last executing test programs: 14.029659237s ago: executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{}, 0x0, &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffd7a}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f2, &(0x7f0000000080)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x20}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000380)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8994, &(0x7f0000000080)) 12.266998686s ago: executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{}, 0x0, &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffd7a}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f2, &(0x7f0000000080)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x20}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000380)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8994, &(0x7f0000000080)) 10.356759988s ago: executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{}, 0x0, &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffd7a}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f2, &(0x7f0000000080)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x20}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000380)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8994, &(0x7f0000000080)) 8.519088349s ago: executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{}, 0x0, &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffd7a}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f2, &(0x7f0000000080)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x20}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000380)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8994, &(0x7f0000000080)) 7.821240126s ago: executing program 2: bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000), 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000950000000000000045"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0xc}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002300000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000100007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r5}, &(0x7f0000000000), &(0x7f0000000200)=r6}, 0x20) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000100), 0x1001) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r9}, 0x10) ioctl$SIOCSIFHWADDR(r8, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_int(r8, &(0x7f0000000040), 0x12) write$cgroup_pid(r7, &(0x7f0000000000), 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000080)) 7.689410235s ago: executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r0}, 0x10) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x18) r1 = openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) getpid() bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) getpid() bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x5, 0x2, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='ext4_fc_track_range\x00'}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x90) ioctl$SIOCSIFHWADDR(r3, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001d80)=@bpf_ext={0x1c, 0x5, &(0x7f0000000500)=ANY=[@ANYRESDEC], 0x0, 0x1, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000540)={0x0, 0x2, 0x0, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f00000000c0)=[{0x0, 0x1, 0x1000c, 0xb}, {0x5, 0x4, 0xc, 0x2}, {0x3, 0x5, 0xc, 0x28ed87f846c102a9}], 0x10, 0x6}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x4, 0x4, 0x4, 0x10000, 0x1d000000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) 7.546138348s ago: executing program 2: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xca}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4000000000000007910000000000000c30000005000000095007400000000004faee47d4854a1532bd17615591090c3e0d114ae65ae8c5114e9d7a3f25a0000d012a65b3189073b9f07d7a2aea46473a57753d2f1f8f2d8e16bcf0b76d97757ceb446b08469271b952f5e20e5c4273ff6e1eb5cf152ea1a928b3f973eec1dafb400f89b4a66563b016955204c822fba5485093ea9045b772c4f0d2eb536b6aa36793ebf70ccc9d5adf1752a18d40b4d3b515da64d3683366383f952129cb9e846f3"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x48}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r1}, 0x4) r2 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r2, r2}, &(0x7f0000000300), &(0x7f0000000340)='%-010d \x00'}, 0x1c) mkdir(&(0x7f0000000080)='./file0\x00', 0x188) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380)={0xffffffffffffffff, r2}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x10, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1234}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}]}, &(0x7f0000000940)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@o_path={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x0, 0x8, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x0, 0x5, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0x1, &(0x7f0000001b00)=ANY=[], 0x0, 0x7fff, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f0000000700)=[{0x5, 0x3, 0x5, 0x8}, {0x2, 0x1, 0x2, 0x5}], 0x10, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f00000002c0)='hrtimer_init\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000040)=""/155, 0x1000000, 0x9b, 0x1}, 0x20) 6.648152525s ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2, 0x17, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000008005900000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf0900000000000066090600000003e7040000000600000018010000756c6c2500000000002020207d9af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b70300000000000014000000060000005c93000000000000b5030200000000008500000000000000b70000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 5.742754693s ago: executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0xf9, 0x2fff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='block_bio_remap\x00', r2}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000051fa7824c74186dc02ec0696c37b64e3b24da3180100000005165c0f63cdc2e82818254950ee03568b8809a1ff4c7c4750eabfafcb9531b31e6a86827d1010c5a909ab98e00e19644a88e95ba26d1c9eecddb2d11c541418ceeb29b9b6829c6e433822bdb3cc85244aab60c1aae1314d7381fcfeb970bea672cf1e926f6a51479343144648a07a975bd89dc398712376610f6254f12495b4658319684387f6f3543205d4bc4ce05b8b961103673dff7f158052e62b20f05fd24108d8363d44fcd0f8f3647899762a17282a1914452d11f557c28f396eebdc858558db0276d14f9035f2b5f703e5be7e4acf8b78c2834ae5805fffee38a9a0033d520bcf6b08ede50899d4b9bdf85c71c5de2503dab358f42a2624c7daa9ed44039aab46419496362e54cfad05a0004ac71a003d7b85d07191bed4e5a890826300214146f7ed569985439baa355c2766dd056f5d79e454f3d873095e7a237bc06d035a8d601f21746d886419f38b34a495040000000071c2f0cce8c93cc17e9afa314fcb2ba15d646c66b0f65021829f87d988b4e2d71753b1549fa734f0b2e56dbd21ed2e09d0cddad721971637f384eed3034597c93e1c52f42cad0ed09c395dc6e9703660fefa1c80f467367c006f25caf0cbcefd13d68839893e39c588eb032905f91cafa4996dbf0c9be9654db05fb918086cc8228d02a3092c0830b8f587a5624515298b2d4eb2bde6f9a2eb83d53f717f13fa7552d92c51dbd32ea50c490ecd085d2811a7555c538cffffff7f00000000dd872244bfa64779e0f43a9c277e2910b7ccdc3d6726d34ad2101033a623ca2a49ad344884289130bc71cee2b7de62bf48129ae1af052a2d46a61625735a9eea7f793946b3229e861d8ea49806b3f7d4295f6b000000000000f337b1ceb2d8a65dcdcd895d7ba37098d2593fdaaef445af5bee02019c00000099b13ecda2a5b37de0519e974cba92ebaf0f701611a9b027ce04340bda4594cc9049c3f101629ab028145e004209ebe71a6fe84af50804000000000000004a27213354964e250a98fe357676f94b6947383e320fbb1118f586d5b9b1b977e1e1a4490ff67703a9b5900f8a6f8a805879dd91ec5ff435b219c53680c0ae04dcc4ef69b98fcb0d6b6a03a8b71a66b4e2876dc4b610444bf10000000000b046b6ae5d68156bcbd6d8793ade9a22ac8fc7857e5bbc14adc4e12b08f350c6789283b9990c72e64372a1f79769a8bdc632fc1a0b3417855d8b7d25ca4d404c23631ad3d2f55dcd385371c86170a4bca58c2b2b4eabc365f45bd10bb45b0c5bc354456a52be18d9b44014d20a3c51c8f013dade83562e73278662829e4f5a9ac00fd91178468c737f0872d97d38d11a176be5a0d7294c51eb161eddcfefa8837c7430721851ec2a107af0df6d43e732bbc01e76c66895eb85d36798d61622773591ee21ad9f6a1b73fa9cf3ffeb8a00b63af800a81d0fb8aa29df8b8ad6fbafefb5802a23cbdeeabceda5bfc5ff2fa5c1d61d04a1324794c6ed000696d9f04010c35474e690545c3d9bd836d4cef2585ba616e01c3d000000000000000000470ebc6f3453ecbf3047e4547d7632d3ad21798e730cb5d1da059b5bdb8107815dff995c0788906790406dfb4f8ee9f24ff94233e2e6e581e6e5de33a5f254c9a8b612547473c3001df3928dac9203b744619082421a8da7c00000000000000000000000000000018a73ef40cca690fb7595c6962984f8276677be6f66cbdbccf1896433808c9c84d74ac4a7c186a04a2250972f7acb156b21f9826b6acb7db32c4e3b3ec8b59fd972975edb1da872d81a35e4fda2f5cbde6b40bea20418c6e9dad30b791eea58f53e80fee4dd7fe08373ea2784fcd3a65261de71eb866458d2c22a"], &(0x7f0000000100)='GPL\x00'}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r3, r4, 0x2, 0x2}, 0x10) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r6, r7, 0x2, 0x2}, 0x10) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r5, r7, 0x2, 0x2, 0x0, @link_id}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='block_bio_remap\x00', r8}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x9) 5.703604289s ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='mm_page_alloc\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x1f000000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 