072910][ T6772] ? grab_cache_page_write_begin+0xa0/0xa0 [ 644.078550][ T6772] ? file_remove_privs+0x610/0x610 [ 644.083492][ T6772] ? rwsem_write_trylock+0x153/0x340 [ 644.088647][ T6772] ? rwsem_mark_wake+0x770/0x770 [ 644.093387][ T6772] __generic_file_write_iter+0x25b/0x4b0 [ 644.098860][ T6772] generic_file_write_iter+0xaf/0x1c0 [ 644.104065][ T6772] vfs_write+0xd5d/0x1110 [ 644.108229][ T6772] ? kmem_cache_free+0x116/0x2e0 [ 644.113007][ T6772] ? file_end_write+0x1c0/0x1c0 [ 644.117692][ T6772] ? mutex_lock+0xb6/0x1e0 [ 644.121945][ T6772] ? wait_for_completion_killable_timeout+0x10/0x10 [ 644.128371][ T6772] ? __fdget_pos+0x2e7/0x3a0 [ 644.132790][ T6772] ? ksys_write+0x77/0x2c0 [ 644.137051][ T6772] ksys_write+0x199/0x2c0 [ 644.141213][ T6772] ? __ia32_sys_read+0x90/0x90 [ 644.145809][ T6772] ? debug_smp_processor_id+0x17/0x20 [ 644.151018][ T6772] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 644.157007][ T6772] __x64_sys_write+0x7b/0x90 [ 644.161433][ T6772] do_syscall_64+0x3d/0xb0 [ 644.165739][ T6772] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 644.171340][ T6772] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 644.177101][ T6772] RIP: 0033:0x7fdbfbf14f19 [ 644.181313][ T6772] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 644.200842][ T6772] RSP: 002b:00007fdbfab96048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 644.209080][ T6772] RAX: ffffffffffffffda RBX: 00007fdbfc0a4f60 RCX: 00007fdbfbf14f19 [ 644.216992][ T6772] RDX: 0000000020000992 RSI: 0000000020000980 RDI: 0000000000000005 [ 644.224796][ T6772] RBP: 00007fdbfab960a0 R08: 0000000000000000 R09: 0000000000000000 [ 644.232602][ T6772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 644.240504][ T6772] R13: 000000000000000b R14: 00007fdbfc0a4f60 R15: 00007ffd428eca38 [ 644.248318][ T6772] [ 644.642022][ T6794] device syzkaller0 entered promiscuous mode [ 644.797605][ T6797] syz.3.1889[6797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 644.797688][ T6797] syz.3.1889[6797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 648.030064][ T6905] bridge0: port 2(bridge_slave_1) entered disabled state [ 648.048208][ T6905] bridge0: port 1(bridge_slave_0) entered disabled state [ 648.667299][ T30] audit: type=1400 audit(1721887603.887:152): avc: denied { create } for pid=6949 comm="syz.4.1937" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 648.705365][ T6948] device veth0_vlan left promiscuous mode [ 648.721475][ T6948] device veth0_vlan entered promiscuous mode [ 648.736252][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 648.746770][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 648.762979][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 649.261793][ T6984] device pim6reg1 entered promiscuous mode [ 654.354377][ T7178] device syzkaller0 entered promiscuous mode [ 654.741358][ C1] Illegal XDP return value 16128, expect packet loss! [ 655.897236][ T7213] device syzkaller0 entered promiscuous mode [ 660.655165][ T7369] device syzkaller0 entered promiscuous mode [ 663.686151][ T7457] device pim6reg1 entered promiscuous mode [ 665.417772][ T7498] bridge0: port 3(veth0_to_batadv) entered blocking state [ 665.441575][ T7498] bridge0: port 3(veth0_to_batadv) entered disabled state [ 665.482905][ T7498] device veth0_to_batadv entered promiscuous mode [ 665.511712][ T7506] device veth0_to_batadv left promiscuous mode [ 665.527614][ T7506] bridge0: port 3(veth0_to_batadv) entered disabled state [ 666.842208][ T7554] bridge0: port 3(veth0_to_batadv) entered blocking state [ 666.849366][ T7554] bridge0: port 3(veth0_to_batadv) entered disabled state [ 666.884407][ T7554] device veth0_to_batadv entered promiscuous mode [ 666.923409][ T7554] bridge0: port 3(veth0_to_batadv) entered blocking state [ 666.930628][ T7554] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 667.022702][ T7554] device veth0_to_batadv left promiscuous mode [ 667.040722][ T7554] bridge0: port 3(veth0_to_batadv) entered disabled state [ 667.158620][ T30] audit: type=1400 audit(1721887622.377:153): avc: denied { append } for pid=7560 comm="syz.4.2109" name="ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 667.244735][ T30] audit: type=1400 audit(1721887622.377:154): avc: denied { create } for pid=7560 comm="syz.4.2109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 668.204721][ T7589] bridge0: port 3(veth0_to_batadv) entered blocking state [ 668.233839][ T7589] bridge0: port 3(veth0_to_batadv) entered disabled state [ 668.302218][ T7589] device veth0_to_batadv entered promiscuous mode [ 668.385353][ T7601] device veth0_to_batadv left promiscuous mode [ 668.421386][ T7601] bridge0: port 3(veth0_to_batadv) entered disabled state [ 669.732403][ T7646] bridge0: port 3(veth0_to_batadv) entered blocking state [ 669.757986][ T7646] bridge0: port 3(veth0_to_batadv) entered disabled state [ 669.789342][ T7646] device veth0_to_batadv entered promiscuous mode [ 669.842006][ T7650] device veth0_to_batadv left promiscuous mode [ 669.848208][ T7650] bridge0: port 3(veth0_to_batadv) entered disabled state [ 670.453767][ T7671] FAULT_INJECTION: forcing a failure. [ 670.453767][ T7671] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 670.528965][ T7671] CPU: 0 PID: 7671 Comm: syz.0.2143 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 670.538711][ T7671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 670.548606][ T7671] Call Trace: [ 670.551726][ T7671] [ 670.554508][ T7671] dump_stack_lvl+0x151/0x1b7 [ 670.559026][ T7671] ? io_uring_drop_tctx_refs+0x190/0x190 [ 670.564497][ T7671] dump_stack+0x15/0x17 [ 670.568475][ T7671] should_fail+0x3c6/0x510 [ 670.572737][ T7671] should_fail_usercopy+0x1a/0x20 [ 670.577592][ T7671] _copy_from_user+0x20/0xd0 [ 670.582025][ T7671] __sys_bpf+0x1e9/0x760 [ 670.586186][ T7671] ? bpf_get_current_cgroup_id+0xa2/0xb0 [ 670.591736][ T7671] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 670.596944][ T7671] ? bpf_trace_run2+0xf1/0x210 [ 670.601551][ T7671] ? __bpf_trace_sys_enter+0x62/0x70 [ 670.606665][ T7671] __x64_sys_bpf+0x7c/0x90 [ 670.610917][ T7671] do_syscall_64+0x3d/0xb0 [ 670.615173][ T7671] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 670.620897][ T7671] RIP: 0033:0x7fdbfbf14f19 [ 670.625178][ T7671] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 670.644595][ T7671] RSP: 002b:00007fdbfab96048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 670.652847][ T7671] RAX: ffffffffffffffda RBX: 00007fdbfc0a4f60 RCX: 00007fdbfbf14f19 [ 670.660736][ T7671] RDX: 000000000000000c RSI: 0000000020000100 RDI: 0000000000000008 [ 670.668557][ T7671] RBP: 00007fdbfab960a0 R08: 0000000000000000 R09: 0000000000000000 [ 670.676360][ T7671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 670.684169][ T7671] R13: 000000000000000b R14: 00007fdbfc0a4f60 R15: 00007ffd428eca38 [ 670.691998][ T7671] [ 671.585841][ T7694] bridge0: port 3(veth0_to_batadv) entered blocking state [ 671.601223][ T7694] bridge0: port 3(veth0_to_batadv) entered disabled state [ 671.616797][ T7694] device veth0_to_batadv entered promiscuous mode [ 672.983427][ T7739] FAULT_INJECTION: forcing a failure. [ 672.983427][ T7739] name failslab, interval 1, probability 0, space 0, times 0 [ 673.082143][ T7739] CPU: 1 PID: 7739 Comm: syz.1.2170 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 673.091971][ T7739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 673.101867][ T7739] Call Trace: [ 673.104991][ T7739] [ 673.107764][ T7739] dump_stack_lvl+0x151/0x1b7 [ 673.112289][ T7739] ? io_uring_drop_tctx_refs+0x190/0x190 [ 673.117752][ T7739] ? stack_trace_save+0x113/0x1c0 [ 673.122619][ T7739] dump_stack+0x15/0x17 [ 673.126601][ T7739] should_fail+0x3c6/0x510 [ 673.130852][ T7739] __should_failslab+0xa4/0xe0 [ 673.135450][ T7739] should_failslab+0x9/0x20 [ 673.139790][ T7739] slab_pre_alloc_hook+0x37/0xd0 [ 673.144579][ T7739] __kmalloc+0x6d/0x270 [ 673.148556][ T7739] ? __x64_sys_openat+0x243/0x290 [ 673.153416][ T7739] ? bpf_prog_array_alloc+0x40/0x60 [ 673.158453][ T7739] bpf_prog_array_alloc+0x40/0x60 [ 673.163313][ T7739] compute_effective_progs+0x2a1/0x670 [ 673.168611][ T7739] update_effective_progs+0x5b/0x310 [ 673.173732][ T7739] ? find_attach_entry+0x119/0x210 [ 673.178678][ T7739] __cgroup_bpf_attach+0x826/0xcd0 [ 673.183631][ T7739] ? compute_effective_progs+0x670/0x670 [ 673.189092][ T7739] ? wait_for_completion_killable_timeout+0x10/0x10 [ 673.195513][ T7739] ? __fget_files+0x31e/0x380 [ 673.200033][ T7739] ? __kasan_check_write+0x14/0x20 [ 673.204986][ T7739] cgroup_bpf_attach+0x4a/0x70 [ 673.209572][ T7739] cgroup_bpf_prog_attach+0x1d1/0x4f0 [ 673.214847][ T7739] bpf_prog_attach+0x718/0x890 [ 673.219394][ T7739] ? bpf_obj_get+0x120/0x120 [ 673.223992][ T7739] ? selinux_bpf+0xd2/0x100 [ 673.228508][ T7739] ? security_bpf+0x82/0xb0 [ 673.232838][ T7739] __sys_bpf+0x537/0x760 [ 673.236912][ T7739] ? bpf_get_current_cgroup_id+0xa2/0xb0 [ 673.242388][ T7739] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 673.247595][ T7739] ? bpf_trace_run2+0xf1/0x210 [ 673.252203][ T7739] ? __bpf_trace_sys_enter+0x62/0x70 [ 673.257309][ T7739] __x64_sys_bpf+0x7c/0x90 [ 673.261654][ T7739] do_syscall_64+0x3d/0xb0 [ 673.266248][ T7739] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 673.271978][ T7739] RIP: 0033:0x7fd328f85f19 [ 673.276317][ T7739] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 673.295938][ T7739] RSP: 002b:00007fd327c07048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 673.304263][ T7739] RAX: ffffffffffffffda RBX: 00007fd329115f60 RCX: 00007fd328f85f19 [ 673.312366][ T7739] RDX: 000000000000000c RSI: 0000000020000100 RDI: 0000000000000008 [ 673.320167][ T7739] RBP: 00007fd327c070a0 R08: 0000000000000000 R09: 0000000000000000 [ 673.327979][ T7739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 673.335792][ T7739] R13: 000000000000000b R14: 00007fd329115f60 R15: 00007fff89a575a8 [ 673.343618][ T7739] [ 675.366585][ T7799] FAULT_INJECTION: forcing a failure. [ 675.366585][ T7799] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 675.386516][ T7799] CPU: 1 PID: 7799 Comm: syz.2.2191 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 675.396259][ T7799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 675.406150][ T7799] Call Trace: [ 675.409273][ T7799] [ 675.412051][ T7799] dump_stack_lvl+0x151/0x1b7 [ 675.416570][ T7799] ? io_uring_drop_tctx_refs+0x190/0x190 [ 675.422034][ T7799] ? kmem_cache_free+0x116/0x2e0 [ 675.426807][ T7799] ? vsnprintf+0x1dc/0x1c70 [ 675.431149][ T7799] dump_stack+0x15/0x17 [ 675.435137][ T7799] should_fail+0x3c6/0x510 [ 675.439399][ T7799] should_fail_usercopy+0x1a/0x20 [ 675.444253][ T7799] _copy_from_user+0x20/0xd0 [ 675.448678][ T7799] kstrtouint_from_user+0xca/0x2a0 [ 675.453624][ T7799] ? kstrtol_from_user+0x310/0x310 [ 675.458576][ T7799] ? snprintf+0xd6/0x120 [ 675.462656][ T7799] ? check_stack_object+0x114/0x130 [ 675.467690][ T7799] ? __kasan_check_read+0x11/0x20 [ 675.472548][ T7799] ? _copy_to_user+0x78/0x90 [ 675.476973][ T7799] proc_fail_nth_write+0xa6/0x290 [ 675.481831][ T7799] ? selinux_file_permission+0x2c4/0x570 [ 675.487302][ T7799] ? proc_fail_nth_read+0x210/0x210 [ 675.492333][ T7799] ? fsnotify_perm+0x6a/0x5d0 [ 675.496849][ T7799] ? security_file_permission+0x86/0xb0 [ 675.502235][ T7799] ? proc_fail_nth_read+0x210/0x210 [ 675.507270][ T7799] vfs_write+0x406/0x1110 [ 675.511434][ T7799] ? file_end_write+0x1c0/0x1c0 [ 675.516128][ T7799] ? __kasan_check_write+0x14/0x20 [ 675.521075][ T7799] ? mutex_lock+0xb6/0x1e0 [ 675.525319][ T7799] ? wait_for_completion_killable_timeout+0x10/0x10 [ 675.531750][ T7799] ? __fdget_pos+0x2e7/0x3a0 [ 675.536164][ T7799] ? ksys_write+0x77/0x2c0 [ 675.540571][ T7799] ksys_write+0x199/0x2c0 [ 675.544736][ T7799] ? bpf_trace_run1+0x1c0/0x1c0 [ 675.549419][ T7799] ? __ia32_sys_read+0x90/0x90 [ 675.554016][ T7799] ? __bpf_trace_sys_enter+0x62/0x70 [ 675.559144][ T7799] __x64_sys_write+0x7b/0x90 [ 675.563558][ T7799] do_syscall_64+0x3d/0xb0 [ 675.568170][ T7799] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 675.573889][ T7799] RIP: 0033:0x7f6e9605aa9f [ 675.578143][ T7799] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 29 8c 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 7c 8c 02 00 48 [ 675.597613][ T7799] RSP: 002b:00007f6e94cdd040 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 675.605835][ T7799] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6e9605aa9f [ 675.613640][ T7799] RDX: 0000000000000001 RSI: 00007f6e94cdd0b0 RDI: 0000000000000004 [ 675.621452][ T7799] RBP: 00007f6e94cdd0a0 R08: 0000000000000000 R09: 0000000000000000 [ 675.629522][ T7799] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 675.637270][ T7799] R13: 000000000000000b R14: 00007f6e961ebf60 R15: 00007fff63dc1678 [ 675.645089][ T7799] [ 682.517829][ T7990] syz.2.2258[7990] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 682.517901][ T7990] syz.2.2258[7990] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 682.531927][ T7990] device pim6reg1 entered promiscuous mode [ 732.561522][ T9038] FAULT_INJECTION: forcing a failure. [ 732.561522][ T9038] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 732.611042][ T9038] CPU: 0 PID: 9038 Comm: syz.0.2629 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 732.621022][ T9038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 732.630922][ T9038] Call Trace: [ 732.634042][ T9038] [ 732.636820][ T9038] dump_stack_lvl+0x151/0x1b7 [ 732.641352][ T9038] ? io_uring_drop_tctx_refs+0x190/0x190 [ 732.646802][ T9038] dump_stack+0x15/0x17 [ 732.650879][ T9038] should_fail+0x3c6/0x510 [ 732.655138][ T9038] should_fail_usercopy+0x1a/0x20 [ 732.659992][ T9038] _copy_from_user+0x20/0xd0 [ 732.664417][ T9038] ___sys_recvmsg+0x150/0x690 [ 732.668933][ T9038] ? __sys_recvmsg+0x260/0x260 [ 732.673630][ T9038] ? vfs_write+0x9ec/0x1110 [ 732.678140][ T9038] ? __fdget+0x1bc/0x240 [ 732.682215][ T9038] __x64_sys_recvmsg+0x1dc/0x2b0 [ 732.686981][ T9038] ? fput+0x1a/0x20 [ 732.690629][ T9038] ? ___sys_recvmsg+0x690/0x690 [ 732.695316][ T9038] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 732.701228][ T9038] ? exit_to_user_mode_prepare+0x39/0xa0 [ 732.706692][ T9038] do_syscall_64+0x3d/0xb0 [ 732.710936][ T9038] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 732.716664][ T9038] RIP: 0033:0x7fdbfbf14f19 [ 732.720924][ T9038] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 732.740357][ T9038] RSP: 002b:00007fdbfab75048 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 732.748601][ T9038] RAX: ffffffffffffffda RBX: 00007fdbfc0a5038 RCX: 00007fdbfbf14f19 [ 732.756415][ T9038] RDX: 0000000000002122 RSI: 00000000200003c0 RDI: 000000000000000a [ 732.764333][ T9038] RBP: 00007fdbfab750a0 R08: 0000000000000000 R09: 0000000000000000 [ 732.772316][ T9038] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 732.780130][ T9038] R13: 000000000000006e R14: 00007fdbfc0a5038 R15: 00007ffd428eca38 [ 732.787948][ T9038] [ 738.818510][ T9157] FAULT_INJECTION: forcing a failure. [ 738.818510][ T9157] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 738.831595][ T9157] CPU: 1 PID: 9157 Comm: syz.2.2675 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 738.841263][ T9157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 738.851162][ T9157] Call Trace: [ 738.854281][ T9157] [ 738.857067][ T9157] dump_stack_lvl+0x151/0x1b7 [ 738.861572][ T9157] ? io_uring_drop_tctx_refs+0x190/0x190 [ 738.867042][ T9157] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 738.872336][ T9157] ? _raw_spin_lock+0x1b0/0x1b0 [ 738.877028][ T9157] dump_stack+0x15/0x17 [ 738.881022][ T9157] should_fail+0x3c6/0x510 [ 738.885268][ T9157] should_fail_alloc_page+0x5a/0x80 [ 738.890296][ T9157] prepare_alloc_pages+0x15c/0x700 [ 738.895249][ T9157] ? __alloc_pages_bulk+0xe40/0xe40 [ 738.900284][ T9157] __alloc_pages+0x18c/0x8f0 [ 738.904818][ T9157] ? page_remove_rmap+0xddd/0x1420 [ 738.909766][ T9157] ? prep_new_page+0x110/0x110 [ 738.914364][ T9157] ? page_remove_rmap+0xebe/0x1420 [ 738.919316][ T9157] ? page_add_file_rmap+0x8e0/0x8e0 [ 738.924348][ T9157] ? __kasan_check_write+0x14/0x20 [ 738.929304][ T9157] ? _raw_spin_lock+0xa4/0x1b0 [ 738.934155][ T9157] __get_free_pages+0x10/0x30 [ 738.938778][ T9157] __tlb_remove_page_size+0x178/0x300 [ 738.943994][ T9157] unmap_page_range+0x1226/0x1ed0 [ 738.948844][ T9157] ? stack_trace_save+0x1c0/0x1c0 [ 738.953710][ T9157] ? mmu_notifier_invalidate_range_end+0xe0/0xe0 [ 738.959866][ T9157] ? uprobe_munmap+0x18d/0x450 [ 738.964470][ T9157] unmap_vmas+0x389/0x560 [ 738.968637][ T9157] ? unmap_page_range+0x1ed0/0x1ed0 [ 738.973667][ T9157] ? tlb_gather_mmu_fullmm+0x165/0x210 [ 738.979050][ T9157] exit_mmap+0x3e4/0x940 [ 738.983129][ T9157] ? exit_aio+0x25e/0x3c0 [ 738.987293][ T9157] ? vm_brk+0x30/0x30 [ 738.991108][ T9157] ? mutex_unlock+0xb2/0x260 [ 738.995556][ T9157] ? uprobe_clear_state+0x2cd/0x320 [ 739.000573][ T9157] __mmput+0x95/0x310 [ 739.004394][ T9157] mmput+0x5b/0x170 [ 739.008036][ T9157] do_exit+0xb9c/0x2ca0 [ 739.012032][ T9157] ? security_file_free+0xc6/0xe0 [ 739.016889][ T9157] ? percpu_counter_add_batch+0x13d/0x160 [ 739.022444][ T9157] ? put_task_struct+0x80/0x80 [ 739.027144][ T9157] ? __fput+0x71b/0x910 [ 739.031126][ T9157] ? __kasan_check_write+0x14/0x20 [ 739.036083][ T9157] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 739.041015][ T9157] ? _raw_spin_lock_irqsave+0x210/0x210 [ 739.046400][ T9157] do_group_exit+0x141/0x310 [ 739.050826][ T9157] get_signal+0x7a3/0x1630 [ 739.055088][ T9157] arch_do_signal_or_restart+0xbd/0x1680 [ 739.060549][ T9157] ? kick_process+0xde/0x150 [ 739.064969][ T9157] ? task_work_add+0x1b0/0x1d0 [ 739.069572][ T9157] ? get_sigframe_size+0x10/0x10 [ 739.074346][ T9157] ? fput_many+0x167/0x1b0 [ 739.078606][ T9157] exit_to_user_mode_loop+0xa0/0xe0 [ 739.083629][ T9157] exit_to_user_mode_prepare+0x5a/0xa0 [ 739.088930][ T9157] syscall_exit_to_user_mode+0x26/0x160 [ 739.094305][ T9157] do_syscall_64+0x49/0xb0 [ 739.098558][ T9157] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 739.104206][ T9157] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 739.109929][ T9157] RIP: 0033:0x7f6e9605bf19 [ 739.114180][ T9157] Code: Unable to access opcode bytes at RIP 0x7f6e9605beef. [ 739.121385][ T9157] RSP: 002b:00007f6e94cdd048 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 739.129632][ T9157] RAX: fffffffffffffe00 RBX: 00007f6e961ebf60 RCX: 00007f6e9605bf19 [ 739.137442][ T9157] RDX: 0000000000002122 RSI: 00000000200003c0 RDI: 000000000000000a [ 739.145343][ T9157] RBP: 00007f6e94cdd0a0 R08: 0000000000000000 R09: 0000000000000000 [ 739.153152][ T9157] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 739.160995][ T9157] R13: 000000000000000b R14: 00007f6e961ebf60 R15: 00007fff63dc1678 [ 739.168785][ T9157] [ 754.698427][ T30] audit: type=1400 audit(1721887709.917:155): avc: denied { create } for pid=9520 comm="syz.1.2801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 772.850599][ T30] audit: type=1400 audit(1721887728.067:156): avc: denied { create } for pid=9921 comm="syz.3.2947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 774.183997][ T9961] device syzkaller0 entered promiscuous mode [ 774.244248][ T9964] device syzkaller0 entered promiscuous mode [ 775.504410][T10003] device wg2 left promiscuous mode [ 775.520746][T10003] device wg2 entered promiscuous mode [ 786.349693][T10243] device syzkaller0 entered promiscuous mode [ 789.243069][T10310] device pim6reg1 entered promiscuous mode [ 791.282931][T10358] device veth0_vlan left promiscuous mode [ 791.432367][T10358] device veth0_vlan entered promiscuous mode [ 791.519958][ T7056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 791.528461][ T7056] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 791.552923][ T7056] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 792.481922][ T8] device veth0_to_batadv left promiscuous mode [ 792.487993][ T8] bridge0: port 3(veth0_to_batadv) entered disabled state [ 792.568314][ T8] device bridge_slave_1 left promiscuous mode [ 792.591148][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 792.642641][ T8] device bridge_slave_0 left promiscuous mode [ 792.672259][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 792.718188][ T8] device veth1_macvtap left promiscuous mode [ 792.753438][ T8] device veth0_vlan left promiscuous mode [ 793.304332][T10379] bridge0: port 1(bridge_slave_0) entered blocking state [ 793.321050][T10379] bridge0: port 1(bridge_slave_0) entered disabled state [ 793.332088][T10379] device bridge_slave_0 entered promiscuous mode [ 793.362520][T10379] bridge0: port 2(bridge_slave_1) entered blocking state [ 793.369669][T10379] bridge0: port 2(bridge_slave_1) entered disabled state [ 793.377299][T10379] device bridge_slave_1 entered promiscuous mode [ 793.868857][T10379] bridge0: port 2(bridge_slave_1) entered blocking state [ 793.875773][T10379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 794.271674][ T1507] bridge0: port 2(bridge_slave_1) entered disabled state [ 794.319413][ T1507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 794.389291][ T1507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 794.485581][ T1507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 794.554512][ T1507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 794.599436][ T1507] bridge0: port 1(bridge_slave_0) entered blocking state [ 794.606379][ T1507] bridge0: port 1(bridge_slave_0) entered forwarding state [ 794.617475][ T1507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 794.635835][ T1507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 794.644210][ T1507] bridge0: port 2(bridge_slave_1) entered blocking state [ 794.651111][ T1507] bridge0: port 2(bridge_slave_1) entered forwarding state [ 794.744403][T10437] syz.3.3131[10437] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 794.744479][T10437] syz.3.3131[10437] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 794.948890][T10436] device wg2 entered promiscuous mode [ 794.972820][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 795.001603][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 795.052567][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 795.111381][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 795.136459][T10443] device pim6reg1 entered promiscuous mode [ 795.183404][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 795.211431][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 795.219739][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 795.411435][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 795.420639][T10379] device veth0_vlan entered promiscuous mode [ 795.454646][ T1507] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 795.470471][ T1507] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 795.497983][T10379] device veth1_macvtap entered promiscuous mode [ 795.565406][ T7058] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 795.604139][ T7058] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 795.683903][ T7058] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 795.765768][ T7058] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 795.841645][ T7058] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 795.849901][ T7058] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 795.992600][ T7058] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 797.512983][T10500] device veth1_macvtap entered promiscuous mode [ 797.521666][T10500] device macsec0 entered promiscuous mode [ 797.579390][ T7056] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 797.783285][ T30] audit: type=1400 audit(1721887753.007:157): avc: denied { create } for pid=10512 comm="syz.3.3158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 800.800604][T10596] bridge0: port 1(bridge_slave_0) entered blocking state [ 800.940846][T10596] bridge0: port 1(bridge_slave_0) entered disabled state [ 800.948319][T10596] device bridge_slave_0 entered promiscuous mode [ 800.955344][T10596] bridge0: port 2(bridge_slave_1) entered blocking state [ 800.962235][T10596] bridge0: port 2(bridge_slave_1) entered disabled state [ 800.969545][T10596] device bridge_slave_1 entered promiscuous mode [ 801.799541][ T7054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 801.807347][ T7054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 801.846812][ T7056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 801.857363][ T7056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 801.869883][ T7056] bridge0: port 1(bridge_slave_0) entered blocking state [ 801.876810][ T7056] bridge0: port 1(bridge_slave_0) entered forwarding state [ 801.884828][ T7056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 801.934864][ T7056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 801.983709][ T7056] bridge0: port 2(bridge_slave_1) entered blocking state [ 801.990630][ T7056] bridge0: port 2(bridge_slave_1) entered forwarding state [ 801.998829][ T45] device veth0_to_batadv left promiscuous mode [ 802.006817][ T45] bridge0: port 3(veth0_to_batadv) entered disabled state [ 802.034082][ T45] device bridge_slave_1 left promiscuous mode [ 802.058663][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 802.081520][ T45] device bridge_slave_0 left promiscuous mode [ 802.097667][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 802.142366][ T45] device veth1_macvtap left promiscuous mode [ 802.649522][ T7054] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 802.681184][ T1507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 802.781394][ T1507] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 802.789879][ T1507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 802.861342][ T1507] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 802.923017][T10596] device veth0_vlan entered promiscuous mode [ 802.971323][ T1507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 803.035785][ T1507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 803.051533][ T1507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 803.071592][ T1507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 803.086732][T10596] device veth1_macvtap entered promiscuous mode [ 803.125554][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 803.154044][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 803.212512][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 803.273220][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 803.332182][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 803.395394][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 803.454306][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 803.472854][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 803.481126][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 809.122608][T10829] FAULT_INJECTION: forcing a failure. [ 809.122608][T10829] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 809.231286][T10829] CPU: 0 PID: 10829 Comm: syz.2.3270 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 809.241108][T10829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 809.251095][T10829] Call Trace: [ 809.254216][T10829] [ 809.256996][T10829] dump_stack_lvl+0x151/0x1b7 [ 809.261511][T10829] ? io_uring_drop_tctx_refs+0x190/0x190 [ 809.266980][T10829] ? __kasan_check_write+0x14/0x20 [ 809.271925][T10829] dump_stack+0x15/0x17 [ 809.275915][T10829] should_fail+0x3c6/0x510 [ 809.280169][T10829] should_fail_usercopy+0x1a/0x20 [ 809.285027][T10829] _copy_from_user+0x20/0xd0 [ 809.289453][T10829] sock_do_ioctl+0x229/0x5a0 [ 809.293890][T10829] ? sock_show_fdinfo+0xa0/0xa0 [ 809.298568][T10829] ? selinux_file_ioctl+0x3cc/0x540 [ 809.303604][T10829] sock_ioctl+0x455/0x740 [ 809.307768][T10829] ? sock_poll+0x400/0x400 [ 809.312022][T10829] ? __fget_files+0x31e/0x380 [ 809.316535][T10829] ? security_file_ioctl+0x84/0xb0 [ 809.321481][T10829] ? sock_poll+0x400/0x400 [ 809.325732][T10829] __se_sys_ioctl+0x114/0x190 [ 809.330247][T10829] __x64_sys_ioctl+0x7b/0x90 [ 809.334672][T10829] do_syscall_64+0x3d/0xb0 [ 809.338925][T10829] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 809.344653][T10829] RIP: 0033:0x7f6e9605bf19 [ 809.348906][T10829] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 809.368349][T10829] RSP: 002b:00007f6e94cdd048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 809.376593][T10829] RAX: ffffffffffffffda RBX: 00007f6e961ebf60 RCX: 00007f6e9605bf19 [ 809.384411][T10829] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 0000000000000006 [ 809.392214][T10829] RBP: 00007f6e94cdd0a0 R08: 0000000000000000 R09: 0000000000000000 [ 809.400030][T10829] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 809.407841][T10829] R13: 000000000000000b R14: 00007f6e961ebf60 R15: 00007fff63dc1678 [ 809.415670][T10829] [ 811.522749][T10905] FAULT_INJECTION: forcing a failure. [ 811.522749][T10905] name failslab, interval 1, probability 0, space 0, times 0 [ 811.729722][T10905] CPU: 1 PID: 10905 Comm: syz.4.3293 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 811.739651][T10905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 811.749534][T10905] Call Trace: [ 811.752662][T10905] [ 811.755432][T10905] dump_stack_lvl+0x151/0x1b7 [ 811.759944][T10905] ? io_uring_drop_tctx_refs+0x190/0x190 [ 811.765420][T10905] dump_stack+0x15/0x17 [ 811.769412][T10905] should_fail+0x3c6/0x510 [ 811.773662][T10905] __should_failslab+0xa4/0xe0 [ 811.778259][T10905] ? __alloc_skb+0xbe/0x550 [ 811.782600][T10905] should_failslab+0x9/0x20 [ 811.786941][T10905] slab_pre_alloc_hook+0x37/0xd0 [ 811.791717][T10905] ? __alloc_skb+0xbe/0x550 [ 811.796052][T10905] kmem_cache_alloc+0x44/0x200 [ 811.800656][T10905] __alloc_skb+0xbe/0x550 [ 811.804820][T10905] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 811.809945][T10905] rtnetlink_event+0xf3/0x1b0 [ 811.814453][T10905] raw_notifier_call_chain+0x8c/0xf0 [ 811.819571][T10905] dev_set_mac_address+0x325/0x470 [ 811.824649][T10905] ? dev_pre_changeaddr_notify+0x220/0x220 [ 811.830519][T10905] dev_set_mac_address_user+0x31/0x50 [ 811.835731][T10905] dev_ifsioc+0x7ef/0x10c0 [ 811.839984][T10905] ? dev_ioctl+0xe70/0xe70 [ 811.844235][T10905] ? mutex_lock+0xb6/0x1e0 [ 811.848499][T10905] ? wait_for_completion_killable_timeout+0x10/0x10 [ 811.854916][T10905] dev_ioctl+0x54d/0xe70 [ 811.858992][T10905] sock_do_ioctl+0x34f/0x5a0 [ 811.863419][T10905] ? sock_show_fdinfo+0xa0/0xa0 [ 811.868106][T10905] ? selinux_file_ioctl+0x3cc/0x540 [ 811.873248][T10905] sock_ioctl+0x455/0x740 [ 811.877390][T10905] ? sock_poll+0x400/0x400 [ 811.881643][T10905] ? __fget_files+0x31e/0x380 [ 811.886160][T10905] ? security_file_ioctl+0x84/0xb0 [ 811.891137][T10905] ? sock_poll+0x400/0x400 [ 811.895357][T10905] __se_sys_ioctl+0x114/0x190 [ 811.899871][T10905] __x64_sys_ioctl+0x7b/0x90 [ 811.904296][T10905] do_syscall_64+0x3d/0xb0 [ 811.908548][T10905] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 811.914760][T10905] RIP: 0033:0x7f5854f0af19 [ 811.918980][T10905] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 811.938414][T10905] RSP: 002b:00007f5853b8c048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 811.946659][T10905] RAX: ffffffffffffffda RBX: 00007f585509af60 RCX: 00007f5854f0af19 [ 811.954557][T10905] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 0000000000000006 [ 811.962369][T10905] RBP: 00007f5853b8c0a0 R08: 0000000000000000 R09: 0000000000000000 [ 811.970268][T10905] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 811.978083][T10905] R13: 000000000000000b R14: 00007f585509af60 R15: 00007ffe406cd058 [ 811.985903][T10905] [ 812.912365][T10932] gretap0: refused to change device tx_queue_len [ 813.974246][T10974] FAULT_INJECTION: forcing a failure. [ 813.974246][T10974] name failslab, interval 1, probability 0, space 0, times 0 [ 813.999274][T10974] CPU: 1 PID: 10974 Comm: syz.4.3315 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 814.009104][T10974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 814.019000][T10974] Call Trace: [ 814.022123][T10974] [ 814.024904][T10974] dump_stack_lvl+0x151/0x1b7 [ 814.029419][T10974] ? io_uring_drop_tctx_refs+0x190/0x190 [ 814.034881][T10974] dump_stack+0x15/0x17 [ 814.038872][T10974] should_fail+0x3c6/0x510 [ 814.043143][T10974] __should_failslab+0xa4/0xe0 [ 814.047723][T10974] should_failslab+0x9/0x20 [ 814.052063][T10974] slab_pre_alloc_hook+0x37/0xd0 [ 814.056839][T10974] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 814.062138][T10974] __kmalloc_track_caller+0x6c/0x260 [ 814.067252][T10974] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 814.072546][T10974] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 814.077841][T10974] __alloc_skb+0x10c/0x550 [ 814.082095][T10974] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 814.087217][T10974] rtnetlink_event+0xf3/0x1b0 [ 814.091730][T10974] raw_notifier_call_chain+0x8c/0xf0 [ 814.096907][T10974] dev_set_mac_address+0x325/0x470 [ 814.101804][T10974] ? dev_pre_changeaddr_notify+0x220/0x220 [ 814.107527][T10974] dev_set_mac_address_user+0x31/0x50 [ 814.112732][T10974] dev_ifsioc+0x7ef/0x10c0 [ 814.116986][T10974] ? dev_ioctl+0xe70/0xe70 [ 814.121303][T10974] ? mutex_lock+0x135/0x1e0 [ 814.125663][T10974] ? wait_for_completion_killable_timeout+0x10/0x10 [ 814.132089][T10974] dev_ioctl+0x54d/0xe70 [ 814.136163][T10974] sock_do_ioctl+0x34f/0x5a0 [ 814.140591][T10974] ? sock_show_fdinfo+0xa0/0xa0 [ 814.145290][T10974] ? selinux_file_ioctl+0x3cc/0x540 [ 814.150332][T10974] sock_ioctl+0x455/0x740 [ 814.154478][T10974] ? sock_poll+0x400/0x400 [ 814.158731][T10974] ? __fget_files+0x31e/0x380 [ 814.163248][T10974] ? security_file_ioctl+0x84/0xb0 [ 814.168189][T10974] ? sock_poll+0x400/0x400 [ 814.172450][T10974] __se_sys_ioctl+0x114/0x190 [ 814.176955][T10974] __x64_sys_ioctl+0x7b/0x90 [ 814.181384][T10974] do_syscall_64+0x3d/0xb0 [ 814.185635][T10974] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 814.191372][T10974] RIP: 0033:0x7f5854f0af19 [ 814.195620][T10974] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 814.215143][T10974] RSP: 002b:00007f5853b8c048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 814.223389][T10974] RAX: ffffffffffffffda RBX: 00007f585509af60 RCX: 00007f5854f0af19 [ 814.231207][T10974] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 0000000000000006 [ 814.239014][T10974] RBP: 00007f5853b8c0a0 R08: 0000000000000000 R09: 0000000000000000 [ 814.246823][T10974] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 814.254634][T10974] R13: 000000000000000b R14: 00007f585509af60 R15: 00007ffe406cd058 [ 814.262454][T10974] [ 815.749667][T11026] FAULT_INJECTION: forcing a failure. [ 815.749667][T11026] name failslab, interval 1, probability 0, space 0, times 0 [ 815.762489][T11026] CPU: 1 PID: 11026 Comm: syz.3.3332 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 815.772255][T11026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 815.782147][T11026] Call Trace: [ 815.785272][T11026] [ 815.788045][T11026] dump_stack_lvl+0x151/0x1b7 [ 815.792561][T11026] ? io_uring_drop_tctx_refs+0x190/0x190 [ 815.798028][T11026] ? copy_from_kernel_nofault+0x2b6/0x2e0 [ 815.803582][T11026] dump_stack+0x15/0x17 [ 815.807572][T11026] should_fail+0x3c6/0x510 [ 815.811827][T11026] __should_failslab+0xa4/0xe0 [ 815.816427][T11026] ? __alloc_skb+0xbe/0x550 [ 815.820767][T11026] should_failslab+0x9/0x20 [ 815.825119][T11026] slab_pre_alloc_hook+0x37/0xd0 [ 815.829878][T11026] ? __alloc_skb+0xbe/0x550 [ 815.834221][T11026] kmem_cache_alloc+0x44/0x200 [ 815.838836][T11026] __alloc_skb+0xbe/0x550 [ 815.842984][T11026] fdb_notify+0x77/0x120 [ 815.847062][T11026] fdb_delete+0x83c/0xac0 [ 815.851231][T11026] fdb_delete_local+0x3d1/0x470 [ 815.856009][T11026] br_fdb_changeaddr+0x1bb/0x1c0 [ 815.860776][T11026] br_device_event+0x3c6/0x7c0 [ 815.865377][T11026] ? br_boolopt_multi_get+0xf0/0xf0 [ 815.870414][T11026] ? packet_notifier+0x8ad/0x8c0 [ 815.875187][T11026] ? ipv6_mc_netdev_event+0xa4/0x480 [ 815.880306][T11026] raw_notifier_call_chain+0x8c/0xf0 [ 815.885427][T11026] dev_set_mac_address+0x325/0x470 [ 815.890371][T11026] ? dev_pre_changeaddr_notify+0x220/0x220 [ 815.896018][T11026] dev_set_mac_address_user+0x31/0x50 [ 815.901221][T11026] dev_ifsioc+0x7ef/0x10c0 [ 815.905476][T11026] ? dev_ioctl+0xe70/0xe70 [ 815.909727][T11026] ? mutex_lock+0xb6/0x1e0 [ 815.913979][T11026] ? wait_for_completion_killable_timeout+0x10/0x10 [ 815.920404][T11026] dev_ioctl+0x54d/0xe70 [ 815.924485][T11026] sock_do_ioctl+0x34f/0x5a0 [ 815.928911][T11026] ? sock_show_fdinfo+0xa0/0xa0 [ 815.933597][T11026] ? selinux_file_ioctl+0x3cc/0x540 [ 815.938631][T11026] sock_ioctl+0x455/0x740 [ 815.942797][T11026] ? sock_poll+0x400/0x400 [ 815.947049][T11026] ? __fget_files+0x31e/0x380 [ 815.951565][T11026] ? security_file_ioctl+0x84/0xb0 [ 815.956507][T11026] ? sock_poll+0x400/0x400 [ 815.960760][T11026] __se_sys_ioctl+0x114/0x190 [ 815.965277][T11026] __x64_sys_ioctl+0x7b/0x90 [ 815.969699][T11026] do_syscall_64+0x3d/0xb0 [ 815.973952][T11026] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 815.979681][T11026] RIP: 0033:0x7f00d1131f19 [ 815.984196][T11026] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 816.003637][T11026] RSP: 002b:00007f00cfdb3048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 816.011882][T11026] RAX: ffffffffffffffda RBX: 00007f00d12c1f60 RCX: 00007f00d1131f19 [ 816.019692][T11026] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 0000000000000006 [ 816.027509][T11026] RBP: 00007f00cfdb30a0 R08: 0000000000000000 R09: 0000000000000000 [ 816.035315][T11026] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 816.043127][T11026] R13: 000000000000000b R14: 00007f00d12c1f60 R15: 00007ffe77c62798 [ 816.050945][T11026] [ 818.002881][T11081] FAULT_INJECTION: forcing a failure. [ 818.002881][T11081] name failslab, interval 1, probability 0, space 0, times 0 [ 818.015365][T11081] CPU: 1 PID: 11081 Comm: syz.3.3354 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 818.025116][T11081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 818.035014][T11081] Call Trace: [ 818.038136][T11081] [ 818.040911][T11081] dump_stack_lvl+0x151/0x1b7 [ 818.045425][T11081] ? io_uring_drop_tctx_refs+0x190/0x190 [ 818.050986][T11081] dump_stack+0x15/0x17 [ 818.054974][T11081] should_fail+0x3c6/0x510 [ 818.059343][T11081] __should_failslab+0xa4/0xe0 [ 818.063955][T11081] should_failslab+0x9/0x20 [ 818.068293][T11081] slab_pre_alloc_hook+0x37/0xd0 [ 818.073056][T11081] ? fdb_notify+0x77/0x120 [ 818.077308][T11081] __kmalloc_track_caller+0x6c/0x260 [ 818.082429][T11081] ? fdb_notify+0x77/0x120 [ 818.086695][T11081] ? fdb_notify+0x77/0x120 [ 818.090937][T11081] __alloc_skb+0x10c/0x550 [ 818.095188][T11081] fdb_notify+0x77/0x120 [ 818.099269][T11081] fdb_delete+0x83c/0xac0 [ 818.103447][T11081] fdb_delete_local+0x3d1/0x470 [ 818.108121][T11081] br_fdb_changeaddr+0x1bb/0x1c0 [ 818.112902][T11081] br_device_event+0x3c6/0x7c0 [ 818.117648][T11081] ? br_boolopt_multi_get+0xf0/0xf0 [ 818.122676][T11081] ? packet_notifier+0x8ad/0x8c0 [ 818.127457][T11081] ? ipv6_mc_netdev_event+0xa4/0x480 [ 818.132575][T11081] raw_notifier_call_chain+0x8c/0xf0 [ 818.137970][T11081] dev_set_mac_address+0x325/0x470 [ 818.142900][T11081] ? dev_pre_changeaddr_notify+0x220/0x220 [ 818.148541][T11081] dev_set_mac_address_user+0x31/0x50 [ 818.153751][T11081] dev_ifsioc+0x7ef/0x10c0 [ 818.158002][T11081] ? dev_ioctl+0xe70/0xe70 [ 818.162251][T11081] ? mutex_lock+0xb6/0x1e0 [ 818.166508][T11081] ? wait_for_completion_killable_timeout+0x10/0x10 [ 818.172930][T11081] dev_ioctl+0x54d/0xe70 [ 818.177051][T11081] sock_do_ioctl+0x34f/0x5a0 [ 818.181439][T11081] ? sock_show_fdinfo+0xa0/0xa0 [ 818.186131][T11081] ? selinux_file_ioctl+0x3cc/0x540 [ 818.191154][T11081] sock_ioctl+0x455/0x740 [ 818.195329][T11081] ? sock_poll+0x400/0x400 [ 818.199573][T11081] ? __fget_files+0x31e/0x380 [ 818.204089][T11081] ? security_file_ioctl+0x84/0xb0 [ 818.209039][T11081] ? sock_poll+0x400/0x400 [ 818.213288][T11081] __se_sys_ioctl+0x114/0x190 [ 818.217890][T11081] __x64_sys_ioctl+0x7b/0x90 [ 818.222313][T11081] do_syscall_64+0x3d/0xb0 [ 818.226567][T11081] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 818.232291][T11081] RIP: 0033:0x7f00d1131f19 [ 818.236549][T11081] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 818.256772][T11081] RSP: 002b:00007f00cfdb3048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 818.265054][T11081] RAX: ffffffffffffffda RBX: 00007f00d12c1f60 RCX: 00007f00d1131f19 [ 818.272853][T11081] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 0000000000000006 [ 818.280635][T11081] RBP: 00007f00cfdb30a0 R08: 0000000000000000 R09: 0000000000000000 [ 818.288450][T11081] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 818.296259][T11081] R13: 000000000000000b R14: 00007f00d12c1f60 R15: 00007ffe77c62798 [ 818.304077][T11081] [ 819.869778][T11132] FAULT_INJECTION: forcing a failure. [ 819.869778][T11132] name failslab, interval 1, probability 0, space 0, times 0 [ 819.882271][T11132] CPU: 0 PID: 11132 Comm: syz.3.3373 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 819.892024][T11132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 819.901915][T11132] Call Trace: [ 819.905037][T11132] [ 819.907906][T11132] dump_stack_lvl+0x151/0x1b7 [ 819.912622][T11132] ? io_uring_drop_tctx_refs+0x190/0x190 [ 819.918090][T11132] ? __kasan_check_read+0x11/0x20 [ 819.922950][T11132] ? call_rcu+0xd90/0x1310 [ 819.927202][T11132] dump_stack+0x15/0x17 [ 819.931192][T11132] should_fail+0x3c6/0x510 [ 819.935447][T11132] __should_failslab+0xa4/0xe0 [ 819.940046][T11132] ? fdb_create+0x37/0xcf0 [ 819.944463][T11132] should_failslab+0x9/0x20 [ 819.948783][T11132] slab_pre_alloc_hook+0x37/0xd0 [ 819.953558][T11132] ? fdb_create+0x37/0xcf0 [ 819.957800][T11132] kmem_cache_alloc+0x44/0x200 [ 819.962398][T11132] fdb_create+0x37/0xcf0 [ 819.966475][T11132] ? br_fdb_find_rcu+0x30/0x30 [ 819.971173][T11132] fdb_insert+0x142/0x270 [ 819.975335][T11132] br_fdb_changeaddr+0x18f/0x1c0 [ 819.980105][T11132] br_device_event+0x3c6/0x7c0 [ 819.984710][T11132] ? br_boolopt_multi_get+0xf0/0xf0 [ 819.989739][T11132] ? packet_notifier+0x8ad/0x8c0 [ 819.994515][T11132] ? ipv6_mc_netdev_event+0xa4/0x480 [ 819.999633][T11132] raw_notifier_call_chain+0x8c/0xf0 [ 820.004756][T11132] dev_set_mac_address+0x325/0x470 [ 820.009701][T11132] ? dev_pre_changeaddr_notify+0x220/0x220 [ 820.015345][T11132] dev_set_mac_address_user+0x31/0x50 [ 820.020554][T11132] dev_ifsioc+0x7ef/0x10c0 [ 820.024805][T11132] ? dev_ioctl+0xe70/0xe70 [ 820.029056][T11132] ? mutex_lock+0xb6/0x1e0 [ 820.033309][T11132] ? wait_for_completion_killable_timeout+0x10/0x10 [ 820.039845][T11132] dev_ioctl+0x54d/0xe70 [ 820.043915][T11132] sock_do_ioctl+0x34f/0x5a0 [ 820.048346][T11132] ? sock_show_fdinfo+0xa0/0xa0 [ 820.053035][T11132] ? selinux_file_ioctl+0x3cc/0x540 [ 820.058064][T11132] sock_ioctl+0x455/0x740 [ 820.062227][T11132] ? sock_poll+0x400/0x400 [ 820.066479][T11132] ? __fget_files+0x31e/0x380 [ 820.071080][T11132] ? security_file_ioctl+0x84/0xb0 [ 820.076026][T11132] ? sock_poll+0x400/0x400 [ 820.080286][T11132] __se_sys_ioctl+0x114/0x190 [ 820.084796][T11132] __x64_sys_ioctl+0x7b/0x90 [ 820.089219][T11132] do_syscall_64+0x3d/0xb0 [ 820.093470][T11132] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 820.099199][T11132] RIP: 0033:0x7f00d1131f19 [ 820.103451][T11132] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 820.122890][T11132] RSP: 002b:00007f00cfdb3048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 820.131136][T11132] RAX: ffffffffffffffda RBX: 00007f00d12c1f60 RCX: 00007f00d1131f19 [ 820.138950][T11132] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 0000000000000006 [ 820.146768][T11132] RBP: 00007f00cfdb30a0 R08: 0000000000000000 R09: 0000000000000000 [ 820.154882][T11132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 820.162651][T11132] R13: 000000000000000b R14: 00007f00d12c1f60 R15: 00007ffe77c62798 [ 820.170473][T11132] [ 822.005659][T11190] FAULT_INJECTION: forcing a failure. [ 822.005659][T11190] name failslab, interval 1, probability 0, space 0, times 0 [ 822.077990][T11190] CPU: 1 PID: 11190 Comm: syz.3.3392 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 822.087904][T11190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 822.097801][T11190] Call Trace: [ 822.100931][T11190] [ 822.103700][T11190] dump_stack_lvl+0x151/0x1b7 [ 822.108216][T11190] ? io_uring_drop_tctx_refs+0x190/0x190 [ 822.113685][T11190] ? __kasan_check_read+0x11/0x20 [ 822.118544][T11190] dump_stack+0x15/0x17 [ 822.122534][T11190] should_fail+0x3c6/0x510 [ 822.126785][T11190] __should_failslab+0xa4/0xe0 [ 822.131386][T11190] ? __alloc_skb+0xbe/0x550 [ 822.135724][T11190] should_failslab+0x9/0x20 [ 822.140155][T11190] slab_pre_alloc_hook+0x37/0xd0 [ 822.144928][T11190] ? __alloc_skb+0xbe/0x550 [ 822.149477][T11190] kmem_cache_alloc+0x44/0x200 [ 822.154079][T11190] __alloc_skb+0xbe/0x550 [ 822.158241][T11190] br_info_notify+0xb4/0x170 [ 822.162683][T11190] br_ifinfo_notify+0x28/0x30 [ 822.167182][T11190] br_device_event+0x6ad/0x7c0 [ 822.171788][T11190] ? br_boolopt_multi_get+0xf0/0xf0 [ 822.176815][T11190] ? packet_notifier+0x8ad/0x8c0 [ 822.181593][T11190] ? ipv6_mc_netdev_event+0xa4/0x480 [ 822.186709][T11190] raw_notifier_call_chain+0x8c/0xf0 [ 822.191832][T11190] dev_set_mac_address+0x325/0x470 [ 822.196977][T11190] ? dev_pre_changeaddr_notify+0x220/0x220 [ 822.202625][T11190] dev_set_mac_address_user+0x31/0x50 [ 822.207824][T11190] dev_ifsioc+0x7ef/0x10c0 [ 822.212082][T11190] ? dev_ioctl+0xe70/0xe70 [ 822.216502][T11190] ? mutex_lock+0xb6/0x1e0 [ 822.220762][T11190] ? wait_for_completion_killable_timeout+0x10/0x10 [ 822.227268][T11190] dev_ioctl+0x54d/0xe70 [ 822.231349][T11190] sock_do_ioctl+0x34f/0x5a0 [ 822.235781][T11190] ? sock_show_fdinfo+0xa0/0xa0 [ 822.240468][T11190] ? selinux_file_ioctl+0x3cc/0x540 [ 822.245580][T11190] sock_ioctl+0x455/0x740 [ 822.249745][T11190] ? sock_poll+0x400/0x400 [ 822.253998][T11190] ? __fget_files+0x31e/0x380 [ 822.258515][T11190] ? security_file_ioctl+0x84/0xb0 [ 822.263457][T11190] ? sock_poll+0x400/0x400 [ 822.267710][T11190] __se_sys_ioctl+0x114/0x190 [ 822.272226][T11190] __x64_sys_ioctl+0x7b/0x90 [ 822.276656][T11190] do_syscall_64+0x3d/0xb0 [ 822.280906][T11190] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 822.286628][T11190] RIP: 0033:0x7f00d1131f19 [ 822.290886][T11190] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 822.310415][T11190] RSP: 002b:00007f00cfdb3048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 822.318660][T11190] RAX: ffffffffffffffda RBX: 00007f00d12c1f60 RCX: 00007f00d1131f19 [ 822.326470][T11190] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 0000000000000006 [ 822.334277][T11190] RBP: 00007f00cfdb30a0 R08: 0000000000000000 R09: 0000000000000000 [ 822.342093][T11190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 822.349900][T11190] R13: 000000000000000b R14: 00007f00d12c1f60 R15: 00007ffe77c62798 [ 822.357727][T11190] [ 824.114537][T11252] FAULT_INJECTION: forcing a failure. [ 824.114537][T11252] name failslab, interval 1, probability 0, space 0, times 0 [ 824.127016][T11252] CPU: 0 PID: 11252 Comm: syz.0.3412 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 824.136766][T11252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 824.146662][T11252] Call Trace: [ 824.149786][T11252] [ 824.152672][T11252] dump_stack_lvl+0x151/0x1b7 [ 824.157165][T11252] ? io_uring_drop_tctx_refs+0x190/0x190 [ 824.162638][T11252] dump_stack+0x15/0x17 [ 824.166712][T11252] should_fail+0x3c6/0x510 [ 824.170965][T11252] __should_failslab+0xa4/0xe0 [ 824.175652][T11252] should_failslab+0x9/0x20 [ 824.179993][T11252] slab_pre_alloc_hook+0x37/0xd0 [ 824.184783][T11252] ? fdb_notify+0x77/0x120 [ 824.189021][T11252] __kmalloc_track_caller+0x6c/0x260 [ 824.194134][T11252] ? fdb_notify+0x77/0x120 [ 824.198390][T11252] ? fdb_notify+0x77/0x120 [ 824.202649][T11252] __alloc_skb+0x10c/0x550 [ 824.206901][T11252] fdb_notify+0x77/0x120 [ 824.210977][T11252] fdb_insert+0x16f/0x270 [ 824.215317][T11252] br_fdb_changeaddr+0x18f/0x1c0 [ 824.220091][T11252] br_device_event+0x3c6/0x7c0 [ 824.224689][T11252] ? br_boolopt_multi_get+0xf0/0xf0 [ 824.229729][T11252] ? packet_notifier+0x8ad/0x8c0 [ 824.234524][T11252] ? ipv6_mc_netdev_event+0xa4/0x480 [ 824.239622][T11252] raw_notifier_call_chain+0x8c/0xf0 [ 824.244742][T11252] dev_set_mac_address+0x325/0x470 [ 824.249775][T11252] ? dev_pre_changeaddr_notify+0x220/0x220 [ 824.255415][T11252] dev_set_mac_address_user+0x31/0x50 [ 824.260619][T11252] dev_ifsioc+0x7ef/0x10c0 [ 824.264874][T11252] ? dev_ioctl+0xe70/0xe70 [ 824.269124][T11252] ? mutex_lock+0xb6/0x1e0 [ 824.273381][T11252] ? wait_for_completion_killable_timeout+0x10/0x10 [ 824.279813][T11252] dev_ioctl+0x54d/0xe70 [ 824.283884][T11252] sock_do_ioctl+0x34f/0x5a0 [ 824.288308][T11252] ? sock_show_fdinfo+0xa0/0xa0 [ 824.292996][T11252] ? selinux_file_ioctl+0x3cc/0x540 [ 824.298030][T11252] sock_ioctl+0x455/0x740 [ 824.302195][T11252] ? sock_poll+0x400/0x400 [ 824.306448][T11252] ? __fget_files+0x31e/0x380 [ 824.310965][T11252] ? security_file_ioctl+0x84/0xb0 [ 824.315910][T11252] ? sock_poll+0x400/0x400 [ 824.320162][T11252] __se_sys_ioctl+0x114/0x190 [ 824.324675][T11252] __x64_sys_ioctl+0x7b/0x90 [ 824.329099][T11252] do_syscall_64+0x3d/0xb0 [ 824.333364][T11252] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 824.339168][T11252] RIP: 0033:0x7f8505cfbf19 [ 824.343431][T11252] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 824.363020][T11252] RSP: 002b:00007f850497d048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 824.371259][T11252] RAX: ffffffffffffffda RBX: 00007f8505e8bf60 RCX: 00007f8505cfbf19 [ 824.379076][T11252] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 0000000000000006 [ 824.386882][T11252] RBP: 00007f850497d0a0 R08: 0000000000000000 R09: 0000000000000000 [ 824.394697][T11252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 824.402506][T11252] R13: 000000000000000b R14: 00007f8505e8bf60 R15: 00007ffcf039b788 [ 824.410327][T11252] [ 825.862029][T11290] FAULT_INJECTION: forcing a failure. [ 825.862029][T11290] name failslab, interval 1, probability 0, space 0, times 0 [ 826.071134][T11290] CPU: 1 PID: 11290 Comm: syz.0.3426 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 826.080967][T11290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 826.090868][T11290] Call Trace: [ 826.093996][T11290] [ 826.096759][T11290] dump_stack_lvl+0x151/0x1b7 [ 826.101273][T11290] ? io_uring_drop_tctx_refs+0x190/0x190 [ 826.106851][T11290] ? __kasan_check_read+0x11/0x20 [ 826.111702][T11290] dump_stack+0x15/0x17 [ 826.115697][T11290] should_fail+0x3c6/0x510 [ 826.119956][T11290] __should_failslab+0xa4/0xe0 [ 826.124552][T11290] ? __alloc_skb+0xbe/0x550 [ 826.128981][T11290] should_failslab+0x9/0x20 [ 826.133323][T11290] slab_pre_alloc_hook+0x37/0xd0 [ 826.138092][T11290] ? __alloc_skb+0xbe/0x550 [ 826.142431][T11290] kmem_cache_alloc+0x44/0x200 [ 826.147029][T11290] __alloc_skb+0xbe/0x550 [ 826.151194][T11290] br_info_notify+0xb4/0x170 [ 826.155630][T11290] br_ifinfo_notify+0x28/0x30 [ 826.160142][T11290] br_device_event+0x6ad/0x7c0 [ 826.164734][T11290] ? br_boolopt_multi_get+0xf0/0xf0 [ 826.169764][T11290] ? packet_notifier+0x8ad/0x8c0 [ 826.174543][T11290] ? ipv6_mc_netdev_event+0xa4/0x480 [ 826.179659][T11290] raw_notifier_call_chain+0x8c/0xf0 [ 826.184780][T11290] dev_set_mac_address+0x325/0x470 [ 826.189728][T11290] ? dev_pre_changeaddr_notify+0x220/0x220 [ 826.195373][T11290] dev_set_mac_address_user+0x31/0x50 [ 826.200583][T11290] dev_ifsioc+0x7ef/0x10c0 [ 826.204855][T11290] ? dev_ioctl+0xe70/0xe70 [ 826.209079][T11290] ? mutex_lock+0x135/0x1e0 [ 826.213421][T11290] ? wait_for_completion_killable_timeout+0x10/0x10 [ 826.219934][T11290] dev_ioctl+0x54d/0xe70 [ 826.224011][T11290] sock_do_ioctl+0x34f/0x5a0 [ 826.228438][T11290] ? sock_show_fdinfo+0xa0/0xa0 [ 826.233124][T11290] ? selinux_file_ioctl+0x3cc/0x540 [ 826.238156][T11290] sock_ioctl+0x455/0x740 [ 826.242323][T11290] ? sock_poll+0x400/0x400 [ 826.246573][T11290] ? __fget_files+0x31e/0x380 [ 826.251091][T11290] ? security_file_ioctl+0x84/0xb0 [ 826.256040][T11290] ? sock_poll+0x400/0x400 [ 826.260287][T11290] __se_sys_ioctl+0x114/0x190 [ 826.264804][T11290] __x64_sys_ioctl+0x7b/0x90 [ 826.269227][T11290] do_syscall_64+0x3d/0xb0 [ 826.273481][T11290] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 826.279208][T11290] RIP: 0033:0x7f8505cfbf19 [ 826.283462][T11290] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 826.302909][T11290] RSP: 002b:00007f850497d048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 826.311173][T11290] RAX: ffffffffffffffda RBX: 00007f8505e8bf60 RCX: 00007f8505cfbf19 [ 826.318959][T11290] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 0000000000000006 [ 826.326773][T11290] RBP: 00007f850497d0a0 R08: 0000000000000000 R09: 0000000000000000 [ 826.335111][T11290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 826.342953][T11290] R13: 000000000000000b R14: 00007f8505e8bf60 R15: 00007ffcf039b788 [ 826.350744][T11290] [ 827.646474][T11345] FAULT_INJECTION: forcing a failure. [ 827.646474][T11345] name failslab, interval 1, probability 0, space 0, times 0 [ 827.772521][T11345] CPU: 1 PID: 11345 Comm: syz.3.3444 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 827.782342][T11345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 827.792241][T11345] Call Trace: [ 827.795359][T11345] [ 827.798135][T11345] dump_stack_lvl+0x151/0x1b7 [ 827.802651][T11345] ? io_uring_drop_tctx_refs+0x190/0x190 [ 827.808120][T11345] dump_stack+0x15/0x17 [ 827.812110][T11345] should_fail+0x3c6/0x510 [ 827.816448][T11345] __should_failslab+0xa4/0xe0 [ 827.821046][T11345] should_failslab+0x9/0x20 [ 827.825396][T11345] slab_pre_alloc_hook+0x37/0xd0 [ 827.830159][T11345] ? br_info_notify+0xb4/0x170 [ 827.834844][T11345] __kmalloc_track_caller+0x6c/0x260 [ 827.839964][T11345] ? br_info_notify+0xb4/0x170 [ 827.844567][T11345] ? br_info_notify+0xb4/0x170 [ 827.849165][T11345] __alloc_skb+0x10c/0x550 [ 827.853419][T11345] br_info_notify+0xb4/0x170 [ 827.857848][T11345] br_ifinfo_notify+0x28/0x30 [ 827.862359][T11345] br_device_event+0x6ad/0x7c0 [ 827.866960][T11345] ? br_boolopt_multi_get+0xf0/0xf0 [ 827.872030][T11345] ? packet_notifier+0x8ad/0x8c0 [ 827.876763][T11345] ? ipv6_mc_netdev_event+0xa4/0x480 [ 827.881897][T11345] raw_notifier_call_chain+0x8c/0xf0 [ 827.887007][T11345] dev_set_mac_address+0x325/0x470 [ 827.891954][T11345] ? dev_pre_changeaddr_notify+0x220/0x220 [ 827.897604][T11345] dev_set_mac_address_user+0x31/0x50 [ 827.902803][T11345] dev_ifsioc+0x7ef/0x10c0 [ 827.907063][T11345] ? dev_ioctl+0xe70/0xe70 [ 827.911309][T11345] ? mutex_lock+0xb6/0x1e0 [ 827.915564][T11345] ? wait_for_completion_killable_timeout+0x10/0x10 [ 827.921985][T11345] dev_ioctl+0x54d/0xe70 [ 827.926066][T11345] sock_do_ioctl+0x34f/0x5a0 [ 827.930490][T11345] ? sock_show_fdinfo+0xa0/0xa0 [ 827.935180][T11345] ? selinux_file_ioctl+0x3cc/0x540 [ 827.940219][T11345] sock_ioctl+0x455/0x740 [ 827.944554][T11345] ? sock_poll+0x400/0x400 [ 827.948806][T11345] ? __fget_files+0x31e/0x380 [ 827.953321][T11345] ? security_file_ioctl+0x84/0xb0 [ 827.958265][T11345] ? sock_poll+0x400/0x400 [ 827.962515][T11345] __se_sys_ioctl+0x114/0x190 [ 827.967029][T11345] __x64_sys_ioctl+0x7b/0x90 [ 827.971459][T11345] do_syscall_64+0x3d/0xb0 [ 827.975708][T11345] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 827.981438][T11345] RIP: 0033:0x7f00d1131f19 [ 827.985692][T11345] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 828.005245][T11345] RSP: 002b:00007f00cfdb3048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 828.013487][T11345] RAX: ffffffffffffffda RBX: 00007f00d12c1f60 RCX: 00007f00d1131f19 [ 828.021384][T11345] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 0000000000000006 [ 828.029198][T11345] RBP: 00007f00cfdb30a0 R08: 0000000000000000 R09: 0000000000000000 [ 828.037010][T11345] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 828.044821][T11345] R13: 000000000000000b R14: 00007f00d12c1f60 R15: 00007ffe77c62798 [ 828.052638][T11345] [ 829.854545][T11401] FAULT_INJECTION: forcing a failure. [ 829.854545][T11401] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 829.941169][T11401] CPU: 1 PID: 11401 Comm: syz.0.3464 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 829.951003][T11401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 829.960888][T11401] Call Trace: [ 829.964128][T11401] [ 829.966933][T11401] dump_stack_lvl+0x151/0x1b7 [ 829.971614][T11401] ? io_uring_drop_tctx_refs+0x190/0x190 [ 829.977076][T11401] dump_stack+0x15/0x17 [ 829.981668][T11401] should_fail+0x3c6/0x510 [ 829.985925][T11401] should_fail_usercopy+0x1a/0x20 [ 829.990793][T11401] _copy_to_user+0x20/0x90 [ 829.995036][T11401] simple_read_from_buffer+0xc7/0x150 [ 830.000247][T11401] proc_fail_nth_read+0x1a3/0x210 [ 830.005112][T11401] ? proc_fault_inject_write+0x390/0x390 [ 830.010583][T11401] ? fsnotify_perm+0x470/0x5d0 [ 830.015347][T11401] ? security_file_permission+0x86/0xb0 [ 830.020721][T11401] ? proc_fault_inject_write+0x390/0x390 [ 830.026193][T11401] vfs_read+0x27d/0xd40 [ 830.030185][T11401] ? sock_show_fdinfo+0xa0/0xa0 [ 830.034869][T11401] ? kernel_read+0x1f0/0x1f0 [ 830.039292][T11401] ? __kasan_check_write+0x14/0x20 [ 830.044239][T11401] ? mutex_lock+0xb6/0x1e0 [ 830.048496][T11401] ? wait_for_completion_killable_timeout+0x10/0x10 [ 830.054922][T11401] ? __fdget_pos+0x2e7/0x3a0 [ 830.059341][T11401] ? ksys_read+0x77/0x2c0 [ 830.063507][T11401] ksys_read+0x199/0x2c0 [ 830.067598][T11401] ? vfs_write+0x1110/0x1110 [ 830.072015][T11401] ? __bpf_trace_sys_enter+0x62/0x70 [ 830.077224][T11401] __x64_sys_read+0x7b/0x90 [ 830.081559][T11401] do_syscall_64+0x3d/0xb0 [ 830.085810][T11401] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 830.091468][T11401] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 830.097270][T11401] RIP: 0033:0x7f8505cfa9fc [ 830.101522][T11401] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8c 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 1f 8d 02 00 48 [ 830.121056][T11401] RSP: 002b:00007f850497d040 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 830.129298][T11401] RAX: ffffffffffffffda RBX: 00007f8505e8bf60 RCX: 00007f8505cfa9fc [ 830.137104][T11401] RDX: 000000000000000f RSI: 00007f850497d0b0 RDI: 0000000000000007 [ 830.144926][T11401] RBP: 00007f850497d0a0 R08: 0000000000000000 R09: 0000000000000000 [ 830.152726][T11401] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 830.160541][T11401] R13: 000000000000000b R14: 00007f8505e8bf60 R15: 00007ffcf039b788 [ 830.168495][T11401] [ 830.962170][T11443] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 832.622739][T11506] syz.3.3495[11506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 832.623859][T11506] syz.3.3495[11506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 834.576521][T11557] device pim6reg1 entered promiscuous mode [ 835.641236][T11591] FAULT_INJECTION: forcing a failure. [ 835.641236][T11591] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 835.711040][T11591] CPU: 0 PID: 11591 Comm: syz.3.3526 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 835.720871][T11591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 835.730764][T11591] Call Trace: [ 835.733884][T11591] [ 835.736666][T11591] dump_stack_lvl+0x151/0x1b7 [ 835.741177][T11591] ? io_uring_drop_tctx_refs+0x190/0x190 [ 835.746649][T11591] dump_stack+0x15/0x17 [ 835.750640][T11591] should_fail+0x3c6/0x510 [ 835.754889][T11591] should_fail_usercopy+0x1a/0x20 [ 835.759753][T11591] _copy_from_user+0x20/0xd0 [ 835.764177][T11591] __sys_bpf+0x1e9/0x760 [ 835.768252][T11591] ? fput_many+0x160/0x1b0 [ 835.772597][T11591] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 835.777895][T11591] ? debug_smp_processor_id+0x17/0x20 [ 835.783097][T11591] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 835.788997][T11591] __x64_sys_bpf+0x7c/0x90 [ 835.793250][T11591] do_syscall_64+0x3d/0xb0 [ 835.797511][T11591] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 835.803318][T11591] RIP: 0033:0x7f00d1131f19 [ 835.807579][T11591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 835.827012][T11591] RSP: 002b:00007f00cfdb3048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 835.835256][T11591] RAX: ffffffffffffffda RBX: 00007f00d12c1f60 RCX: 00007f00d1131f19 [ 835.843066][T11591] RDX: 0000000000000048 RSI: 0000000020000580 RDI: 0000000000000000 [ 835.850879][T11591] RBP: 00007f00cfdb30a0 R08: 0000000000000000 R09: 0000000000000000 [ 835.858691][T11591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 835.866507][T11591] R13: 000000000000000b R14: 00007f00d12c1f60 R15: 00007ffe77c62798 [ 835.874322][T11591] [ 837.660676][T11643] FAULT_INJECTION: forcing a failure. [ 837.660676][T11643] name failslab, interval 1, probability 0, space 0, times 0 [ 837.741223][T11643] CPU: 1 PID: 11643 Comm: syz.4.3546 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 837.751044][T11643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 837.760939][T11643] Call Trace: [ 837.764060][T11643] [ 837.766840][T11643] dump_stack_lvl+0x151/0x1b7 [ 837.771360][T11643] ? io_uring_drop_tctx_refs+0x190/0x190 [ 837.776825][T11643] ? selinux_capable+0x2f1/0x430 [ 837.781599][T11643] dump_stack+0x15/0x17 [ 837.785584][T11643] should_fail+0x3c6/0x510 [ 837.789846][T11643] __should_failslab+0xa4/0xe0 [ 837.794441][T11643] should_failslab+0x9/0x20 [ 837.798778][T11643] slab_pre_alloc_hook+0x37/0xd0 [ 837.803558][T11643] kmem_cache_alloc_trace+0x48/0x210 [ 837.808676][T11643] ? dev_map_alloc+0x69/0x790 [ 837.813189][T11643] dev_map_alloc+0x69/0x790 [ 837.817527][T11643] map_create+0x411/0x2050 [ 837.821780][T11643] __sys_bpf+0x296/0x760 [ 837.825858][T11643] ? bpf_get_current_cgroup_id+0xa2/0xb0 [ 837.831326][T11643] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 837.836530][T11643] ? bpf_trace_run2+0xf1/0x210 [ 837.841143][T11643] ? __bpf_trace_sys_enter+0x62/0x70 [ 837.846255][T11643] __x64_sys_bpf+0x7c/0x90 [ 837.850511][T11643] do_syscall_64+0x3d/0xb0 [ 837.854762][T11643] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 837.860490][T11643] RIP: 0033:0x7f5854f0af19 [ 837.864743][T11643] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 