5.670112284s ago: executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{}, 0x0, &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffd7a}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f2, &(0x7f0000000080)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x20}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000380)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8994, &(0x7f0000000080)) 1.789709917s ago: executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x16000000}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={0x0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000400000000dfffff1918120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='mm_page_alloc\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 1.786322988s ago: executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000002100b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000080009500f4ffffff0000"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000280), &(0x7f0000000380), 0xffffd6c0}, 0x38) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000440)=ANY=[], 0x32600) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x5452, &(0x7f0000000040)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x10, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000800000000000007000000181100", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000d3044000f0ffffff8000000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], 0x0, 0x20, 0xc2, &(0x7f0000000340)=""/194, 0x40f00, 0x1, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f00000004c0)={0x1, 0x81}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x10}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r3, r2, 0x1, r1]}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='ext4_alloc_da_blocks\x00', r0}, 0x5f) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00'}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305839, &(0x7f0000000040)) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r6}, 0x10) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000080)=""/57) 661.252799ms ago: executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x63) socketpair(0xa, 0x2, 0x0, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000500), 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x3, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x90) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r3}, 0x4) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x11, 0x0, &(0x7f0000000080)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f00000003c0)="e0b9547ed387dbe9abc89b6e0704", 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x1300}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059000000"], 0x0}, 0x90) 648.410872ms ago: executing program 1: socketpair(0xa, 0x1, 0x9, &(0x7f0000000000)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x15, &(0x7f0000000080)=@raw=[@jmp={0x5, 0x0, 0xa, 0x7, 0x6, 0x0, 0xfffffffffffffffb}, @ldst={0x0, 0x1, 0x1, 0x1, 0x1, 0xfffffffffffffff0, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000140)='GPL\x00', 0xff, 0x0, 0x0, 0x41000, 0x2c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x2, 0x7, 0x800}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000200)=[0xffffffffffffffff], &(0x7f0000000240)=[{0x3, 0x4, 0x2, 0xa}, {0x2, 0x5, 0x4, 0x2}, {0x5, 0x4, 0x0, 0x4}, {0x1, 0x1, 0x8, 0xb}], 0x10, 0xc9}, 0x90) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)=@generic={&(0x7f0000000340)='./file0\x00'}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000004c0)={@map=0xffffffffffffffff, 0x31, 0x1, 0x2e, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000500)={@cgroup=r0, r1, 0x1a, 0x14, r2, @link_id, r4}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r2, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x49, &(0x7f00000007c0)=[{}], 0x8, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0x9, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000a80)={0x4, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0xd, 0xb, &(0x7f0000000540)=@raw=[@call={0x85, 0x0, 0x0, 0xba}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x4}, @map_fd={0x18, 0x7, 0x1, 0x0, r3}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x47a5}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffb}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000005c0)='GPL\x00', 0x5f, 0x85, &(0x7f0000000600)=""/133, 0x40f00, 0x10, '\x00', r5, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000a00)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0x10, 0xfffffaa7, 0x9}, 0x10, r6, r1, 0x9, 0x0, &(0x7f0000000ac0)=[{0x0, 0x4, 0x6, 0x5}, {0x2, 0x3, 0xd, 0x4}, {0x3, 0x2, 0xf, 0xa}, {0x3, 0x5, 0x2, 0x3}, {0x3, 0x4, 0x7, 0xc}, {0x4, 0x4, 0xc, 0x4}, {0x2, 0x4, 0x4, 0xb}, {0x3, 0x1, 0x1, 0x5}, {0x1, 0x1, 0xa, 0x6}], 0x10, 0x2}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001180)={r2, 0xe0, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000ec0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000000f00)=[0x0, 0x0], &(0x7f0000000f40)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x57, &(0x7f0000000f80)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000fc0), &(0x7f0000001000), 0x8, 0x47, 0x8, 0x8, &(0x7f0000001040)}}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001240)={r3, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001300)={0x6, 0x24, &(0x7f0000000c40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@generic={0x2, 0x1, 0x3, 0x2, 0x3}, @ldst={0x0, 0x1, 0x0, 0x8, 0x7, 0xffffffffffffffe0, 0xfffffffffffffff0}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x800}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000d80)='GPL\x00', 0x6, 0xc3, &(0x7f0000000dc0)=""/195, 0x41100, 0xa, '\x00', r7, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000011c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000001200)={0x0, 0x2, 0x3, 0x5}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001280)=[r3, r8], &(0x7f00000012c0)=[{0x0, 0x3, 0xa, 0xb}, {0x5, 0x2, 0x8, 0x2}, {0x1, 0x3, 0x0, 0xb}, {0x3, 0x2, 0x3, 0x2}], 0x10, 0x7}, 0x90) r9 = perf_event_open$cgroup(&(0x7f0000001400)={0x0, 0x80, 0x4, 0x20, 0x10, 0x7, 0x0, 0x0, 0x6a220, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000013c0), 0x5}, 0xc414, 0x5, 0x2, 0x7, 0xa7, 0xffffffff, 0x8, 0x0, 0x81, 0x0, 0x6a}, r0, 0x9, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0xfffffffffffffffc, 0x1ff) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001480)={0x1}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001540)={r8, 0x58, &(0x7f00000014c0)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40082404, &(0x7f0000001580)=0x10000) ioctl$PERF_EVENT_IOC_RESET(r9, 0x2403, 0x200) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f00000015c0)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r10 = getpid() perf_event_open(&(0x7f0000001600)={0x0, 0x80, 0x0, 0x1, 0x5, 0xba, 0x0, 0x4, 0x40043, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8001, 0x4, @perf_config_ext={0x0, 0xfffffffffffffffa}, 0x8808, 0x0, 0x5, 0x7, 0x2dfe3bce, 0xe3e, 0x3ff, 0x0, 0x1f, 0x0, 0xafe}, r10, 0xffffffffffffffff, r9, 0x3) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001680)={'vxcan1\x00', 0x8000}) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000016c0)='./cgroup/syz1\x00', 0x200002, 0x0) r12 = openat$cgroup_ro(r11, &(0x7f0000001700)='devices.list\x00', 0x0, 0x0) r13 = openat$cgroup_freezer_state(r0, &(0x7f0000001740), 0x2, 0x0) write$cgroup_freezer_state(r13, &(0x7f0000001780)='FREEZING\x00', 0x9) openat$tun(0xffffffffffffff9c, &(0x7f00000017c0), 0x561527527952dd27, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000001800)={r12}, 0x8) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001840)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r14, 0x1, 0x32, &(0x7f0000001880)=r12, 0x4) 641.185523ms ago: executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='ext4_request_blocks\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34f677969c599f24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0361f6048b9fa9b3dc2366"], 0xd) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="e001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x8204) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x8, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {0x85, 0x0, 0x0, 0x6b}}, {{0x5, 0x0, 0x3}}, [], {{0x5, 0x1, 0x4, 0x8}, {0x6, 0x0, 0x5, 0x8}}}, &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000000000)=ANY=[], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x4, 0xff, 0x10001, 0xfffffffa}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x1, 0xb, &(0x7f00000004c0)=@framed={{}, [@printk={@lli, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x70}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f00000000c0)=r3, 0x4) 619.989065ms ago: executing program 4: perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x9f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xbeae}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b06, &(0x7f0000000080)={'wlan1\x00', @random="02000000000a"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x0, 