837.884267][T11643] RSP: 002b:00007f5853b8c048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 837.892512][T11643] RAX: ffffffffffffffda RBX: 00007f585509af60 RCX: 00007f5854f0af19 [ 837.900325][T11643] RDX: 0000000000000048 RSI: 0000000020000580 RDI: 0000000000000000 [ 837.908134][T11643] RBP: 00007f5853b8c0a0 R08: 0000000000000000 R09: 0000000000000000 [ 837.915946][T11643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 837.923760][T11643] R13: 000000000000000b R14: 00007f585509af60 R15: 00007ffe406cd058 [ 837.931575][T11643] [ 838.989137][T11684] FAULT_INJECTION: forcing a failure. [ 838.989137][T11684] name failslab, interval 1, probability 0, space 0, times 0 [ 839.118448][T11684] CPU: 0 PID: 11684 Comm: syz.2.3563 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 839.128282][T11684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 839.138182][T11684] Call Trace: [ 839.141298][T11684] [ 839.144082][T11684] dump_stack_lvl+0x151/0x1b7 [ 839.148587][T11684] ? io_uring_drop_tctx_refs+0x190/0x190 [ 839.154075][T11684] ? __kasan_slab_alloc+0x63/0xe0 [ 839.158916][T11684] dump_stack+0x15/0x17 [ 839.162907][T11684] should_fail+0x3c6/0x510 [ 839.167160][T11684] __should_failslab+0xa4/0xe0 [ 839.171759][T11684] should_failslab+0x9/0x20 [ 839.176100][T11684] slab_pre_alloc_hook+0x37/0xd0 [ 839.180876][T11684] kmem_cache_alloc_trace+0x48/0x210 [ 839.185996][T11684] ? __get_vm_area_node+0x117/0x360 [ 839.191036][T11684] __get_vm_area_node+0x117/0x360 [ 839.195890][T11684] __vmalloc_node_range+0xe2/0x8d0 [ 839.200837][T11684] ? dev_map_alloc+0x2b3/0x790 [ 839.205458][T11684] bpf_map_area_alloc+0xd9/0xf0 [ 839.210125][T11684] ? dev_map_alloc+0x2b3/0x790 [ 839.214724][T11684] dev_map_alloc+0x2b3/0x790 [ 839.219151][T11684] map_create+0x411/0x2050 [ 839.223402][T11684] __sys_bpf+0x296/0x760 [ 839.227481][T11684] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 839.232686][T11684] ? bpf_trace_run2+0xf1/0x210 [ 839.237293][T11684] ? __bpf_trace_sys_enter+0x62/0x70 [ 839.242494][T11684] __x64_sys_bpf+0x7c/0x90 [ 839.246866][T11684] do_syscall_64+0x3d/0xb0 [ 839.251111][T11684] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 839.256840][T11684] RIP: 0033:0x7f6e9605bf19 [ 839.261094][T11684] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 839.280532][T11684] RSP: 002b:00007f6e94cdd048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 839.288779][T11684] RAX: ffffffffffffffda RBX: 00007f6e961ebf60 RCX: 00007f6e9605bf19 [ 839.296588][T11684] RDX: 0000000000000048 RSI: 0000000020000580 RDI: 0000000000000000 [ 839.304398][T11684] RBP: 00007f6e94cdd0a0 R08: 0000000000000000 R09: 0000000000000000 [ 839.312211][T11684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 839.320021][T11684] R13: 000000000000000b R14: 00007f6e961ebf60 R15: 00007fff63dc1678 [ 839.327845][T11684] [ 840.440661][T11737] FAULT_INJECTION: forcing a failure. [ 840.440661][T11737] name failslab, interval 1, probability 0, space 0, times 0 [ 840.626450][T11737] CPU: 0 PID: 11737 Comm: syz.4.3576 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 840.636278][T11737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 840.646168][T11737] Call Trace: [ 840.649290][T11737] [ 840.652067][T11737] dump_stack_lvl+0x151/0x1b7 [ 840.656589][T11737] ? io_uring_drop_tctx_refs+0x190/0x190 [ 840.662053][T11737] ? __kasan_slab_alloc+0x63/0xe0 [ 840.666913][T11737] dump_stack+0x15/0x17 [ 840.670902][T11737] should_fail+0x3c6/0x510 [ 840.675247][T11737] __should_failslab+0xa4/0xe0 [ 840.679846][T11737] ? alloc_vmap_area+0x19e/0x1a80 [ 840.684703][T11737] should_failslab+0x9/0x20 [ 840.689042][T11737] slab_pre_alloc_hook+0x37/0xd0 [ 840.693829][T11737] ? alloc_vmap_area+0x19e/0x1a80 [ 840.698673][T11737] kmem_cache_alloc+0x44/0x200 [ 840.703296][T11737] alloc_vmap_area+0x19e/0x1a80 [ 840.707971][T11737] ? vm_map_ram+0xa90/0xa90 [ 840.712299][T11737] ? __kasan_kmalloc+0x9/0x10 [ 840.716919][T11737] ? kmem_cache_alloc_trace+0x115/0x210 [ 840.722298][T11737] __get_vm_area_node+0x158/0x360 [ 840.727163][T11737] __vmalloc_node_range+0xe2/0x8d0 [ 840.732102][T11737] ? dev_map_alloc+0x2b3/0x790 [ 840.736712][T11737] bpf_map_area_alloc+0xd9/0xf0 [ 840.741393][T11737] ? dev_map_alloc+0x2b3/0x790 [ 840.745989][T11737] dev_map_alloc+0x2b3/0x790 [ 840.750420][T11737] map_create+0x411/0x2050 [ 840.754673][T11737] __sys_bpf+0x296/0x760 [ 840.758760][T11737] ? bpf_get_current_cgroup_id+0xa2/0xb0 [ 840.764215][T11737] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 840.769421][T11737] ? bpf_trace_run2+0xf1/0x210 [ 840.774030][T11737] ? __bpf_trace_sys_enter+0x62/0x70 [ 840.779145][T11737] __x64_sys_bpf+0x7c/0x90 [ 840.783398][T11737] do_syscall_64+0x3d/0xb0 [ 840.787651][T11737] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 840.793378][T11737] RIP: 0033:0x7f5854f0af19 [ 840.797717][T11737] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 840.817245][T11737] RSP: 002b:00007f5853b8c048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 840.825493][T11737] RAX: ffffffffffffffda RBX: 00007f585509af60 RCX: 00007f5854f0af19 [ 840.833331][T11737] RDX: 0000000000000048 RSI: 0000000020000580 RDI: 0000000000000000 [ 840.841112][T11737] RBP: 00007f5853b8c0a0 R08: 0000000000000000 R09: 0000000000000000 [ 840.848927][T11737] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 840.856736][T11737] R13: 000000000000000b R14: 00007f585509af60 R15: 00007ffe406cd058 [ 840.864554][T11737] [ 841.735560][T11769] device syzkaller0 entered promiscuous mode [ 841.958243][T11786] FAULT_INJECTION: forcing a failure. [ 841.958243][T11786] name failslab, interval 1, probability 0, space 0, times 0 [ 842.029829][T11786] CPU: 0 PID: 11786 Comm: syz.1.3591 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 842.039660][T11786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 842.049576][T11786] Call Trace: [ 842.052678][T11786] [ 842.055456][T11786] dump_stack_lvl+0x151/0x1b7 [ 842.059968][T11786] ? io_uring_drop_tctx_refs+0x190/0x190 [ 842.065448][T11786] dump_stack+0x15/0x17 [ 842.069431][T11786] should_fail+0x3c6/0x510 [ 842.073689][T11786] __should_failslab+0xa4/0xe0 [ 842.078287][T11786] ? alloc_vmap_area+0x644/0x1a80 [ 842.083145][T11786] should_failslab+0x9/0x20 [ 842.087574][T11786] slab_pre_alloc_hook+0x37/0xd0 [ 842.092360][T11786] ? alloc_vmap_area+0x644/0x1a80 [ 842.097206][T11786] kmem_cache_alloc+0x44/0x200 [ 842.101805][T11786] alloc_vmap_area+0x644/0x1a80 [ 842.106505][T11786] ? vm_map_ram+0xa90/0xa90 [ 842.110832][T11786] ? __kasan_kmalloc+0x9/0x10 [ 842.115343][T11786] ? kmem_cache_alloc_trace+0x115/0x210 [ 842.120814][T11786] __get_vm_area_node+0x158/0x360 [ 842.125676][T11786] __vmalloc_node_range+0xe2/0x8d0 [ 842.130623][T11786] ? dev_map_alloc+0x2b3/0x790 [ 842.135224][T11786] bpf_map_area_alloc+0xd9/0xf0 [ 842.139906][T11786] ? dev_map_alloc+0x2b3/0x790 [ 842.144506][T11786] dev_map_alloc+0x2b3/0x790 [ 842.148936][T11786] map_create+0x411/0x2050 [ 842.153190][T11786] __sys_bpf+0x296/0x760 [ 842.157265][T11786] ? bpf_get_current_cgroup_id+0xa2/0xb0 [ 842.162733][T11786] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 842.167939][T11786] ? bpf_trace_run2+0xf1/0x210 [ 842.172632][T11786] ? __bpf_trace_sys_enter+0x62/0x70 [ 842.177747][T11786] __x64_sys_bpf+0x7c/0x90 [ 842.182091][T11786] do_syscall_64+0x3d/0xb0 [ 842.186340][T11786] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 842.192076][T11786] RIP: 0033:0x7fd328f85f19 [ 842.196323][T11786] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 842.215893][T11786] RSP: 002b:00007fd327c07048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 842.224096][T11786] RAX: ffffffffffffffda RBX: 00007fd329115f60 RCX: 00007fd328f85f19 [ 842.231906][T11786] RDX: 0000000000000048 RSI: 0000000020000580 RDI: 0000000000000000 [ 842.239714][T11786] RBP: 00007fd327c070a0 R08: 0000000000000000 R09: 0000000000000000 [ 842.247525][T11786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 842.255335][T11786] R13: 000000000000000b R14: 00007fd329115f60 R15: 00007fff89a575a8 [ 842.263155][T11786] [ 855.037392][T12067] syz.2.3678[12067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 855.037471][T12067] syz.2.3678[12067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 855.192287][T12066] syz.2.3678[12066] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 855.215182][T12068] syz.2.3678[12068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 855.219008][T12066] syz.2.3678[12066] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 856.176610][T12112] FAULT_INJECTION: forcing a failure. [ 856.176610][T12112] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 856.351465][T12112] CPU: 1 PID: 12112 Comm: syz.2.3690 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 856.361302][T12112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 856.371188][T12112] Call Trace: [ 856.374310][T12112] [ 856.377092][T12112] dump_stack_lvl+0x151/0x1b7 [ 856.381602][T12112] ? io_uring_drop_tctx_refs+0x190/0x190 [ 856.387071][T12112] dump_stack+0x15/0x17 [ 856.391063][T12112] should_fail+0x3c6/0x510 [ 856.395314][T12112] should_fail_usercopy+0x1a/0x20 [ 856.400174][T12112] _copy_from_user+0x20/0xd0 [ 856.404600][T12112] __sys_bpf+0x1e9/0x760 [ 856.408679][T12112] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 856.414122][T12112] ? __bpf_trace_sys_enter+0x62/0x70 [ 856.419234][T12112] __x64_sys_bpf+0x7c/0x90 [ 856.423485][T12112] do_syscall_64+0x3d/0xb0 [ 856.427737][T12112] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 856.433464][T12112] RIP: 0033:0x7f6e9605bf19 [ 856.437716][T12112] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 856.457161][T12112] RSP: 002b:00007f6e94cbc048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 856.465404][T12112] RAX: ffffffffffffffda RBX: 00007f6e961ec038 RCX: 00007f6e9605bf19 [ 856.473215][T12112] RDX: 000000000000000c RSI: 0000000020000000 RDI: 0000000000000023 [ 856.481024][T12112] RBP: 00007f6e94cbc0a0 R08: 0000000000000000 R09: 0000000000000000 [ 856.488835][T12112] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 856.496650][T12112] R13: 000000000000006e R14: 00007f6e961ec038 R15: 00007fff63dc1678 [ 856.504465][T12112] [ 856.532719][T12116] device sit0 entered promiscuous mode [ 856.977813][T12127] device syzkaller0 entered promiscuous mode [ 858.294111][T12160] device sit0 entered promiscuous mode [ 858.402442][T12157] FAULT_INJECTION: forcing a failure. [ 858.402442][T12157] name failslab, interval 1, probability 0, space 0, times 0 [ 858.601045][T12157] CPU: 0 PID: 12157 Comm: syz.1.3705 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 858.610863][T12157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 858.620761][T12157] Call Trace: [ 858.623897][T12157] [ 858.626659][T12157] dump_stack_lvl+0x151/0x1b7 [ 858.631178][T12157] ? io_uring_drop_tctx_refs+0x190/0x190 [ 858.636645][T12157] ? irqentry_exit+0x30/0x40 [ 858.641065][T12157] dump_stack+0x15/0x17 [ 858.645057][T12157] should_fail+0x3c6/0x510 [ 858.649331][T12157] __should_failslab+0xa4/0xe0 [ 858.653921][T12157] should_failslab+0x9/0x20 [ 858.658336][T12157] slab_pre_alloc_hook+0x37/0xd0 [ 858.663116][T12157] __kmalloc+0x6d/0x270 [ 858.667126][T12157] ? bpf_prog_bind_map+0x4e5/0x970 [ 858.672056][T12157] bpf_prog_bind_map+0x4e5/0x970 [ 858.676823][T12157] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 858.682469][T12157] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 858.688455][T12157] ? link_detach+0x320/0x320 [ 858.692882][T12157] ? selinux_bpf+0xd2/0x100 [ 858.697221][T12157] ? security_bpf+0x82/0xb0 [ 858.701564][T12157] __sys_bpf+0x2ee/0x760 [ 858.705646][T12157] ? bpf_get_current_cgroup_id+0xa2/0xb0 [ 858.711116][T12157] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 858.716336][T12157] ? bpf_trace_run2+0xf1/0x210 [ 858.720919][T12157] ? __bpf_trace_sys_enter+0x62/0x70 [ 858.726139][T12157] __x64_sys_bpf+0x7c/0x90 [ 858.730377][T12157] do_syscall_64+0x3d/0xb0 [ 858.734640][T12157] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 858.740269][T12157] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 858.745997][T12157] RIP: 0033:0x7fd328f85f19 [ 858.750251][T12157] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 858.769699][T12157] RSP: 002b:00007fd327c07048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 858.777944][T12157] RAX: ffffffffffffffda RBX: 00007fd329115f60 RCX: 00007fd328f85f19 [ 858.785754][T12157] RDX: 000000000000000c RSI: 0000000020000000 RDI: 0000000000000023 [ 858.793565][T12157] RBP: 00007fd327c070a0 R08: 0000000000000000 R09: 0000000000000000 [ 858.801372][T12157] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 858.809183][T12157] R13: 000000000000000b R14: 00007fd329115f60 R15: 00007fff89a575a8 [ 858.817011][T12157] [ 858.865355][T12178] device sit0 left promiscuous mode [ 858.942694][T12178] device sit0 entered promiscuous mode [ 860.342540][T12212] device sit0 left promiscuous mode [ 860.544395][T12212] device sit0 entered promiscuous mode [ 861.225949][T12223] FAULT_INJECTION: forcing a failure. [ 861.225949][T12223] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 861.371651][T12223] CPU: 0 PID: 12223 Comm: syz.4.3725 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 861.381480][T12223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 861.391374][T12223] Call Trace: [ 861.394498][T12223] [ 861.397276][T12223] dump_stack_lvl+0x151/0x1b7 [ 861.401787][T12223] ? io_uring_drop_tctx_refs+0x190/0x190 [ 861.407266][T12223] ? kmem_cache_free+0x116/0x2e0 [ 861.412122][T12223] ? vsnprintf+0x1dc/0x1c70 [ 861.416504][T12223] dump_stack+0x15/0x17 [ 861.420453][T12223] should_fail+0x3c6/0x510 [ 861.424705][T12223] should_fail_usercopy+0x1a/0x20 [ 861.429560][T12223] _copy_from_user+0x20/0xd0 [ 861.433991][T12223] kstrtouint_from_user+0xca/0x2a0 [ 861.438937][T12223] ? kstrtol_from_user+0x310/0x310 [ 861.443883][T12223] ? snprintf+0xd6/0x120 [ 861.447966][T12223] ? check_stack_object+0x114/0x130 [ 861.452996][T12223] ? __kasan_check_read+0x11/0x20 [ 861.457859][T12223] ? _copy_to_user+0x78/0x90 [ 861.462286][T12223] proc_fail_nth_write+0xa6/0x290 [ 861.467147][T12223] ? selinux_file_permission+0x2c4/0x570 [ 861.472612][T12223] ? proc_fail_nth_read+0x210/0x210 [ 861.477645][T12223] ? fsnotify_perm+0x6a/0x5d0 [ 861.482161][T12223] ? security_file_permission+0x86/0xb0 [ 861.487539][T12223] ? proc_fail_nth_read+0x210/0x210 [ 861.492582][T12223] vfs_write+0x406/0x1110 [ 861.496743][T12223] ? file_end_write+0x1c0/0x1c0 [ 861.501426][T12223] ? __kasan_check_write+0x14/0x20 [ 861.506373][T12223] ? mutex_lock+0xb6/0x1e0 [ 861.510627][T12223] ? wait_for_completion_killable_timeout+0x10/0x10 [ 861.517052][T12223] ? __fdget_pos+0x2e7/0x3a0 [ 861.521480][T12223] ? ksys_write+0x77/0x2c0 [ 861.525731][T12223] ksys_write+0x199/0x2c0 [ 861.529900][T12223] ? __ia32_sys_read+0x90/0x90 [ 861.534492][T12223] ? __bpf_trace_sys_enter+0x62/0x70 [ 861.539621][T12223] __x64_sys_write+0x7b/0x90 [ 861.544042][T12223] do_syscall_64+0x3d/0xb0 [ 861.548295][T12223] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 861.554025][T12223] RIP: 0033:0x7f5854f09a9f [ 861.558278][T12223] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 29 8c 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 7c 8c 02 00 48 [ 861.577725][T12223] RSP: 002b:00007f5853b6b040 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 861.585974][T12223] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5854f09a9f [ 861.593778][T12223] RDX: 0000000000000001 RSI: 00007f5853b6b0b0 RDI: 000000000000000c [ 861.601706][T12223] RBP: 00007f5853b6b0a0 R08: 0000000000000000 R09: 0000000000000000 [ 861.609518][T12223] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 861.617329][T12223] R13: 000000000000006e R14: 00007f585509b038 R15: 00007ffe406cd058 [ 861.625143][T12223] [ 862.878950][T12274] device sit0 entered promiscuous mode [ 865.394936][T12342] bridge0: port 1(bridge_slave_0) entered blocking state [ 865.455801][T12342] bridge0: port 1(bridge_slave_0) entered disabled state [ 865.501018][T12342] device bridge_slave_0 entered promiscuous mode [ 865.549031][T12342] bridge0: port 2(bridge_slave_1) entered blocking state [ 865.563088][T12342] bridge0: port 2(bridge_slave_1) entered disabled state [ 865.588418][T12342] device bridge_slave_1 entered promiscuous mode [ 865.685747][T12344] bridge0: port 1(bridge_slave_0) entered blocking state [ 865.701703][T12344] bridge0: port 1(bridge_slave_0) entered disabled state [ 865.765705][T12344] device bridge_slave_0 entered promiscuous mode [ 865.836268][T12344] bridge0: port 2(bridge_slave_1) entered blocking state [ 865.922750][T12344] bridge0: port 2(bridge_slave_1) entered disabled state [ 865.968697][T12344] device bridge_slave_1 entered promiscuous mode [ 866.381026][ T1507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 866.388482][ T1507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 866.459052][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 866.489900][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 866.515059][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 866.521956][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 866.529871][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 866.543580][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 866.552154][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 866.559017][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 866.566725][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 866.574798][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 866.751807][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 866.759390][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 866.833892][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 866.861606][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 866.871338][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 866.884047][T12342] device veth0_vlan entered promiscuous mode [ 866.956881][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 866.975559][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 867.035817][T12342] device veth1_macvtap entered promiscuous mode [ 867.091216][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 867.100826][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 867.121276][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 867.135930][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 867.145028][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 867.152853][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 867.160457][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 867.168448][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 867.176942][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 867.185369][ T344] bridge0: port 1(bridge_slave_0) entered blocking state [ 867.192264][ T344] bridge0: port 1(bridge_slave_0) entered forwarding state [ 867.199844][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 867.208187][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 867.216769][ T344] bridge0: port 2(bridge_slave_1) entered blocking state [ 867.223655][ T344] bridge0: port 2(bridge_slave_1) entered forwarding state [ 867.231589][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 867.239698][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 867.280696][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 867.288566][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 867.296963][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 867.305910][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 867.314404][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 867.322969][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 867.331761][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 867.368630][T12388] bridge0: port 2(bridge_slave_1) entered disabled state [ 867.375671][T12388] bridge0: port 1(bridge_slave_0) entered disabled state [ 867.401883][ T7053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 867.420883][ T7053] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 867.464363][T12344] device veth0_vlan entered promiscuous mode [ 867.483688][ T7054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 867.495940][ T7054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 867.507419][ T7054] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 867.515381][ T7054] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 867.615284][ T7058] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 867.651556][ T7058] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 867.713378][T12344] device veth1_macvtap entered promiscuous mode [ 867.769754][ T7058] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 867.792286][ T7058] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 867.921253][ T7058] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 867.945087][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 867.993006][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 868.076904][ T8] device bridge_slave_1 left promiscuous mode [ 868.090171][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 868.168563][ T8] device bridge_slave_0 left promiscuous mode [ 868.204021][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 868.252199][ T8] device bridge_slave_1 left promiscuous mode [ 868.258355][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 868.318257][ T8] device bridge_slave_0 left promiscuous mode [ 868.329920][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 868.360895][ T8] device veth1_macvtap left promiscuous mode [ 868.366824][ T8] device veth0_vlan left promiscuous mode [ 868.452514][ T8] device veth1_macvtap left promiscuous mode [ 869.259133][T12429] device syzkaller0 entered promiscuous mode [ 869.273474][T12432] bond_slave_1: mtu less than device minimum [ 870.053035][T12441] bridge0: port 1(bridge_slave_0) entered blocking state [ 870.068595][T12441] bridge0: port 1(bridge_slave_0) entered disabled state [ 870.113218][T12441] device bridge_slave_0 entered promiscuous mode [ 870.191250][T12441] bridge0: port 2(bridge_slave_1) entered blocking state [ 870.262506][T12441] bridge0: port 2(bridge_slave_1) entered disabled state [ 870.310206][T12441] device bridge_slave_1 entered promiscuous mode [ 871.126576][ T7058] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 871.154564][ T7058] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 871.170151][ T7058] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 871.198734][ T7058] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 871.218848][ T7058] bridge0: port 1(bridge_slave_0) entered blocking state [ 871.225747][ T7058] bridge0: port 1(bridge_slave_0) entered forwarding state [ 871.287031][ T7053] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 871.298013][ T7053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 871.349099][ T7053] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 871.429915][ T7053] bridge0: port 2(bridge_slave_1) entered blocking state [ 871.436844][ T7053] bridge0: port 2(bridge_slave_1) entered forwarding state [ 871.531200][ T7053] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 871.572911][ T7056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 871.582251][ T7056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 871.590202][ T7056] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 871.604213][ T7056] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 871.612392][ T7056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 871.620729][T12441] device veth0_vlan entered promiscuous mode [ 871.770226][T12441] device veth1_macvtap entered promiscuous mode [ 871.825259][ T7056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 871.871549][ T7056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 871.935693][ T7056] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 872.005323][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 872.086440][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 872.172683][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 872.263362][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 872.380842][ T8] device bridge_slave_1 left promiscuous mode [ 872.428536][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 872.505192][ T8] device bridge_slave_0 left promiscuous mode [ 872.559407][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 872.605211][ T8] device veth1_macvtap left promiscuous mode [ 872.651639][ T8] device veth0_vlan left promiscuous mode [ 874.050875][T12552] bridge0: port 1(bridge_slave_0) entered blocking state [ 874.166681][T12552] bridge0: port 1(bridge_slave_0) entered disabled state [ 874.232140][T12552] device bridge_slave_0 entered promiscuous mode [ 874.269801][T12552] bridge0: port 2(bridge_slave_1) entered blocking state [ 874.393183][T12552] bridge0: port 2(bridge_slave_1) entered disabled state [ 874.411409][T12552] device bridge_slave_1 entered promiscuous mode [ 874.854265][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 874.882848][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 875.003413][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 875.041819][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 875.073126][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 875.079995][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 875.103000][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 875.111431][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 875.119480][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 875.126360][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 875.140099][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 875.202332][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 875.254133][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 875.314559][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 875.374338][T12552] device veth0_vlan entered promiscuous mode [ 875.407677][ T7058] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 875.426038][ T7058] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 875.522450][ T7055] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 875.550195][ T7055] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 875.583896][ T7055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 875.622342][ T7055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 875.655095][T12552] device veth1_macvtap entered promiscuous mode [ 875.676760][ T8] device bridge_slave_1 left promiscuous mode [ 875.721966][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 875.729569][ T8] device bridge_slave_0 left promiscuous mode [ 875.736147][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 875.746374][ T8] device veth1_macvtap left promiscuous mode [ 875.753531][ T8] device veth0_vlan left promiscuous mode [ 875.894685][ T7058] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 875.902326][ T7058] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 875.910591][ T7058] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 875.920506][ T7058] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 875.928826][ T7058] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 876.119362][T12633] device syzkaller0 entered promiscuous mode [ 876.134036][T12640] device pim6reg1 entered promiscuous mode [ 876.306020][T12634] bridge0: port 1(bridge_slave_0) entered blocking state [ 876.313040][T12634] bridge0: port 1(bridge_slave_0) entered disabled state [ 876.320621][T12634] device bridge_slave_0 entered promiscuous mode [ 876.343684][T12634] bridge0: port 2(bridge_slave_1) entered blocking state [ 876.355395][T12634] bridge0: port 2(bridge_slave_1) entered disabled state [ 876.363508][T12634] device bridge_slave_1 entered promiscuous mode [ 876.429449][T12634] bridge0: port 2(bridge_slave_1) entered blocking state [ 876.436348][T12634] bridge0: port 2(bridge_slave_1) entered forwarding state [ 876.443471][T12634] bridge0: port 1(bridge_slave_0) entered blocking state [ 876.450343][T12634] bridge0: port 1(bridge_slave_0) entered forwarding state [ 876.475694][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 876.482951][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 876.490189][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 876.497542][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 876.523482][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 876.531709][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 876.539481][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 876.546822][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 876.554087][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 876.562133][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 876.569027][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 876.576213][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 876.584340][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 876.591197][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 876.598410][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 876.606396][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 876.616976][T12634] device veth0_vlan entered promiscuous mode [ 876.628527][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 876.637985][T12634] device veth1_macvtap entered promiscuous mode [ 876.647863][ T7055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 876.658244][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 876.734990][T12659] device syzkaller0 entered promiscuous mode [ 877.382040][T12675] bridge0: port 1(bridge_slave_0) entered blocking state [ 877.388931][T12675] bridge0: port 1(bridge_slave_0) entered disabled state [ 877.512649][T12675] device bridge_slave_0 entered promiscuous mode [ 877.632106][T12675] bridge0: port 2(bridge_slave_1) entered blocking state [ 877.638993][T12675] bridge0: port 2(bridge_slave_1) entered disabled state [ 877.676105][T12675] device bridge_slave_1 entered promiscuous mode [ 878.022163][ T7055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 878.029542][ T7055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 878.093199][ T7056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 878.106597][ T7056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 878.115729][ T7056] bridge0: port 1(bridge_slave_0) entered blocking state [ 878.122613][ T7056] bridge0: port 1(bridge_slave_0) entered forwarding state [ 878.129898][ T7056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 878.138189][ T7056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 878.146360][ T7056] bridge0: port 2(bridge_slave_1) entered blocking state [ 878.153245][ T7056] bridge0: port 2(bridge_slave_1) entered forwarding state [ 878.191049][ T7055] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 878.200365][ T7055] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 878.242980][T12716] device syzkaller0 entered promiscuous mode [ 878.257021][ T7056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 878.297906][T12675] device veth0_vlan entered promiscuous mode [ 878.320069][ T7055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 