0x3, 0x0, &(0x7f0000000480)='GPL\x00'}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0}, 0x38) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6d) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x14}, 0x48) 605.524808ms ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102033c00fe08000e40000200875a65969ff57b00ff0200000089ffffffffffffff0000"], 0xfdef) 590.02288ms ago: executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='jbd2_handle_stats\x00', r1}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f1, &(0x7f0000000900)={'ip6gre0\x00', @random="0600002000"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000009a12c02f000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) 565.396034ms ago: executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 561.320105ms ago: executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000002300000095"], 0x0}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x18, 0x5, &(0x7f0000000040)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x4, 0xb4, &(0x7f00000001c0)=""/180}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000002c0)='timer_start\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r3, &(0x7f0000000380)={0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x43400) 508.803393ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r4}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40086602, &(0x7f0000000080)) 478.715877ms ago: executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x16, 0x4, 0x6, 0x5, 0x30c1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x4, 0x6, 0xff, 0x42}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000080), 0x619, r7}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='ext4_mballoc_prealloc\x00', r3}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x9, 0x0, r8}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r9, &(0x7f0000000300), 0x20000000, 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r9, @ANYBLOB="9249e57245b73a87bc95d60bc0f581ed52add1504ddcc1164a8bf910aaf70502880be6b5d8d48dbd2c0b93af9d5a3b77dfc229a97c0f7e20b149555155337aed7e98b4b52f2ff71a5ac4494138703773a3bcfdc3ff1826ad0241864fbe6a0ecb5b37d91ef02861250f9bddd93177d75b59aaea7a0e05d4340067bf85c1", @ANYRES64=r0, @ANYRES64=r1, @ANYRES16=0x0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000380)='fsi_master_acf_cmd_same_addr\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{}, 0x0, 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x48) 101.224775ms ago: executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bf000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000000000000004b3df747c66ab082644a6ef2c569112c5ade88acfa676f52574562ed93a09b05ed8fcdc3f1544da94ab2202d74558668938800fa0cfe9cb6f754da75acb72bed8bac29f7b0de1759ff361dec2a230bd3b83b60a276b8a290b62be81813136ad608631b8e29340e5f2c60dcee0234fa01142a4507ae4a2bb97aa2f3a510a461ede63833ff1495a57a861cb9fc8453c8da141b5b927184c2d894927526ac8a841a2a0df5f0aa953e8408f39b0dd685fff1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00'}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000001380)=ANY=[@ANYRES8], &(0x7f0000003a00)=""/4096, 0x1000000, 0x1000, 0x1}, 0x500f20) 91.112077ms ago: executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000400000000000000050000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000d0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffefb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x2, 0x7, 0x5}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r2, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r3, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000011100007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r6}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_ext_remove_space\x00', r5}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_ext_remove_space\x00', r8}, 0x10) write$cgroup_int(r7, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r7, 0x4030582b, &(0x7f0000000000)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="8500000019000000350000000000000062000000000000009500bca300000000"], &(0x7f0000000140)='GPL\x00', 0xa5, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x2a}, 0x90) 78.776689ms ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)=@generic={&(0x7f0000000180)='./file0\x00'}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000080), &(0x7f0000000200)=r1}, 0x20) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x6, 0x6, 0x8001, 0x0, 0x1}, 0x48) 72.798229ms ago: executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{}, 0x0, &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffd7a}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f2, &(0x7f0000000080)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x20}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000380)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8994, &(0x7f0000000080)) 64.690581ms ago: executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r0, &(0x7f00000003c0)="4581cf2aa66736d2de78ff390f9012b1b0d49a1f7052586c458dd536be5b3d183733f0e79ba7c4a03f174d40247a3c26d061e3b4fe6324c0be1ae6b6e9bf78b7848cfd9abf5ce5d1e9460064bd47ff3187896eb883a368668704bff298e02ed2774b47055ac2dcf2faac42ae8b0e1639fff2db165194f2c72587b77785d43ff6a3e056ebc22ec9d94b4ebfe2df9a057b42c57389b171ae8f6d70319546c8bdba54", &(0x7f00000002c0)=""/60, 0x4}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3300000000000000, &(0x7f0000000080), 0x100}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}], {0x95, 0x0, 0x0, 0x1000000}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f0000000100)=""/147}, 0x90) 61.252821ms ago: executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90) r1 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0x6}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x2, 0x10}, 0xc) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, r1, 0x5, 0x0, 0x3}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/uts\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xf8, 0x152, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x100, 0x2}, 0x48) perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x7, 0xdb, 0x4, 0xf7, 0x0, 0xffffffff, 0x10420, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000180), 0x8}, 0x10468, 0x1000, 0x5, 0x4, 0x100, 0x7ff, 0x7, 0x0, 0x924, 0x0, 0x8}, r3, 0x2, r3, 0xa468a6492e8a111e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r4}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0xf, 0x4, 0x4, 0x80012, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x13000000, 0xb}, 0x48) 0s ago: executing program 0: ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x89f1, &(0x7f0000000900)={'ip6tnl0\x00', @random="0600002000"}) kernel console output (not intermixed with test programs): ous mode [ 224.306022][T11993] device pim6reg1 entered promiscuous mode [ 224.648825][T12034] device pim6reg1 entered promiscuous mode [ 224.977737][T12063] device syzkaller0 entered promiscuous mode [ 225.207385][T12075] device pim6reg1 entered promiscuous mode [ 225.952018][T12143] bond_slave_1: mtu less than device minimum [ 226.230765][T12178] syz-executor.0[12178] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.230843][T12178] syz-executor.0[12178] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.254611][T12176] device pim6reg1 entered promiscuous mode [ 227.040966][T12227] syz-executor.4[12227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.041045][T12227] syz-executor.4[12227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.107685][T12227] bridge0: port 3(veth1_macvtap) entered blocking state [ 227.136116][T12227] bridge0: port 3(veth1_macvtap) entered disabled state [ 227.303216][T12255] syz-executor.0[12255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.303302][T12255] syz-executor.0[12255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.531888][T12271] device syzkaller0 entered promiscuous mode [ 227.740441][T12286] device veth1_macvtap left promiscuous mode [ 228.233030][T12305] Â: renamed from pim6reg1 [ 228.629615][T12321] device veth1_macvtap left promiscuous mode [ 228.635623][T12321] device macsec0 left promiscuous mode [ 229.705129][T12384] device pim6reg1 entered promiscuous mode [ 230.827595][T12449] device syzkaller0 entered promiscuous mode [ 231.018078][T12465] device sit0 left promiscuous mode [ 231.143163][T12469] device veth0_to_bond entered promiscuous mode [ 231.179781][T12495] FAULT_INJECTION: forcing a failure. [ 231.179781][T12495] name failslab, interval 1, probability 0, space 0, times 0 [ 231.194174][ T28] audit: type=1400 audit(1719187010.698:153): avc: denied { create } for pid=12496 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 231.209371][T12495] CPU: 1 PID: 12495 Comm: syz-executor.3 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 231.223859][T12495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 231.233753][T12495] Call Trace: [ 231.236878][T12495] [ 231.239653][T12495] dump_stack_lvl+0x151/0x1b7 [ 231.244166][T12495] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 