878.331442][ T7055] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 878.345468][ T7055] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 878.354307][ T7055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 878.379933][T12675] device veth1_macvtap entered promiscuous mode [ 878.417973][ T7055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 878.427005][ T8] device bridge_slave_1 left promiscuous mode [ 878.433301][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 878.484614][ T8] device bridge_slave_0 left promiscuous mode [ 878.526099][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 878.568220][ T8] device bridge_slave_1 left promiscuous mode [ 878.576997][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 878.615196][ T8] device bridge_slave_0 left promiscuous mode [ 878.621232][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 878.760690][ T8] device veth1_macvtap left promiscuous mode [ 878.831107][ T8] device veth0_vlan left promiscuous mode [ 878.921534][ T8] device veth1_macvtap left promiscuous mode [ 878.927400][ T8] device veth0_vlan left promiscuous mode [ 879.672644][ T7054] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 879.680848][ T7054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 879.729721][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 879.741617][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 879.887899][T12756] device sit0 entered promiscuous mode [ 880.843040][T12781] bridge0: port 1(bridge_slave_0) entered blocking state [ 880.849998][T12781] bridge0: port 1(bridge_slave_0) entered disabled state [ 880.943986][T12781] device bridge_slave_0 entered promiscuous mode [ 981.040914][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 981.047359][ C0] rcu: 0-...!: (9999 ticks this GP) idle=2ad/1/0x4000000000000000 softirq=65057/65057 fqs=0 last_accelerate: e26e/09b6 dyntick_enabled: 1 [ 981.061318][ C0] (t=10002 jiffies g=80505 q=13) [ 981.066181][ C0] rcu: rcu_preempt kthread timer wakeup didn't happen for 10001 jiffies! g80505 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 [ 981.078331][ C0] rcu: Possible timer handling issue on cpu=1 timer-softirq=28475 [ 981.086055][ C0] rcu: rcu_preempt kthread starved for 10004 jiffies! g80505 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=1 [ 981.097254][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 981.107057][ C0] rcu: RCU grace-period kthread stack dump: [ 981.112784][ C0] task:rcu_preempt state:I stack:27976 pid: 14 ppid: 2 flags:0x00004000 [ 981.121815][ C0] Call Trace: [ 981.124936][ C0] [ 981.127719][ C0] __schedule+0xccc/0x1590 [ 981.131970][ C0] ? __sched_text_start+0x8/0x8 [ 981.136652][ C0] ? __kasan_check_write+0x14/0x20 [ 981.141604][ C0] ? __kasan_check_write+0x14/0x20 [ 981.146550][ C0] schedule+0x11f/0x1e0 [ 981.150542][ C0] schedule_timeout+0x18c/0x370 [ 981.155229][ C0] ? console_conditional_schedule+0x30/0x30 [ 981.160957][ C0] ? update_process_times+0x200/0x200 [ 981.166166][ C0] ? prepare_to_swait_event+0x308/0x320 [ 981.171545][ C0] rcu_gp_fqs_loop+0x2af/0xf80 [ 981.176146][ C0] ? debug_smp_processor_id+0x17/0x20 [ 981.181353][ C0] ? __note_gp_changes+0x4ab/0x920 [ 981.186308][ C0] ? rcu_gp_init+0xc30/0xc30 [ 981.190726][ C0] ? _raw_spin_unlock_irq+0x4e/0x70 [ 981.195762][ C0] ? rcu_gp_init+0x9cf/0xc30 [ 981.200191][ C0] rcu_gp_kthread+0xa4/0x350 [ 981.204615][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 981.209298][ C0] ? wake_nocb_gp+0x1e0/0x1e0 [ 981.213812][ C0] ? __kasan_check_read+0x11/0x20 [ 981.218673][ C0] ? __kthread_parkme+0xb2/0x200 [ 981.223447][ C0] kthread+0x421/0x510 [ 981.227349][ C0] ? wake_nocb_gp+0x1e0/0x1e0 [ 981.231872][ C0] ? kthread_blkcg+0xd0/0xd0 [ 981.236294][ C0] ret_from_fork+0x1f/0x30 [ 981.240548][ C0] [ 981.243408][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 981.249584][ C0] Sending NMI from CPU 0 to CPUs 1: [ 981.254618][ C1] NMI backtrace for cpu 1 [ 981.254629][ C1] CPU: 1 PID: 12797 Comm: syz.3.3897 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 981.254650][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 981.254661][ C1] RIP: 0010:update_stack_state+0x34c/0x460 [ 981.254686][ C1] Code: 8d 70 38 4c 89 f0 48 c1 e8 03 49 bf 00 00 00 00 00 fc ff df 42 80 3c 38 00 74 08 4c 89 f7 e8 fb 9d 7d 00 48 8b 45 c0 49 89 06 <48> 8b 4d 90 42 80 3c 39 00 48 8b 5d c8 4c 8b 75 b8 74 0c 48 89 df [ 981.254702][ C1] RSP: 0018:ffffc900001d04b0 EFLAGS: 00000046 [ 981.254719][ C1] RAX: ffffc90000c37050 RBX: ffffc900001d06a8 RCX: ffffc90000c37060 [ 981.254734][ C1] RDX: 1ffff9200003a0d2 RSI: ffffc90000c37050 RDI: ffffc900001d06d8 [ 981.254747][ C1] RBP: ffffc900001d0568 R08: ffffffff810100dd R09: ffffc900001d0680 [ 981.254761][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff9200003a0d8 [ 981.254774][ C1] R13: 0000000000000000 R14: ffffc900001d06b8 R15: dffffc0000000000 [ 981.254787][ C1] FS: 00007f00cfdb36c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 981.254804][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 981.254817][ C1] CR2: 00000000200012c0 CR3: 00000001193cd000 CR4: 00000000003506a0 [ 981.254833][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 981.254844][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 981.254856][ C1] Call Trace: [ 981.254862][ C1] [ 981.254873][ C1] ? show_regs+0x58/0x60 [ 981.254893][ C1] ? nmi_cpu_backtrace+0x29f/0x300 [ 981.254916][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 981.254938][ C1] ? update_stack_state+0x34c/0x460 [ 981.254957][ C1] ? update_stack_state+0x34c/0x460 [ 981.254977][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 981.254996][ C1] ? nmi_handle+0xa8/0x280 [ 981.255015][ C1] ? update_stack_state+0x34c/0x460 [ 981.255034][ C1] ? default_do_nmi+0x69/0x160 [ 981.255054][ C1] ? exc_nmi+0xaf/0x120 [ 981.255072][ C1] ? end_repeat_nmi+0x16/0x31 [ 981.255091][ C1] ? perf_callchain_kernel+0x40d/0x640 [ 981.255113][ C1] ? update_stack_state+0x34c/0x460 [ 981.255133][ C1] ? update_stack_state+0x34c/0x460 [ 981.255152][ C1] ? update_stack_state+0x34c/0x460 [ 981.255171][ C1] [ 981.255177][ C1] [ 981.255188][ C1] unwind_next_frame+0x3cb/0x700 [ 981.255209][ C1] ? sock_map_delete_elem+0x99/0x130 [ 981.255230][ C1] perf_callchain_kernel+0x498/0x640 [ 981.255249][ C1] ? __this_cpu_preempt_check+0x13/0x20 [ 981.255272][ C1] ? arch_perf_update_userpage+0x450/0x450 [ 981.255293][ C1] ? sock_map_delete_elem+0x99/0x130 [ 981.255313][ C1] ? debug_smp_processor_id+0x17/0x20 [ 981.255334][ C1] ? get_callchain_entry+0x170/0x390 [ 981.255356][ C1] get_perf_callchain+0x579/0x810 [ 981.255377][ C1] ? put_callchain_entry+0xb0/0xb0 [ 981.255399][ C1] ? __perf_event_header__init_id+0x460/0x590 [ 981.255416][ C1] ? kvm_is_in_guest+0x28/0x40 [ 981.255436][ C1] perf_prepare_sample+0x359/0x1a80 [ 981.255455][ C1] ? perf_callchain+0x190/0x190 [ 981.255471][ C1] ? enqueue_task_fair+0xd61/0x29a0 [ 981.255495][ C1] perf_event_output_forward+0xdb/0x1b0 [ 981.255512][ C1] ? perf_get_page_size+0x4c0/0x4c0 [ 981.255532][ C1] ? __this_cpu_preempt_check+0x13/0x20 [ 981.255552][ C1] ? __perf_event_account_interrupt+0x18f/0x2c0 [ 981.255571][ C1] __perf_event_overflow+0x20b/0x390 [ 981.255589][ C1] perf_swevent_hrtimer+0x3fd/0x560 [ 981.255608][ C1] ? __raise_softirq_irqoff+0xe0/0xe0 [ 981.255630][ C1] ? __kasan_check_read+0x11/0x20 [ 981.255649][ C1] ? cpu_clock_event_read+0x50/0x50 [ 981.255677][ C1] ? timerqueue_add+0x250/0x270 [ 981.255696][ C1] ? timerqueue_del+0xb4/0x100 [ 981.255712][ C1] ? cpu_clock_event_read+0x50/0x50 [ 981.255732][ C1] __hrtimer_run_queues+0x41a/0xad0 [ 981.255753][ C1] ? hrtimer_interrupt+0xaa0/0xaa0 [ 981.255770][ C1] ? clockevents_program_event+0x22f/0x300 [ 981.255789][ C1] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 981.255810][ C1] hrtimer_interrupt+0x40c/0xaa0 [ 981.255834][ C1] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 981.255853][ C1] sysvec_apic_timer_interrupt+0x95/0xc0 [ 981.255878][ C1] [ 981.255883][ C1] [ 981.255889][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 981.255907][ C1] RIP: 0010:__pv_queued_spin_lock_slowpath+0x5ba/0xc40 [ 981.255930][ C1] Code: 00 00 49 89 dc c6 03 00 48 8b 44 24 10 0f b6 04 10 84 c0 0f 85 48 01 00 00 48 8b 44 24 08 c6 00 01 bb 00 80 ff ff eb 06 f3 90 c3 74 5e 41 0f b6 44 15 00 84 c0 75 36 41 80 3f 00 75 ea 4c 89 [ 981.255944][ C1] RSP: 0018:ffffc90000c36e80 EFLAGS: 00000206 [ 981.255959][ C1] RAX: 0000000000000000 RBX: 00000000ffffe1ee RCX: ffffffff815504ef [ 981.255972][ C1] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff888127fa1d28 [ 981.255984][ C1] RBP: ffffc90000c36f70 R08: dffffc0000000000 R09: ffffed1024ff43a6 [ 981.255999][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881f7138ad4 [ 981.256012][ C1] R13: 1ffff11024ff43a5 R14: 1ffff1103ee20001 R15: ffff888127fa1d28 [ 981.256028][ C1] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 981.256054][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 981.256077][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 981.256094][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 981.256111][ C1] ? make_kuid+0x700/0x700 [ 981.256127][ C1] ? 0xffffffffa001a964 [ 981.256140][ C1] sock_map_delete_elem+0x99/0x130 [ 981.256159][ C1] ? sock_map_unref+0x352/0x4d0 [ 981.256179][ C1] bpf_prog_8a405b5ced52e191+0x42/0x69c [ 981.256194][ C1] bpf_trace_run2+0xec/0x210 [ 981.256214][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 981.256232][ C1] ? sock_map_unref+0x352/0x4d0 [ 981.256251][ C1] ? kasan_check_range+0x82/0x2a0 [ 981.256269][ C1] ? sock_map_unref+0x352/0x4d0 [ 981.256288][ C1] __bpf_trace_kfree+0x6f/0x90 [ 981.256306][ C1] ? sock_map_unref+0x352/0x4d0 [ 981.256324][ C1] __traceiter_kfree+0x2a/0x40 [ 981.256340][ C1] ? sock_map_unref+0x352/0x4d0 [ 981.256358][ C1] kfree+0x1f3/0x220 [ 981.256378][ C1] sock_map_unref+0x352/0x4d0 [ 981.256400][ C1] sock_map_delete_elem+0xc1/0x130 [ 981.256419][ C1] ? ida_alloc_range+0x987/0xa80 [ 981.256437][ C1] bpf_prog_8a405b5ced52e191+0x42/0x69c [ 981.256451][ C1] bpf_trace_run2+0xec/0x210 [ 981.256484][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 981.256503][ C1] ? ida_alloc_range+0x987/0xa80 [ 981.256522][ C1] ? ida_alloc_range+0x987/0xa80 [ 981.256541][ C1] __bpf_trace_kfree+0x6f/0x90 [ 981.256557][ C1] ? ida_alloc_range+0x987/0xa80 [ 981.256575][ C1] __traceiter_kfree+0x2a/0x40 [ 981.256591][ C1] ? ida_alloc_range+0x987/0xa80 [ 981.256609][ C1] kfree+0x1f3/0x220 [ 981.256627][ C1] ? xas_nomem+0x19a/0x1d0 [ 981.256645][ C1] ida_alloc_range+0x987/0xa80 [ 981.256663][ C1] ? slab_post_alloc_hook+0x72/0x2c0 [ 981.256682][ C1] ? __proc_create+0x419/0xa00 [ 981.256702][ C1] ? idr_replace+0x230/0x230 [ 981.256719][ C1] ? __proc_create+0x65a/0xa00 [ 981.256736][ C1] ? proc_symlink+0x290/0x290 [ 981.256755][ C1] proc_register+0x3e/0x520 [ 981.256771][ C1] ? proc_create_reg+0xb5/0x120 [ 981.256788][ C1] proc_create_net_data+0x176/0x1e0 [ 981.256809][ C1] ? bpf_iter_fini_seq_net+0xb0/0xb0 [ 981.256827][ C1] ? memcpy+0x56/0x70 [ 981.256844][ C1] ? strlcat+0xf9/0x150 [ 981.256859][ C1] ? strlcpy+0x88/0xd0 [ 981.256881][ C1] xt_proto_init+0x18f/0x410 [ 981.256900][ C1] ? xt_unregister_template+0x220/0x220 [ 981.256922][ C1] ip_tables_net_init+0x1a/0x20 [ 981.256943][ C1] ops_init+0x1cf/0x4a0 [ 981.256959][ C1] ? setup_net+0x356/0xb50 [ 981.256976][ C1] setup_net+0x34b/0xb50 [ 981.256993][ C1] ? copy_net_ns+0x5b0/0x5b0 [ 981.257010][ C1] ? kmem_cache_alloc_trace+0x115/0x210 [ 981.257031][ C1] copy_net_ns+0x35c/0x5b0 [ 981.257049][ C1] create_new_namespaces+0x416/0x670 [ 981.257071][ C1] copy_namespaces+0x1d1/0x220 [ 981.257090][ C1] copy_process+0x1174/0x3290 [ 981.257115][ C1] ? timerqueue_add+0x250/0x270 [ 981.257133][ C1] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 981.257153][ C1] ? enqueue_hrtimer+0xca/0x240 [ 981.257169][ C1] ? __hrtimer_run_queues+0x46b/0xad0 [ 981.257189][ C1] kernel_clone+0x21e/0x9e0 [ 981.257208][ C1] ? irqentry_exit+0x30/0x40 [ 981.257226][ C1] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 981.257247][ C1] ? create_io_thread+0x1e0/0x1e0 [ 981.257270][ C1] __x64_sys_clone+0x23f/0x290 [ 981.257290][ C1] ? __do_sys_vfork+0x130/0x130 [ 981.257309][ C1] ? switch_fpu_return+0x1ed/0x3d0 [ 981.257331][ C1] ? __kasan_check_read+0x11/0x20 [ 981.257351][ C1] ? exit_to_user_mode_prepare+0x7e/0xa0 [ 981.257371][ C1] do_syscall_64+0x3d/0xb0 [ 981.257389][ C1] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 981.257409][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 981.257427][ C1] RIP: 0033:0x7f00d1131f19 [ 981.257443][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 981.257457][ C1] RSP: 002b:00007f00cfdb2ff8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 981.257475][ C1] RAX: ffffffffffffffda RBX: 00007f00d12c1f60 RCX: 00007f00d1131f19 [ 981.257488][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000e50c1600 [ 981.257500][ C1] RBP: 00007f00d11a0e68 R08: 0000000000000000 R09: 0000000000000000 [ 981.257511][ C1] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 981.257522][ C1] R13: 000000000000000b R14: 00007f00d12c1f60 R15: 00007ffe77c62798 [ 981.257539][ C1] [ 981.257636][ C0] NMI backtrace for cpu 0 [ 982.165356][ C0] CPU: 0 PID: 8 Comm: kworker/u4:0 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 982.174977][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 982.184885][ C0] Workqueue: netns cleanup_net [ 982.189472][ C0] Call Trace: [ 982.192603][ C0] [ 982.195290][ C0] dump_stack_lvl+0x151/0x1b7 [ 982.199801][ C0] ? io_uring_drop_tctx_refs+0x190/0x190 [ 982.205272][ C0] ? ttwu_do_wakeup+0x187/0x430 [ 982.209959][ C0] dump_stack+0x15/0x17 [ 982.213946][ C0] nmi_cpu_backtrace+0x2f7/0x300 [ 982.218726][ C0] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 982.224713][ C0] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 982.230002][ C0] ? __kasan_check_write+0x14/0x20 [ 982.234958][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 982.239640][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 982.245560][ C0] nmi_trigger_cpumask_backtrace+0x15d/0x270 [ 982.251443][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 982.257346][ C0] arch_trigger_cpumask_backtrace+0x10/0x20 [ 982.263072][ C0] rcu_dump_cpu_stacks+0x1d8/0x330 [ 982.268283][ C0] print_cpu_stall+0x315/0x5f0 [ 982.272881][ C0] rcu_sched_clock_irq+0x989/0x12f0 [ 982.278004][ C0] ? rcu_boost_kthread_setaffinity+0x340/0x340 [ 982.283991][ C0] ? hrtimer_run_queues+0x15f/0x440 [ 982.289110][ C0] update_process_times+0x198/0x200 [ 982.294148][ C0] tick_sched_timer+0x188/0x240 [ 982.298832][ C0] ? tick_setup_sched_timer+0x480/0x480 [ 982.304216][ C0] __hrtimer_run_queues+0x41a/0xad0 [ 982.309250][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 982.314194][ C0] ? clockevents_program_event+0x22f/0x300 [ 982.319837][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 982.325848][ C0] hrtimer_interrupt+0x40c/0xaa0 [ 982.330630][ C0] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 982.336347][ C0] sysvec_apic_timer_interrupt+0x95/0xc0 [ 982.341816][ C0] [ 982.344590][ C0] [ 982.347369][ C0] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 982.353183][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 982.357955][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 2b 02 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 982.377397][ C0] RSP: 0018:ffffc90000087460 EFLAGS: 00000246 [ 982.383299][ C0] RAX: 0000000000000001 RBX: 1ffff92000010e90 RCX: 1ffffffff0d1aa9c [ 982.391110][ C0] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7038ad4 [ 982.398921][ C0] RBP: ffffc90000087510 R08: dffffc0000000000 R09: ffffed103ee0715b [ 982.406733][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 982.414547][ C0] R13: ffff8881f7038ad4 R14: 0000000000000001 R15: 1ffff92000010e94 [ 982.422546][ C0] ? asm_common_interrupt+0x27/0x40 [ 982.427534][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 982.432485][ C0] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 982.438387][ C0] ? drop_sysctl_table+0xd5/0x450 [ 982.443246][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 982.449504][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 982.454269][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 982.459599][ C0] ? make_kuid+0x700/0x700 [ 982.463841][ C0] ? drop_sysctl_table+0x323/0x450 [ 982.468788][ C0] sock_map_delete_elem+0x99/0x130 [ 982.473734][ C0] ? inetdev_event+0x77c/0x10a0 [ 982.478420][ C0] bpf_prog_8a405b5ced52e191+0x42/0x69c [ 982.483803][ C0] bpf_trace_run2+0xec/0x210 [ 982.488236][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 982.492912][ C0] ? drop_sysctl_table+0x323/0x450 [ 982.497861][ C0] ? inetdev_event+0x77c/0x10a0 [ 982.502550][ C0] ? insert_header+0xe70/0xe70 [ 982.507148][ C0] ? inetdev_event+0x77c/0x10a0 [ 982.511834][ C0] __bpf_trace_kfree+0x6f/0x90 [ 982.516434][ C0] ? inetdev_event+0x77c/0x10a0 [ 982.521119][ C0] __traceiter_kfree+0x2a/0x40 [ 982.525726][ C0] ? inetdev_event+0x77c/0x10a0 [ 982.530413][ C0] kfree+0x1f3/0x220 [ 982.534140][ C0] ? unregister_sysctl_table+0x87/0x120 [ 982.539522][ C0] ? unregister_net_sysctl_table+0xd/0x20 [ 982.545086][ C0] inetdev_event+0x77c/0x10a0 [ 982.549722][ C0] ? ipv4_doint_and_flush+0x150/0x150 [ 982.554924][ C0] ? up_read+0x5d/0x220 [ 982.558917][ C0] raw_notifier_call_chain+0x8c/0xf0 [ 982.564124][ C0] unregister_netdevice_many+0xe0a/0x17c0 [ 982.569681][ C0] ? alloc_netdev_mqs+0xc90/0xc90 [ 982.574539][ C0] ? unregister_netdevice_queue+0x258/0x350 [ 982.580265][ C0] ? list_netdevice+0x4c0/0x4c0 [ 982.584953][ C0] ? unregister_netdevice_queue+0x258/0x350 [ 982.590684][ C0] ? list_netdevice+0x4c0/0x4c0 [ 982.595370][ C0] ip_tunnel_delete_nets+0x33b/0x380 [ 982.600492][ C0] ? ip_tunnel_bind_dev+0x880/0x880 [ 982.605523][ C0] ? xfrmi6_err+0x640/0x640 [ 982.609862][ C0] erspan_exit_batch_net+0x22/0x30 [ 982.614808][ C0] ? erspan_init_net+0x30/0x30 [ 982.619407][ C0] cleanup_net+0x6ce/0xc00 [ 982.623664][ C0] ? ops_init+0x4a0/0x4a0 [ 982.627826][ C0] ? read_word_at_a_time+0x12/0x20 [ 982.632774][ C0] ? strscpy+0x9c/0x260 [ 982.636768][ C0] process_one_work+0x6bb/0xc10 [ 982.641457][ C0] worker_thread+0xad5/0x12a0 [ 982.645975][ C0] kthread+0x421/0x510 [ 982.649869][ C0] ? worker_clr_flags+0x180/0x180 [ 982.654730][ C0] ? kthread_blkcg+0xd0/0xd0 [ 982.659161][ C0] ret_from_fork+0x1f/0x30 [ 982.663418][ C0] [ 1123.098138][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 245s! [kworker/u4:0:8] [ 1123.106144][ C0] Modules linked in: [ 1123.109877][ C0] CPU: 0 PID: 8 Comm: kworker/u4:0 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 1123.119506][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1123.129490][ C0] Workqueue: netns cleanup_net [ 1123.134088][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 1123.138986][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 2b 02 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 1123.158956][ C0] RSP: 0018:ffffc90000087460 EFLAGS: 00000246 [ 1123.164850][ C0] RAX: 0000000000000001 RBX: 1ffff92000010e90 RCX: 1ffffffff0d1aa9c [ 1123.172661][ C0] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7038ad4 [ 1123.180480][ C0] RBP: ffffc90000087510 R08: dffffc0000000000 R09: ffffed103ee0715b [ 1123.188282][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 1123.196094][ C0] R13: ffff8881f7038ad4 R14: 0000000000000001 R15: 1ffff92000010e94 [ 1123.204022][ C0] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 1123.212776][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1123.219205][ C0] CR2: 00007fbadb8b4a6c CR3: 000000012c13d000 CR4: 00000000003506b0 [ 1123.227017][ C0] DR0: 0000000020000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 1123.234820][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1123.242633][ C0] Call Trace: [ 1123.245765][ C0] [ 1123.248454][ C0] ? show_regs+0x58/0x60 [ 1123.252530][ C0] ? watchdog_timer_fn+0x4b1/0x5f0 [ 1123.257478][ C0] ? proc_watchdog_cpumask+0xd0/0xd0 [ 1123.262598][ C0] ? __hrtimer_run_queues+0x41a/0xad0 [ 1123.267809][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 1123.272755][ C0] ? clockevents_program_event+0x22f/0x300 [ 1123.278390][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 1123.284297][ C0] ? hrtimer_interrupt+0x40c/0xaa0 [ 1123.289249][ C0] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 1123.295230][ C0] ? sysvec_apic_timer_interrupt+0x95/0xc0 [ 1123.300871][ C0] [ 1123.303648][ C0] [ 1123.306426][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1123.312419][ C0] ? kvm_wait+0x147/0x180 [ 1123.316580][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1123.322568][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 1123.327518][ C0] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 1123.333421][ C0] ? drop_sysctl_table+0xd5/0x450 [ 1123.338278][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 1123.344532][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 1123.349300][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 1123.354340][ C0] ? make_kuid+0x700/0x700 [ 1123.358585][ C0] ? drop_sysctl_table+0x323/0x450 [ 1123.363538][ C0] sock_map_delete_elem+0x99/0x130 [ 1123.368483][ C0] ? inetdev_event+0x77c/0x10a0 [ 1123.373170][ C0] bpf_prog_8a405b5ced52e191+0x42/0x69c [ 1123.378550][ C0] bpf_trace_run2+0xec/0x210 [ 1123.382981][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 1123.387661][ C0] ? drop_sysctl_table+0x323/0x450 [ 1123.392608][ C0] ? inetdev_event+0x77c/0x10a0 [ 1123.397301][ C0] ? insert_header+0xe70/0xe70 [ 1123.401895][ C0] ? inetdev_event+0x77c/0x10a0 [ 1123.406715][ C0] __bpf_trace_kfree+0x6f/0x90 [ 1123.411316][ C0] ? inetdev_event+0x77c/0x10a0 [ 1123.415999][ C0] __traceiter_kfree+0x2a/0x40 [ 1123.420605][ C0] ? inetdev_event+0x77c/0x10a0 [ 1123.425291][ C0] kfree+0x1f3/0x220 [ 1123.429022][ C0] ? unregister_sysctl_table+0x87/0x120 [ 1123.434405][ C0] ? unregister_net_sysctl_table+0xd/0x20 [ 1123.439959][ C0] inetdev_event+0x77c/0x10a0 [ 1123.444471][ C0] ? ipv4_doint_and_flush+0x150/0x150 [ 1123.449677][ C0] ? up_read+0x5d/0x220 [ 1123.453674][ C0] raw_notifier_call_chain+0x8c/0xf0 [ 1123.458881][ C0] unregister_netdevice_many+0xe0a/0x17c0 [ 1123.464442][ C0] ? alloc_netdev_mqs+0xc90/0xc90 [ 1123.469299][ C0] ? unregister_netdevice_queue+0x258/0x350 [ 1123.475021][ C0] ? list_netdevice+0x4c0/0x4c0 [ 1123.479706][ C0] ? unregister_netdevice_queue+0x258/0x350 [ 1123.485436][ C0] ? list_netdevice+0x4c0/0x4c0 [ 1123.490124][ C0] ip_tunnel_delete_nets+0x33b/0x380 [ 1123.495243][ C0] ? ip_tunnel_bind_dev+0x880/0x880 [ 1123.500277][ C0] ? xfrmi6_err+0x640/0x640 [ 1123.504621][ C0] erspan_exit_batch_net+0x22/0x30 [ 1123.509562][ C0] ? erspan_init_net+0x30/0x30 [ 1123.514163][ C0] cleanup_net+0x6ce/0xc00 [ 1123.518421][ C0] ? ops_init+0x4a0/0x4a0 [ 1123.522585][ C0] ? read_word_at_a_time+0x12/0x20 [ 1123.527530][ C0] ? strscpy+0x9c/0x260 [ 1123.531541][ C0] process_one_work+0x6bb/0xc10 [ 1123.536247][ C0] worker_thread+0xad5/0x12a0 [ 1123.540731][ C0] kthread+0x421/0x510 [ 1123.544642][ C0] ? worker_clr_flags+0x180/0x180 [ 1123.549490][ C0] ? kthread_blkcg+0xd0/0xd0 [ 1123.554006][ C0] ret_from_fork+0x1f/0x30 [ 1123.558259][ C0] [ 1123.561122][ C0] Sending NMI from CPU 0 to CPUs 1: [ 1123.566196][ C1] NMI backtrace for cpu 1 [ 1123.566207][ C1] CPU: 1 PID: 12797 Comm: syz.3.3897 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 1123.566226][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 1123.566237][ C1] RIP: 0010:native_apic_msr_write+0x39/0x50 [ 1123.566262][ C1] Code: 74 05 83 ff 30 75 12 5d c3 81 ff d0 00 00 00 74 f6 81 ff e0 00 00 00 74 ee c1 ef 04 81 c7 00 08 00 00 89 f9 89 f0 31 d2 0f 30 <66> 90 eb d9 89 f6 31 d2 e8 9a de 51 01 5d c3 0f 1f 84 00 00 00 00 [ 1123.566277][ C1] RSP: 0018:ffffc900001d0df8 EFLAGS: 00000046 [ 1123.566294][ C1] RAX: 0000000000000213 RBX: ffffffff8602f9c8 RCX: 0000000000000838 [ 1123.566307][ C1] RDX: 0000000000000000 RSI: 0000000000000213 RDI: 0000000000000838 [ 1123.566319][ C1] RBP: ffffc900001d0df8 R08: ffffffff8163ac8b R09: ffffffff8163ab7d [ 1123.566339][ C1] R10: 0000000000000002 R11: ffff88810f22a780 R12: 0000000000000020 [ 1123.566351][ C1] R13: dffffc0000000000 R14: 0000000000000213 R15: dffffc0000000000 [ 1123.566364][ C1] FS: 00007f00cfdb36c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 1123.566381][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1123.566393][ C1] CR2: 00000000200012c0 CR3: 00000001193cd000 CR4: 00000000003506a0 [ 1123.566409][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1123.566420][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1123.566432][ C1] Call Trace: [ 1123.566436][ C1] [ 1123.566442][ C1] ? show_regs+0x58/0x60 [ 1123.566462][ C1] ? nmi_cpu_backtrace+0x29f/0x300 [ 1123.566485][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 1123.566508][ C1] ? native_apic_msr_write+0x39/0x50 [ 1123.566527][ C1] ? native_apic_msr_write+0x39/0x50 [ 1123.566548][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 1123.566567][ C1] ? nmi_handle+0xa8/0x280 [ 1123.566585][ C1] ? native_apic_msr_write+0x39/0x50 [ 1123.566605][ C1] ? update_stack_state+0x34c/0x460 [ 1123.566625][ C1] ? default_do_nmi+0x69/0x160 [ 1123.566645][ C1] ? exc_nmi+0xaf/0x120 [ 1123.566663][ C1] ? end_repeat_nmi+0x16/0x31 [ 1123.566682][ C1] ? clockevents_program_event+0x7d/0x300 [ 1123.566702][ C1] ? clockevents_program_event+0x18b/0x300 [ 1123.566723][ C1] ? native_apic_msr_write+0x39/0x50 [ 1123.566743][ C1] ? native_apic_msr_write+0x39/0x50 [ 1123.566763][ C1] ? native_apic_msr_write+0x39/0x50 [ 1123.566784][ C1] [ 1123.566789][ C1] [ 1123.566795][ C1] lapic_next_event+0x5f/0x70 [ 1123.566812][ C1] clockevents_program_event+0x1c1/0x300 [ 1123.566832][ C1] tick_program_event+0x9f/0x120 [ 1123.566851][ C1] hrtimer_interrupt+0x625/0xaa0 [ 1123.566876][ C1] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 1123.566895][ C1] sysvec_apic_timer_interrupt+0x95/0xc0 [ 1123.566915][ C1] [ 1123.566920][ C1] [ 1123.566926][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1123.566944][ C1] RIP: 0010:__pv_queued_spin_lock_slowpath+0x5ba/0xc40 [ 1123.566968][ C1] Code: 00 00 49 89 dc c6 03 00 48 8b 44 24 10 0f b6 04 10 84 c0 0f 85 48 01 00 00 48 8b 44 24 08 c6 00 01 bb 00 80 ff ff eb 06 f3 90 c3 74 5e 41 0f b6 44 15 00 84 c0 75 36 41 80 3f 00 75 ea 4c 89 [ 1123.566983][ C1] RSP: 0018:ffffc90000c36e80 EFLAGS: 00000206 [ 1123.566997][ C1] RAX: 0000000000000000 RBX: 00000000ffff9651 RCX: ffffffff815504ef [ 1123.567009][ C1] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff888127fa1d28 [ 1123.567022][ C1] RBP: ffffc90000c36f70 R08: dffffc0000000000 R09: ffffed1024ff43a6 [ 1123.567036][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881f7138ad4 [ 1123.567049][ C1] R13: 1ffff11024ff43a5 R14: 1ffff1103ee20001 R15: ffff888127fa1d28 [ 1123.567065][ C1] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 1123.567091][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 1123.567113][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 1123.567129][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 1123.567145][ C1] ? make_kuid+0x700/0x700 [ 1123.567177][ C1] ? 0xffffffffa001a964 [ 1123.567191][ C1] sock_map_delete_elem+0x99/0x130 [ 1123.567211][ C1] ? sock_map_unref+0x352/0x4d0 [ 1123.567231][ C1] bpf_prog_8a405b5ced52e191+0x42/0x69c [ 1123.567245][ C1] bpf_trace_run2+0xec/0x210 [ 1123.567267][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 1123.567285][ C1] ? sock_map_unref+0x352/0x4d0 [ 1123.567304][ C1] ? kasan_check_range+0x82/0x2a0 [ 1123.567323][ C1] ? sock_map_unref+0x352/0x4d0 [ 1123.567347][ C1] __bpf_trace_kfree+0x6f/0x90 [ 1123.567365][ C1] ? sock_map_unref+0x352/0x4d0 [ 1123.567383][ C1] __traceiter_kfree+0x2a/0x40 [ 1123.567399][ C1] ? sock_map_unref+0x352/0x4d0 [ 1123.567418][ C1] kfree+0x1f3/0x220 [ 1123.567438][ C1] sock_map_unref+0x352/0x4d0 [ 1123.567459][ C1] sock_map_delete_elem+0xc1/0x130 [ 1123.567478][ C1] ? ida_alloc_range+0x987/0xa80 [ 1123.567497][ C1] bpf_prog_8a405b5ced52e191+0x42/0x69c [ 1123.567511][ C1] bpf_trace_run2+0xec/0x210 [ 1123.567530][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 1123.567548][ C1] ? ida_alloc_range+0x987/0xa80 [ 1123.567568][ C1] ? ida_alloc_range+0x987/0xa80 [ 1123.567586][ C1] __bpf_trace_kfree+0x6f/0x90 [ 1123.567610][ C1] ? ida_alloc_range+0x987/0xa80 [ 1123.567627][ C1] __traceiter_kfree+0x2a/0x40 [ 1123.567643][ C1] ? ida_alloc_range+0x987/0xa80 [ 1123.567660][ C1] kfree+0x1f3/0x220 [ 1123.567677][ C1] ? xas_nomem+0x19a/0x1d0 [ 1123.567695][ C1] ida_alloc_range+0x987/0xa80 [ 1123.567712][ C1] ? slab_post_alloc_hook+0x72/0x2c0 [ 1123.567730][ C1] ? __proc_create+0x419/0xa00 [ 1123.567750][ C1] ? idr_replace+0x230/0x230 [ 1123.567766][ C1] ? __proc_create+0x65a/0xa00 [ 1123.567783][ C1] ? proc_symlink+0x290/0x290 [ 1123.567801][ C1] proc_register+0x3e/0x520 [ 1123.567816][ C1] ? proc_create_reg+0xb5/0x120 [ 1123.567833][ C1] proc_create_net_data+0x176/0x1e0 [ 1123.567852][ C1] ? bpf_iter_fini_seq_net+0xb0/0xb0 [ 1123.567870][ C1] ? memcpy+0x56/0x70 [ 1123.567887][ C1] ? strlcat+0xf9/0x150 [ 1123.567901][ C1] ? strlcpy+0x88/0xd0 [ 1123.567917][ C1] xt_proto_init+0x18f/0x410 [ 1123.567937][ C1] ? xt_unregister_template+0x220/0x220 [ 1123.567959][ C1] ip_tables_net_init+0x1a/0x20 [ 1123.567979][ C1] ops_init+0x1cf/0x4a0 [ 1123.567996][ C1] ? setup_net+0x356/0xb50 [ 1123.568013][ C1] setup_net+0x34b/0xb50 [ 1123.568030][ C1] ? copy_net_ns+0x5b0/0x5b0 [ 1123.568046][ C1] ? kmem_cache_alloc_trace+0x115/0x210 [ 1123.568068][ C1] copy_net_ns+0x35c/0x5b0 [ 1123.568086][ C1] create_new_namespaces+0x416/0x670 [ 1123.568108][ C1] copy_namespaces+0x1d1/0x220 [ 1123.568127][ C1] copy_process+0x1174/0x3290 [ 1123.568153][ C1] ? timerqueue_add+0x250/0x270 [ 1123.568171][ C1] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1123.568191][ C1] ? enqueue_hrtimer+0xca/0x240 [ 1123.568207][ C1] ? __hrtimer_run_queues+0x46b/0xad0 [ 1123.568226][ C1] kernel_clone+0x21e/0x9e0 [ 1123.568245][ C1] ? irqentry_exit+0x30/0x40 [ 1123.568263][ C1] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 1123.568284][ C1] ? create_io_thread+0x1e0/0x1e0 [ 1123.568307][ C1] __x64_sys_clone+0x23f/0x290 [ 1123.568332][ C1] ? __do_sys_vfork+0x130/0x130 [ 1123.568352][ C1] ? switch_fpu_return+0x1ed/0x3d0 [ 1123.568374][ C1] ? __kasan_check_read+0x11/0x20 [ 1123.568393][ C1] ? exit_to_user_mode_prepare+0x7e/0xa0 [ 1123.568414][ C1] do_syscall_64+0x3d/0xb0 [ 1123.568431][ C1] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 1123.568451][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1123.568469][ C1] RIP: 0033:0x7f00d1131f19 [ 1123.568485][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1123.568501][ C1] RSP: 002b:00007f00cfdb2ff8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1123.568519][ C1] RAX: ffffffffffffffda RBX: 00007f00d12c1f60 RCX: 00007f00d1131f19 [ 1123.568533][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000e50c1600 [ 1123.568545][ C1] RBP: 00007f00d11a0e68 R08: 0000000000000000 R09: 0000000000000000 [ 1123.568556][ C1] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 1123.568567][ C1] R13: 000000000000000b R14: 00007f00d12c1f60 R15: 00007ffe77c62798 [ 1123.568585][ C1]