231.249467][T12495] dump_stack+0x15/0x1b [ 231.253453][T12495] should_fail_ex+0x3d0/0x520 [ 231.257966][T12495] ? kvmalloc_node+0x221/0x640 [ 231.262567][T12495] __should_failslab+0xaf/0xf0 [ 231.267167][T12495] should_failslab+0x9/0x20 [ 231.271508][T12495] __kmem_cache_alloc_node+0x3d/0x250 [ 231.276757][T12495] ? kvmalloc_node+0x221/0x640 [ 231.281400][T12495] __kmalloc_node+0xa3/0x1e0 [ 231.285919][T12495] kvmalloc_node+0x221/0x640 [ 231.290345][T12495] ? vm_mmap+0xb0/0xb0 [ 231.294253][T12495] alloc_netdev_mqs+0x7c3/0xf90 [ 231.298935][T12495] ? vti6_exit_batch_net+0x2a0/0x2a0 [ 231.304059][T12495] ipip6_tunnel_locate+0x4cc/0x760 [ 231.309092][T12495] ? prl_list_destroy_rcu+0x60/0x60 [ 231.314210][T12495] ? ns_capable+0x89/0xe0 [ 231.318376][T12495] ipip6_tunnel_ctl+0xca6/0x15c0 [ 231.323153][T12495] ip_tunnel_siocdevprivate+0x126/0x1c0 [ 231.328529][T12495] ? ip_tunnel_update+0xc40/0xc40 [ 231.333390][T12495] ? do_vfs_ioctl+0xba7/0x29a0 [ 231.337996][T12495] ? kstrtouint_from_user+0x124/0x180 [ 231.343198][T12495] ipip6_tunnel_siocdevprivate+0x206/0xe90 [ 231.348839][T12495] ? cgroup_rstat_updated+0xe5/0x370 [ 231.353960][T12495] ? __alloc_pages+0x3a1/0x780 [ 231.358741][T12495] ? sit_tunnel_xmit+0x2510/0x2510 [ 231.363687][T12495] ? full_name_hash+0x9d/0xf0 [ 231.368203][T12495] dev_ifsioc+0xd40/0x1150 [ 231.372461][T12495] ? ioctl_has_perm+0x3f0/0x560 [ 231.377146][T12495] ? dev_ioctl+0xe60/0xe60 [ 231.381394][T12495] ? __kasan_check_write+0x14/0x20 [ 231.386527][T12495] ? mutex_lock+0xb1/0x1e0 [ 231.390777][T12495] ? bit_wait_io_timeout+0x120/0x120 [ 231.395902][T12495] dev_ioctl+0x5e9/0xe60 [ 231.399984][T12495] sock_ioctl+0x665/0x740 [ 231.404158][T12495] ? sock_poll+0x400/0x400 [ 231.408400][T12495] ? security_file_ioctl+0x84/0xb0 [ 231.413342][T12495] ? sock_poll+0x400/0x400 [ 231.417611][T12495] __se_sys_ioctl+0x114/0x190 [ 231.422123][T12495] __x64_sys_ioctl+0x7b/0x90 [ 231.426535][T12495] do_syscall_64+0x3d/0xb0 [ 231.430788][T12495] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 231.436516][T12495] RIP: 0033:0x7f2d5047d0a9 [ 231.440781][T12495] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 231.460211][T12495] RSP: 002b:00007f2d4f7f70c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 231.468457][T12495] RAX: ffffffffffffffda RBX: 00007f2d505b3f80 RCX: 00007f2d5047d0a9 [ 231.476266][T12495] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 000000000000000a [ 231.484078][T12495] RBP: 00007f2d4f7f7120 R08: 0000000000000000 R09: 0000000000000000 [ 231.491889][T12495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 231.499787][T12495] R13: 000000000000000b R14: 00007f2d505b3f80 R15: 00007fffd524c628 [ 231.507612][T12495] [ 231.613558][T12511] device pim6reg1 entered promiscuous mode [ 232.090099][T12565] syz-executor.4[12565] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.090181][T12565] syz-executor.4[12565] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.222546][T12561] device syzkaller0 entered promiscuous mode [ 232.446248][T12587] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 218103808 (only 8 groups) [ 232.549278][T12595] syz-executor.4[12595] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.549359][T12595] syz-executor.4[12595] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.567830][T12595] syz-executor.4[12595] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.580646][T12595] syz-executor.4[12595] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.043731][T12640] device syzkaller0 entered promiscuous mode [ 237.191576][T12682] syz-executor.1[12682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.191661][T12682] syz-executor.1[12682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.204521][T12682] syz-executor.1[12682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.216721][T12682] syz-executor.1[12682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.294084][T12682] syz-executor.1[12682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.333377][T12682] syz-executor.1[12682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.956041][T12785] device pim6reg1 entered promiscuous mode [ 238.235706][ T28] audit: type=1400 audit(1719187017.738:154): avc: denied { create } for pid=12817 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 238.612946][T12842] device pim6reg1 entered promiscuous mode [ 238.706227][T12850] syz-executor.4[12850] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.706306][T12850] syz-executor.4[12850] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.752129][T12854] syz-executor.4[12854] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.819151][T12854] syz-executor.4[12854] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.843763][T12862] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 24831 (only 8 groups) [ 239.392365][T12908] Â: renamed from pim6reg1 [ 239.862492][T12931] device pim6reg1 entered promiscuous mode [ 240.636490][T12986] bridge0: port 4(veth1_macvtap) entered blocking state [ 240.669776][T12986] bridge0: port 4(veth1_macvtap) entered disabled state [ 242.922614][T13103] device syzkaller0 entered promiscuous mode [ 244.087835][T13157] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 244.980673][T13217] bridge0: port 3(team_slave_1) entered blocking state [ 244.989880][T13217] bridge0: port 3(team_slave_1) entered disabled state [ 245.018641][T13217] device team_slave_1 entered promiscuous mode [ 245.511675][T13236] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.523191][T13236] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.577637][T13290] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 246.791912][T13304] syz-executor.0[13304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 246.791990][T13304] syz-executor.0[13304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 246.868449][T13306] device sit0 entered promiscuous mode [ 248.605728][T13437] device pim6reg1 entered promiscuous mode [ 249.446298][T13495] device syzkaller0 entered promiscuous mode [ 249.812739][T13513] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 250.348959][T13527] device syzkaller0 entered promiscuous mode [ 250.410001][T13534] device syzkaller0 entered promiscuous mode [ 250.568977][T13529] device syzkaller0 entered promiscuous mode [ 250.767844][T13559] device syzkaller0 entered promiscuous mode [ 253.025103][T13585] device syzkaller0 entered promiscuous mode [ 254.088627][T13601] syz-executor.3[13601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.088712][T13601] syz-executor.3[13601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.538079][T13643] device syzkaller0 entered promiscuous mode [ 254.874867][T13682] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.882034][T13682] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.938098][T13693] syz-executor.0[13693] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.938175][T13693] syz-executor.0[13693] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.124637][T13718] FAULT_INJECTION: forcing a failure. [ 255.124637][T13718] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 255.178057][T13718] CPU: 0 PID: 13718 Comm: syz-executor.4 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 255.188054][T13718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 255.198033][T13718] Call Trace: [ 255.201153][T13718] [ 255.203950][T13718] dump_stack_lvl+0x151/0x1b7 [ 255.208445][T13718] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 255.213738][T13718] ? do_vfs_ioctl+0x1c0a/0x29a0 [ 255.218428][T13718] dump_stack+0x15/0x1b [ 255.222415][T13718] should_fail_ex+0x3d0/0x520 [ 255.226945][T13718] should_fail+0xb/0x10 [ 255.230933][T13718] should_fail_usercopy+0x1a/0x20 [ 255.235782][T13718] _copy_to_user+0x1e/0x90 [ 255.240035][T13718] simple_read_from_buffer+0xc7/0x150 [ 255.245243][T13718] proc_fail_nth_read+0x1a3/0x210 [ 255.250104][T13718] ? proc_fault_inject_write+0x390/0x390 [ 255.255571][T13718] ? fsnotify_perm+0x470/0x5d0 [ 255.260259][T13718] ? security_file_permission+0x86/0xb0 [ 255.265638][T13718] ? proc_fault_inject_write+0x390/0x390 [ 255.271108][T13718] vfs_read+0x26c/0xad0 [ 255.275107][T13718] ? kernel_read+0x1f0/0x1f0 [ 255.279527][T13718] ? mutex_lock+0xb1/0x1e0 [ 255.283779][T13718] ? bit_wait_io_timeout+0x120/0x120 [ 255.288908][T13718] ? __fdget_pos+0x2e2/0x390 [ 255.293326][T13718] ? ksys_read+0x77/0x2c0 [ 255.297496][T13718] ksys_read+0x199/0x2c0 [ 255.301575][T13718] ? vfs_write+0xeb0/0xeb0 [ 255.305828][T13718] ? fpregs_restore_userregs+0x130/0x290 [ 255.311297][T13718] __x64_sys_read+0x7b/0x90 [ 255.315632][T13718] do_syscall_64+0x3d/0xb0 [ 255.319889][T13718] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 255.325612][T13718] RIP: 0033:0x7f9d5667bd4c [ 255.329891][T13718] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 255.349306][T13718] RSP: 002b:00007f9d574080c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 255.357730][T13718] RAX: ffffffffffffffda RBX: 00007f9d567b3f80 RCX: 00007f9d5667bd4c [ 255.365541][T13718] RDX: 000000000000000f RSI: 00007f9d57408130 RDI: 0000000000000007 [ 255.373352][T13718] RBP: 00007f9d57408120 R08: 0000000000000000 R09: 0000000000000000 [ 255.381167][T13718] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 255.388972][T13718] R13: 000000000000000b R14: 00007f9d567b3f80 R15: 00007ffd147e7a58 [ 255.396789][T13718] [ 256.151212][T13769] FAULT_INJECTION: forcing a failure. [ 256.151212][T13769] name failslab, interval 1, probability 0, space 0, times 0 [ 256.181046][T13769] CPU: 1 PID: 13769 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 256.191043][T13769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 256.200941][T13769] Call Trace: [ 256.204058][T13769] [ 256.206837][T13769] dump_stack_lvl+0x151/0x1b7 [ 256.211354][T13769] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 256.216648][T13769] dump_stack+0x15/0x1b [ 256.220729][T13769] should_fail_ex+0x3d0/0x520 [ 256.225237][T13769] ? kvmalloc_node+0x221/0x640 [ 256.229836][T13769] __should_failslab+0xaf/0xf0 [ 256.234439][T13769] should_failslab+0x9/0x20 [ 256.238781][T13769] __kmem_cache_alloc_node+0x3d/0x250 [ 256.244069][T13769] ? kasan_save_alloc_info+0x1f/0x30 [ 256.249191][T13769] ? kvmalloc_node+0x221/0x640 [ 256.253791][T13769] __kmalloc_node+0xa3/0x1e0 [ 256.258221][T13769] kvmalloc_node+0x221/0x640 [ 256.262644][T13769] ? vm_mmap+0xb0/0xb0 [ 256.266549][T13769] ? memset+0x35/0x40 [ 256.270370][T13769] alloc_netdev_mqs+0xa31/0xf90 [ 256.275056][T13769] ipip6_tunnel_locate+0x4cc/0x760 [ 256.280002][T13769] ? prl_list_destroy_rcu+0x60/0x60 [ 256.285036][T13769] ? ns_capable+0x89/0xe0 [ 256.289202][T13769] ipip6_tunnel_ctl+0xca6/0x15c0 [ 256.293978][T13769] ip_tunnel_siocdevprivate+0x126/0x1c0 [ 256.299354][T13769] ? ip_tunnel_update+0xc40/0xc40 [ 256.304304][T13769] ? do_vfs_ioctl+0xba7/0x29a0 [ 256.308905][T13769] ? kstrtouint_from_user+0x124/0x180 [ 256.314111][T13769] ipip6_tunnel_siocdevprivate+0x206/0xe90 [ 256.319751][T13769] ? cgroup_rstat_updated+0xe5/0x370 [ 256.324879][T13769] ? __alloc_pages+0x3a1/0x780 [ 256.329470][T13769] ? sit_tunnel_xmit+0x2510/0x2510 [ 256.334417][T13769] ? full_name_hash+0x9d/0xf0 [ 256.338940][T13769] dev_ifsioc+0xd40/0x1150 [ 256.343185][T13769] ? ioctl_has_perm+0x3f0/0x560 [ 256.347960][T13769] ? dev_ioctl+0xe60/0xe60 [ 256.352212][T13769] ? __kasan_check_write+0x14/0x20 [ 256.357157][T13769] ? mutex_lock+0xb1/0x1e0 [ 256.361413][T13769] ? bit_wait_io_timeout+0x120/0x120 [ 256.366533][T13769] dev_ioctl+0x5e9/0xe60 [ 256.370621][T13769] sock_ioctl+0x665/0x740 [ 256.374779][T13769] ? sock_poll+0x400/0x400 [ 256.379032][T13769] ? security_file_ioctl+0x84/0xb0 [ 256.383975][T13769] ? sock_poll+0x400/0x400 [ 256.388231][T13769] __se_sys_ioctl+0x114/0x190 [ 256.392777][T13769] __x64_sys_ioctl+0x7b/0x90 [ 256.397171][T13769] do_syscall_64+0x3d/0xb0 [ 256.401421][T13769] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 256.407151][T13769] RIP: 0033:0x7f86b847d0a9 [ 256.411403][T13769] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 256.430844][T13769] RSP: 002b:00007f86b77f70c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 256.439088][T13769] RAX: ffffffffffffffda RBX: 00007f86b85b3f80 RCX: 00007f86b847d0a9 [ 256.446916][T13769] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 000000000000000a [ 256.454710][T13769] RBP: 00007f86b77f7120 R08: 0000000000000000 R09: 0000000000000000 [ 256.462522][T13769] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 256.470333][T13769] R13: 000000000000000b R14: 00007f86b85b3f80 R15: 00007ffdf60bbb48 [ 256.478150][T13769] [ 258.170211][T13872] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 258.327006][T13874] device syzkaller0 entered promiscuous mode [ 258.515549][T13892] device dummy0 entered promiscuous mode [ 258.587770][T13900] device pim6reg1 entered promiscuous mode [ 258.758680][T13913] device syzkaller0 entered promiscuous mode [ 260.275670][T14016] syz-executor.4[14016] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.275750][T14016] syz-executor.4[14016] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.504098][ T28] audit: type=1400 audit(1719187040.008:155): avc: denied { create } for pid=14031 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 260.629185][T14032] device syzkaller0 entered promiscuous mode [ 261.446532][T14054] Â: renamed from pim6reg1 [ 261.668642][T14056] device lo entered promiscuous mode [ 262.846929][T14132] syz-executor.0[14132] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.847003][T14132] syz-executor.0[14132] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.006649][T14148] bond_slave_1: mtu less than device minimum [ 263.199868][T14179] device pim6reg1 entered promiscuous mode [ 263.861362][T14215] Â: renamed from pim6reg1 [ 264.387943][T14245] device pim6reg1 entered promiscuous mode [ 264.401995][T14249] syz-executor.0[14249] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.402101][T14249] syz-executor.0[14249] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.653543][T14277] FAULT_INJECTION: forcing a failure. [ 264.653543][T14277] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 264.678053][T14277] CPU: 1 PID: 14277 Comm: syz-executor.2 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 264.688036][T14277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 264.698021][T14277] Call Trace: [ 264.701141][T14277] [ 264.703919][T14277] dump_stack_lvl+0x151/0x1b7 [ 264.708431][T14277] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 264.713724][T14277] ? _kstrtol+0x150/0x150 [ 264.717887][T14277] ? avc_has_perm_noaudit+0x348/0x430 [ 264.723100][T14277] dump_stack+0x15/0x1b [ 264.727087][T14277] should_fail_ex+0x3d0/0x520 [ 264.731602][T14277] should_fail+0xb/0x10 [ 264.735594][T14277] should_fail_usercopy+0x1a/0x20 [ 264.740452][T14277] strncpy_from_user+0x24/0x2b0 [ 264.745141][T14277] bpf_prog_load+0x1fb/0x1bf0 [ 264.749660][T14277] ? map_freeze+0x3a0/0x3a0 [ 264.754002][T14277] ? selinux_bpf+0xcb/0x100 [ 264.758360][T14277] ? security_bpf+0x82/0xb0 [ 264.762674][T14277] __sys_bpf+0x52c/0x7f0 [ 264.766764][T14277] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 264.771982][T14277] ? debug_smp_processor_id+0x17/0x20 [ 264.777167][T14277] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 264.783075][T14277] __x64_sys_bpf+0x7c/0x90 [ 264.787327][T14277] do_syscall_64+0x3d/0xb0 [ 264.791574][T14277] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 264.797334][T14277] RIP: 0033:0x7f194d07d0a9 [ 264.801559][T14277] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 264.821083][T14277] RSP: 002b:00007f194dd730c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 264.829329][T14277] RAX: ffffffffffffffda RBX: 00007f194d1b3f80 RCX: 00007f194d07d0a9 [ 264.837227][T14277] RDX: 000000000000003a RSI: 0000000020000140 RDI: 0000000000000005 [ 264.845048][T14277] RBP: 00007f194dd73120 R08: 0000000000000000 R09: 0000000000000000 [ 264.852882][T14277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 264.860663][T14277] R13: 000000000000000b R14: 00007f194d1b3f80 R15: 00007ffe771b0568 [ 264.868479][T14277] [ 266.592137][T14387] device syzkaller0 entered promiscuous mode [ 267.029378][T14411] syz-executor.4[14411] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.476405][T14439] device syzkaller0 entered promiscuous mode [ 267.582605][T14456] device pim6reg1 entered promiscuous mode [ 268.309331][T14532] bridge0: port 4(veth1_macvtap) entered blocking state [ 268.348707][T14532] bridge0: port 4(veth1_macvtap) entered disabled state [ 269.490243][T14620] device syzkaller0 entered promiscuous mode [ 269.612468][ T28] audit: type=1400 audit(1719187049.118:156): avc: denied { create } for pid=14615 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 272.183544][T14738] device syzkaller0 entered promiscuous mode [ 272.199677][T14752] device bridge_slave_1 left promiscuous mode [ 272.205662][T14752] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.213478][T14752] device bridge_slave_0 left promiscuous mode [ 272.223998][T14752] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.345021][T14747] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.353976][T14747] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.361743][T14747] device bridge_slave_0 entered promiscuous mode [ 272.374860][T14747] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.382331][T14747] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.390264][T14747] device bridge_slave_1 entered promiscuous mode [ 272.543868][T14747] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.550780][T14747] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.557852][T14747] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.564668][T14747] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.696782][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 272.707350][ T4649] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.714925][ T4649] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.736176][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 272.744502][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 272.753166][ T315] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.760144][ T315] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.768854][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 272.777116][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 272.785701][ T315] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.792589][ T315] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.799942][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 272.807902][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 272.815909][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 272.823886][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 272.847463][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 272.856077][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 272.869276][T14747] device veth0_vlan entered promiscuous mode [ 272.877185][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 272.885509][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 272.903894][T14747] device veth1_macvtap entered promiscuous mode [ 272.919465][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 272.926904][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 272.934292][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 272.942708][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 272.950832][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 272.958366][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 272.966608][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 272.986992][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 272.995237][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 273.007418][ T8] device team_slave_1 left promiscuous mode [ 273.013965][ T8] bridge0: port 3(team_slave_1) entered disabled state [ 273.021574][ T8] device bridge_slave_1 left promiscuous mode [ 273.027530][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.036085][ T8] device bridge_slave_0 left promiscuous mode [ 273.042339][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.266591][T14806] FAULT_INJECTION: forcing a failure. [ 273.266591][T14806] name failslab, interval 1, probability 0, space 0, times 0 [ 273.279062][T14806] CPU: 0 PID: 14806 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 273.288995][T14806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 273.291841][T14802] device pim6reg1 entered promiscuous mode [ 273.298888][T14806] Call Trace: [ 273.298898][T14806] [ 273.298907][T14806] dump_stack_lvl+0x151/0x1b7 [ 273.298938][T14806] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 273.298960][T14806] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 273.326148][T14806] ? __kasan_check_write+0x14/0x20 [ 273.331093][T14806] dump_stack+0x15/0x1b [ 273.335079][T14806] should_fail_ex+0x3d0/0x520 [ 273.339590][T14806] ? tipc_topsrv_queue_evt+0x162/0x350 [ 273.344885][T14806] __should_failslab+0xaf/0xf0 [ 273.349486][T14806] should_failslab+0x9/0x20 [ 273.353820][T14806] __kmem_cache_alloc_node+0x3d/0x250 [ 273.359039][T14806] ? tipc_topsrv_queue_evt+0x350/0x350 [ 273.364324][T14806] ? tipc_topsrv_queue_evt+0x162/0x350 [ 273.369621][T14806] kmalloc_trace+0x2a/0xa0 [ 273.373871][T14806] tipc_topsrv_queue_evt+0x162/0x350 [ 273.379000][T14806] tipc_sub_report_overlap+0x4ac/0x840 [ 273.384289][T14806] tipc_nametbl_remove_publ+0xd46/0x1b40 [ 273.389759][T14806] tipc_nametbl_withdraw+0x147/0x390 [ 273.394881][T14806] tipc_sk_leave+0x51e/0x700 [ 273.399304][T14806] ? __tipc_shutdown+0x1520/0x1520 [ 273.404249][T14806] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 273.410162][T14806] tipc_release+0x110/0x1310 [ 273.414582][T14806] ? rwsem_write_trylock+0x15b/0x290 [ 273.419699][T14806] ? tipc_sock_destruct+0x190/0x190 [ 273.424733][T14806] sock_close+0xdf/0x270 [ 273.428814][T14806] ? sock_mmap+0xa0/0xa0 [ 273.432889][T14806] __fput+0x3ab/0x870 [ 273.436714][T14806] ____fput+0x15/0x20 [ 273.440529][T14806] task_work_run+0x24d/0x2e0 [ 273.444952][T14806] ? __kasan_check_write+0x14/0x20 [ 273.449902][T14806] ? task_work_cancel+0x2b0/0x2b0 [ 273.454765][T14806] ? filp_close+0x105/0x150 [ 273.459106][T14806] exit_to_user_mode_loop+0x94/0xa0 [ 273.464136][T14806] exit_to_user_mode_prepare+0x5a/0xa0 [ 273.469545][T14806] syscall_exit_to_user_mode+0x26/0x140 [ 273.474922][T14806] do_syscall_64+0x49/0xb0 [ 273.479178][T14806] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 273.484903][T14806] RIP: 0033:0x7f8ecb47d0a9 [ 273.489161][T14806] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 273.508598][T14806] RSP: 002b:00007f8ecc10c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 273.516842][T14806] RAX: 0000000000000000 RBX: 00007f8ecb5b3f80 RCX: 00007f8ecb47d0a9 [ 273.524656][T14806] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 273.532469][T14806] RBP: 00007f8ecc10c120 R08: 0000000000000000 R09: 0000000000000000 [ 273.540277][T14806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 273.548090][T14806] R13: 000000000000000b R14: 00007f8ecb5b3f80 R15: 00007ffd858f9978 [ 273.555908][T14806] [ 273.595633][T14809] tap0: tun_chr_ioctl cmd 1074025673 [ 274.243450][T14846] syz-executor.3[14846] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.243521][T14846] syz-executor.3[14846] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.744120][T14869] syz-executor.0[14869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.823519][T14869] syz-executor.0[14869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.872131][T14874] device wg2 left promiscuous mode [ 275.083894][T14905] device syzkaller0 entered promiscuous mode [ 275.145743][T14918] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 4 (only 8 groups) [ 275.428192][T14943] device wg2 entered promiscuous mode [ 275.911988][T14976] device wg2 entered promiscuous mode [ 276.350282][T15002] device pim6reg1 entered promiscuous mode [ 276.949884][T15034] syz-executor.0[15034] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.949935][T15034] syz-executor.0[15034] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.190666][T15048] device wg2 entered promiscuous mode [ 278.214703][T15102] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 278.253705][T15107] syz-executor.0[15107] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.253796][T15107] syz-executor.0[15107] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.382640][T15265] syz-executor.2 (15265) used greatest stack depth: 19896 bytes left [ 282.230763][T15303] device syzkaller0 entered promiscuous mode [ 282.573012][T15315] FAULT_INJECTION: forcing a failure. [ 282.573012][T15315] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 282.656281][T15315] CPU: 1 PID: 15315 Comm: syz-executor.4 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 282.666277][T15315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 282.676259][T15315] Call Trace: [ 282.679378][T15315] [ 282.682158][T15315] dump_stack_lvl+0x151/0x1b7 [ 282.686674][T15315] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 282.692051][T15315] ? __alloc_pages+0x780/0x780 [ 282.696654][T15315] dump_stack+0x15/0x1b [ 282.700642][T15315] should_fail_ex+0x3d0/0x520 [ 282.705171][T15315] should_fail_alloc_page+0x68/0x90 [ 282.710452][T15315] __alloc_pages+0x1f4/0x780 [ 282.714978][T15315] ? __this_cpu_preempt_check+0x13/0x20 [ 282.720368][T15315] ? prep_new_page+0x110/0x110 [ 282.724958][T15315] ? folio_add_lru+0x280/0x3f0 [ 282.729559][T15315] __folio_alloc+0x15/0x40 [ 282.733810][T15315] wp_page_copy+0x23b/0x1690 [ 282.738239][T15315] ? __kasan_check_write+0x14/0x20 [ 282.743190][T15315] ? fault_dirty_shared_page+0x300/0x300 [ 282.748657][T15315] ? vm_normal_page+0x1de/0x1f0 [ 282.753336][T15315] do_wp_page+0xc25/0xdf0 [ 282.757516][T15315] ? mas_state_walk+0x732/0x980 [ 282.762190][T15315] handle_mm_fault+0x15a2/0x2f40 [ 282.766967][T15315] ? numa_migrate_prep+0xe0/0xe0 [ 282.771740][T15315] ? __queue_map_get+0x1db/0x3b0 [ 282.776522][T15315] ? lock_mm_and_find_vma+0x9c/0x310 [ 282.781628][T15315] exc_page_fault+0x24d/0x700 [ 282.786141][T15315] asm_exc_page_fault+0x27/0x30 [ 282.790828][T15315] RIP: 0010:copy_user_enhanced_fast_string+0xa/0x40 [ 282.797253][T15315] Code: ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 8d 0c ca 89 ca eb 20 0f 01 cb 83 fa 40 72 38 89 d1 a4 31 c0 0f 01 ca c3 89 ca eb 0a 66 2e 0f 1f 84 00 00 00 00 00 [ 282.816867][T15315] RSP: 0018:ffffc900009f7ce0 EFLAGS: 00050206 [ 282.822766][T15315] RAX: ffffffff82763801 RBX: 00007fffffff3e9f RCX: 00000000000048e1 [ 282.830682][T15315] RDX: 000000000000b161 RSI: ffff88811c8f6880 RDI: 0000000020008000 [ 282.838478][T15315] RBP: ffffc900009f7d08 R08: dffffc0000000000 R09: 0000000000000000 [ 282.846291][T15315] R10: 0000000000000005 R11: dffffc0000000001 R12: 000000000000b161 [ 282.854273][T15315] R13: 0000000000000000 R14: 0000000020001780 R15: ffff88811c8f0000 [ 282.862089][T15315] ? _copy_from_user+0x61/0xc0 [ 282.866699][T15315] ? _copy_to_user+0x74/0x90 [ 282.871117][T15315] map_lookup_elem+0x45a/0x5c0 [ 282.875716][T15315] __sys_bpf+0x4ba/0x7f0 [ 282.879789][T15315] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 282.885001][T15315] ? debug_smp_processor_id+0x17/0x20 [ 282.890208][T15315] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 282.896111][T15315] __x64_sys_bpf+0x7c/0x90 [ 282.900360][T15315] do_syscall_64+0x3d/0xb0 [ 282.904627][T15315] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 282.910341][T15315] RIP: 0033:0x7f9d5667d0a9 [ 282.914597][T15315] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 282.934037][T15315] RSP: 002b:00007f9d574080c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 282.942278][T15315] RAX: ffffffffffffffda RBX: 00007f9d567b3f80 RCX: 00007f9d5667d0a9 [ 282.950352][T15315] RDX: 0000000000000020 RSI: 0000000020000200 RDI: 0000000000000001 [ 282.958164][T15315] RBP: 00007f9d57408120 R08: 0000000000000000 R09: 0000000000000000 [ 282.965976][T15315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 282.973783][T15315] R13: 000000000000000b R14: 00007f9d567b3f80 R15: 00007ffd147e7a58 [ 282.981949][T15315] [ 283.002787][T15319] device pim6reg1 entered promiscuous mode [ 283.281761][T15334] device syzkaller0 entered promiscuous mode [ 287.118358][T15613] device pim6reg1 entered promiscuous mode [ 287.180205][T15613] syz-executor.0[15613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 287.180276][T15613] syz-executor.0[15613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 287.412028][T15631] device syzkaller0 entered promiscuous mode [ 287.867934][T15672] device wg2 left promiscuous mode [ 287.943656][T15672] device wg2 entered promiscuous mode [ 288.742223][T15745] Â: renamed from pim6reg1 [ 289.318431][T15779] syz-executor.1[15779] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.318925][T15779] syz-executor.1[15779] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.358963][T15779] syz-executor.1[15779] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.379094][T15779] syz-executor.1[15779] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.521658][T15793] device syzkaller0 entered promiscuous mode [ 289.868245][T15827] device lo entered promiscuous mode [ 289.968297][T15839] device veth0_vlan left promiscuous mode [ 289.983636][T15839] device veth0_vlan entered promiscuous mode [ 290.069650][T15848] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 291.267295][T15965] device pim6reg1 entered promiscuous mode [ 291.563032][T16009] FAULT_INJECTION: forcing a failure. [ 291.563032][T16009] name failslab, interval 1, probability 0, space 0, times 0 [ 291.644404][T16009] CPU: 1 PID: 16009 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 291.654409][T16009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 291.664305][T16009] Call Trace: [ 291.667425][T16009] [ 291.670202][T16009] dump_stack_lvl+0x151/0x1b7 [ 291.674717][T16009] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 291.680009][T16009] ? __kmalloc+0xb4/0x1e0 [ 291.684174][T16009] ? ext4_ext_map_blocks+0x255/0x71e0 [ 291.689392][T16009] ? ext4_map_blocks+0xa36/0x1ca0 [ 291.694244][T16009] ? ext4_writepages+0x17b5/0x3fd0 [ 291.699375][T16009] ? filemap_fdatawrite_wbc+0x153/0x1b0 [ 291.704759][T16009] ? filemap_write_and_wait_range+0x1a4/0x290 [ 291.709903][T16019] device pim6reg1 entered promiscuous mode [ 291.710749][T16009] ? ext4_punch_hole+0x11f/0xc00 [ 291.710790][T16009] ? ext4_fallocate+0x318/0x1e90 [ 291.710822][T16009] dump_stack+0x15/0x1b [ 291.710844][T16009] should_fail_ex+0x3d0/0x520 [ 291.710876][T16009] ? ext4_mb_new_blocks+0x5b2/0x48f0 [ 291.710908][T16009] __should_failslab+0xaf/0xf0 [ 291.744292][T16009] should_failslab+0x9/0x20 [ 291.748629][T16009] kmem_cache_alloc+0x3b/0x2c0 [ 291.753229][T16009] ext4_mb_new_blocks+0x5b2/0x48f0 [ 291.758183][T16009] ? __kasan_kmalloc+0x9c/0xb0 [ 291.762781][T16009] ? ext4_mb_pa_callback+0xd0/0xd0 [ 291.767723][T16009] ? ext4_ext_search_right+0x4f5/0x900 [ 291.773032][T16009] ? ext4_inode_to_goal_block+0x35c/0x4b0 [ 291.778662][T16009] ? ext4_ext_find_goal+0x117/0x200 [ 291.783697][T16009] ext4_ext_map_blocks+0x19ca/0x71e0 [ 291.788827][T16009] ? kasan_set_track+0x60/0x70 [ 291.793413][T16009] ? kasan_set_track+0x4b/0x70 [ 291.798012][T16009] ? kasan_save_alloc_info+0x1f/0x30 [ 291.803137][T16009] ? __kasan_slab_alloc+0x6c/0x80 [ 291.807993][T16009] ? slab_post_alloc_hook+0x53/0x2c0 [ 291.813118][T16009] ? kmem_cache_alloc+0x175/0x2c0 [ 291.817974][T16009] ? ext4_ext_release+0x10/0x10 [ 291.822669][T16009] ? filemap_write_and_wait_range+0x1a4/0x290 [ 291.828737][T16009] ? ext4_punch_hole+0x11f/0xc00 [ 291.833509][T16009] ? ext4_fallocate+0x318/0x1e90 [ 291.838282][T16009] ? vfs_fallocate+0x492/0x570 [ 291.842967][T16009] ? do_vfs_ioctl+0x2150/0x29a0 [ 291.847653][T16009] ? __se_sys_ioctl+0x99/0x190 [ 291.852253][T16009] ? __x64_sys_ioctl+0x7b/0x90 [ 291.856852][T16009] ? do_syscall_64+0x3d/0xb0 [ 291.861281][T16009] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 291.867191][T16009] ? _raw_read_unlock+0x25/0x40 [ 291.871876][T16009] ? ext4_es_lookup_extent+0x33b/0x950 [ 291.877164][T16009] ext4_map_blocks+0xa36/0x1ca0 [ 291.881865][T16009] ? slab_post_alloc_hook+0x72/0x2c0 [ 291.886972][T16009] ? ext4_issue_zeroout+0x250/0x250 [ 291.892270][T16009] ? ext4_inode_journal_mode+0x3ab/0x470 [ 291.897732][T16009] ext4_writepages+0x17b5/0x3fd0 [ 291.902519][T16009] ? stack_trace_snprint+0xf0/0xf0 [ 291.907454][T16009] ? ext4_read_folio+0x240/0x240 [ 291.912220][T16009] ? __stack_depot_save+0x36/0x480 [ 291.917172][T16009] ? 0xffffffffa000094c [ 291.921160][T16009] ? kernel_text_address+0xa9/0xe0 [ 291.926191][T16009] ? __kernel_text_address+0xd/0x40 [ 291.931224][T16009] ? ext4_read_folio+0x240/0x240 [ 291.935998][T16009] do_writepages+0x385/0x620 [ 291.940428][T16009] ? __writepage+0x130/0x130 [ 291.944856][T16009] ? __kasan_check_write+0x14/0x20 [ 291.949798][T16009] ? _raw_spin_lock+0xa4/0x1b0 [ 291.954399][T16009] ? _raw_spin_unlock+0x4c/0x70 [ 291.959088][T16009] ? sched_clock+0x9/0x10 [ 291.963253][T16009] ? sched_clock_cpu+0x71/0x2b0 [ 291.967940][T16009] filemap_fdatawrite_wbc+0x153/0x1b0 [ 291.973147][T16009] filemap_write_and_wait_range+0x1a4/0x290 [ 291.978874][T16009] ? read_word_at_a_time+0x12/0x20 [ 291.983823][T16009] ? filemap_range_has_writeback+0x620/0x620 [ 291.989642][T16009] ? __kasan_check_write+0x14/0x20 [ 291.994588][T16009] ? ext4_convert_inline_data+0x1cf/0x610 [ 292.000141][T16009] ? rwsem_write_trylock+0x15b/0x290 [ 292.005258][T16009] ? post_alloc_hook+0x213/0x220 [ 292.010036][T16009] ext4_punch_hole+0x11f/0xc00 [ 292.014642][T16009] ext4_fallocate+0x318/0x1e90 [ 292.019234][T16009] ? avc_policy_seqno+0x1b/0x70 [ 292.023919][T16009] ? selinux_file_permission+0x2bb/0x560 [ 292.029387][T16009] ? ext4_ext_truncate+0x320/0x320 [ 292.034334][T16009] ? fsnotify_perm+0x6a/0x5d0 [ 292.038853][T16009] vfs_fallocate+0x492/0x570 [ 292.043280][T16009] do_vfs_ioctl+0x2150/0x29a0 [ 292.047790][T16009] ? kstrtouint_from_user+0x124/0x180 [ 292.052994][T16009] ? __x64_compat_sys_ioctl+0x90/0x90 [ 292.058206][T16009] ? kstrtol_from_user+0x180/0x180 [ 292.063150][T16009] ? cgroup_rstat_updated+0xe5/0x370 [ 292.068274][T16009] ? __kasan_check_write+0x14/0x20 [ 292.073216][T16009] ? ioctl_has_perm+0x1f8/0x560 [ 292.077905][T16009] ? ioctl_has_perm+0x3f0/0x560 [ 292.082606][T16009] ? has_cap_mac_admin+0x3c0/0x3c0 [ 292.087540][T16009] ? vfs_write+0xbb3/0xeb0 [ 292.091803][T16009] ? selinux_file_ioctl+0x3cc/0x540 [ 292.096828][T16009] ? __mutex_lock_slowpath+0x10/0x10 [ 292.101947][T16009] ? selinux_file_alloc_security+0x120/0x120 [ 292.107768][T16009] ? __fget_files+0x2cb/0x330 [ 292.112276][T16009] ? security_file_ioctl+0x84/0xb0 [ 292.117221][T16009] __se_sys_ioctl+0x99/0x190 [ 292.121650][T16009] __x64_sys_ioctl+0x7b/0x90 [ 292.126077][T16009] do_syscall_64+0x3d/0xb0 [ 292.130348][T16009] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 292.136142][T16009] RIP: 0033:0x7f86b847d0a9 [ 292.140396][T16009] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 292.160103][T16009] RSP: 002b:00007f86b77f70c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 292.168348][T16009] RAX: ffffffffffffffda RBX: 00007f86b85b3f80 RCX: 00007f86b847d0a9 [ 292.176159][T16009] RDX: 0000000020000280 RSI: 000000004030582b RDI: 0000000000000008 [ 292.183970][T16009] RBP: 00007f86b77f7120 R08: 0000000000000000 R09: 0000000000000000 [ 292.191782][T16009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 292.199593][T16009] R13: 000000000000000b R14: 00007f86b85b3f80 R15: 00007ffdf60bbb48 [ 292.207415][T16009] [ 292.272213][T16027] device pim6reg1 entered promiscuous mode [ 292.458998][T16046] bridge0: port 4(veth1_macvtap) entered blocking state [ 292.465862][T16046] bridge0: port 4(veth1_macvtap) entered disabled state [ 292.633999][T16056] device pim6reg1 entered promiscuous mode [ 294.326024][T16176] FAULT_INJECTION: forcing a failure. [ 294.326024][T16176] name failslab, interval 1, probability 0, space 0, times 0 [ 294.340484][T16176] CPU: 0 PID: 16176 Comm: syz-executor.2 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 294.350474][T16176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 294.360363][T16176] Call Trace: [ 294.363487][T16176] [ 294.366267][T16176] dump_stack_lvl+0x151/0x1b7 [ 294.370782][T16176] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 294.376071][T16176] ? kvm_sched_clock_read+0x18/0x40 [ 294.381110][T16176] ? sched_clock+0x9/0x10 [ 294.385271][T16176] ? sched_clock_cpu+0x71/0x2b0 [ 294.389960][T16176] ? stack_depot_save+0x13/0x20 [ 294.394731][T16176] ? save_stack+0x11a/0x1e0 [ 294.399075][T16176] dump_stack+0x15/0x1b [ 294.403168][T16176] should_fail_ex+0x3d0/0x520 [ 294.407666][T16176] ? __get_vm_area_node+0x129/0x370 [ 294.412705][T16176] __should_failslab+0xaf/0xf0 [ 294.417302][T16176] should_failslab+0x9/0x20 [ 294.421643][T16176] __kmem_cache_alloc_node+0x3d/0x250 [ 294.426847][T16176] ? __get_vm_area_node+0x129/0x370 [ 294.431885][T16176] kmalloc_node_trace+0x26/0xb0 [ 294.436567][T16176] __get_vm_area_node+0x129/0x370 [ 294.441440][T16176] __vmalloc_node_range+0x36e/0x1540 [ 294.446553][T16176] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 294.451931][T16176] ? avc_denied+0x1b0/0x1b0 [ 294.456276][T16176] ? selinux_capable+0x2f1/0x430 [ 294.461044][T16176] ? vmap+0x2b0/0x2b0 [ 294.464862][T16176] ? selinux_capset+0xf0/0xf0 [ 294.469462][T16176] ? avc_has_perm_noaudit+0x348/0x430 [ 294.474757][T16176] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 294.480139][T16176] __vmalloc+0x7a/0x90 [ 294.484049][T16176] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 294.489425][T16176] bpf_prog_alloc_no_stats+0x3e/0x400 [ 294.494634][T16176] bpf_prog_alloc+0x22/0x1c0 [ 294.499059][T16176] bpf_prog_load+0x84a/0x1bf0 [ 294.503581][T16176] ? map_freeze+0x3a0/0x3a0 [ 294.507918][T16176] ? selinux_bpf+0xcb/0x100 [ 294.512253][T16176] ? security_bpf+0x82/0xb0 [ 294.516591][T16176] __sys_bpf+0x52c/0x7f0 [ 294.520930][T16176] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 294.526266][T16176] ? debug_smp_processor_id+0x17/0x20 [ 294.531468][T16176] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 294.537373][T16176] __x64_sys_bpf+0x7c/0x90 [ 294.541624][T16176] do_syscall_64+0x3d/0xb0 [ 294.545874][T16176] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 294.551601][T16176] RIP: 0033:0x7f194d07d0a9 [ 294.555853][T16176] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 294.575293][T16176] RSP: 002b:00007f194dd730c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 294.583539][T16176] RAX: ffffffffffffffda RBX: 00007f194d1b3f80 RCX: 00007f194d07d0a9 [ 294.591349][T16176] RDX: 000000000000003a RSI: 0000000020000140 RDI: 0000000000000005 [ 294.599246][T16176] RBP: 00007f194dd73120 R08: 0000000000000000 R09: 0000000000000000 [ 294.607059][T16176] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 294.614959][T16176] R13: 000000000000000b R14: 00007f194d1b3f80 R15: 00007ffe771b0568 [ 294.622776][T16176] [ 294.652892][T16176] syz-executor.2: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz2,mems_allowed=0 [ 294.670033][T16176] CPU: 0 PID: 16176 Comm: syz-executor.2 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 294.680015][T16176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 294.689903][T16176] Call Trace: [ 294.693027][T16176] [ 294.695808][T16176] dump_stack_lvl+0x151/0x1b7 [ 294.700318][T16176] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 294.705613][T16176] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 294.711301][T16176] dump_stack+0x15/0x1b [ 294.715256][T16176] warn_alloc+0x21a/0x3a0 [ 294.719415][T16176] ? should_failslab+0x9/0x20 [ 294.724016][T16176] ? zone_watermark_ok_safe+0x270/0x270 [ 294.729395][T16176] ? kmalloc_node_trace+0x3d/0xb0 [ 294.734257][T16176] ? __get_vm_area_node+0x361/0x370 [ 294.739301][T16176] __vmalloc_node_range+0x392/0x1540 [ 294.744414][T16176] ? avc_denied+0x1b0/0x1b0 [ 294.748754][T16176] ? selinux_capable+0x2f1/0x430 [ 294.753523][T16176] ? vmap+0x2b0/0x2b0 [ 294.757348][T16176] ? selinux_capset+0xf0/0xf0 [ 294.761856][T16176] ? avc_has_perm_noaudit+0x348/0x430 [ 294.767068][T16176] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 294.772445][T16176] __vmalloc+0x7a/0x90 [ 294.776358][T16176] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 294.781742][T16176] bpf_prog_alloc_no_stats+0x3e/0x400 [ 294.786944][T16176] bpf_prog_alloc+0x22/0x1c0 [ 294.791372][T16176] bpf_prog_load+0x84a/0x1bf0 [ 294.795883][T16176] ? map_freeze+0x3a0/0x3a0 [ 294.800226][T16176] ? selinux_bpf+0xcb/0x100 [ 294.804558][T16176] ? security_bpf+0x82/0xb0 [ 294.808897][T16176] __sys_bpf+0x52c/0x7f0 [ 294.812978][T16176] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 294.818192][T16176] ? debug_smp_processor_id+0x17/0x20 [ 294.823390][T16176] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 294.829298][T16176] __x64_sys_bpf+0x7c/0x90 [ 294.833554][T16176] do_syscall_64+0x3d/0xb0 [ 294.837805][T16176] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 294.843527][T16176] RIP: 0033:0x7f194d07d0a9 [ 294.847782][T16176] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 294.867226][T16176] RSP: 002b:00007f194dd730c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 294.875464][T16176] RAX: ffffffffffffffda RBX: 00007f194d1b3f80 RCX: 00007f194d07d0a9 [ 294.883362][T16176] RDX: 000000000000003a RSI: 0000000020000140 RDI: 0000000000000005 [ 294.891273][T16176] RBP: 00007f194dd73120 R08: 0000000000000000 R09: 0000000000000000 [ 294.899091][T16176] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 294.906897][T16176] R13: 000000000000000b R14: 00007f194d1b3f80 R15: 00007ffe771b0568 [ 294.914716][T16176] [ 294.917908][T16176] Mem-Info: [ 294.927209][T16176] active_anon:20427 inactive_anon:0 isolated_anon:0 [ 294.927209][T16176] active_file:3521 inactive_file:10375 isolated_file:0 [ 294.927209][T16176] unevictable:0 dirty:62 writeback:0 [ 294.927209][T16176] slab_reclaimable:9516 slab_unreclaimable:72421 [ 294.927209][T16176] mapped:19793 shmem:385 pagetables:466 [ 294.927209][T16176] sec_pagetables:0 bounce:0 [ 294.927209][T16176] kernel_misc_reclaimable:0 [ 294.927209][T16176] free:1540876 free_pcp:8207 free_cma:0 [ 294.973291][T16176] Node 0 active_anon:81708kB inactive_anon:0kB active_file:14084kB inactive_file:41500kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:73072kB dirty:248kB writeback:0kB shmem:1540kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4548kB pagetables:1864kB sec_pagetables:0kB all_unreclaimable? no [ 294.988846][T16192] device pim6reg1 entered promiscuous mode [ 295.005502][T16176] DMA32 free:2970580kB boost:0kB min:62596kB low:78244kB high:93892kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2976116kB mlocked:0kB bounce:0kB free_pcp:5536kB local_pcp:5480kB free_cma:0kB [ 295.043404][T16176] lowmem_reserve[]: 0 3932 3932 3932 [ 295.050561][T16176] Normal free:3191916kB boost:0kB min:84856kB low:106068kB high:127280kB reserved_highatomic:0KB active_anon:81708kB inactive_anon:0kB active_file:14084kB inactive_file:41500kB unevictable:0kB writepending:248kB present:5242880kB managed:4026920kB mlocked:0kB bounce:0kB free_pcp:27436kB local_pcp:16580kB free_cma:0kB [ 295.081630][T16176] lowmem_reserve[]: 0 0 0 0 [ 295.086244][T16176] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 722*4096kB (M) = 2970580kB [ 295.102966][T16176] Normal: 4485*4kB (UME) 2211*8kB (UM) 2812*16kB (UME) 1324*32kB (UME) 1785*64kB (UME) 1246*128kB (UME) 675*256kB (UME) 394*512kB (UME) 222*1024kB (UME) 3*2048kB (UE) 534*4096kB (UM) = 3191980kB [ 295.122511][T16176] 14112 total pagecache pages [ 295.127170][T16176] 0 pages in swap cache [ 295.141406][T16176] Free swap = 124996kB [ 295.151608][T16176] Total swap = 124996kB [ 295.153223][T16207] syz-executor.4[16207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.155588][T16176] 2097051 pages RAM [ 295.155648][T16207] syz-executor.4[16207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.193480][T16197] bridge0: port 3(syz_tun) entered blocking state [ 295.212335][T16207] syz-executor.4[16207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.214478][T16207] syz-executor.4[16207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.226304][T16197] bridge0: port 3(syz_tun) entered disabled state [ 295.238212][T16176] 0 pages HighMem/MovableOnly [ 295.238225][T16176] 346292 pages reserved [ 295.238232][T16176] 0 pages cma reserved [ 295.272224][T16207] syz-executor.4[16207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.361249][T16197] device syz_tun entered promiscuous mode [ 295.393937][T16197] bridge0: port 3(syz_tun) entered blocking state [ 295.400627][T16197] bridge0: port 3(syz_tun) entered forwarding state [ 295.680668][T16247] device syzkaller0 entered promiscuous mode [ 295.849794][T16252] FAULT_INJECTION: forcing a failure. [ 295.849794][T16252] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 295.953150][T16252] CPU: 0 PID: 16252 Comm: syz-executor.3 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 295.963352][T16252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 295.973242][T16252] Call Trace: [ 295.976421][T16252] [ 295.979146][T16252] dump_stack_lvl+0x151/0x1b7 [ 295.983657][T16252] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 295.988960][T16252] dump_stack+0x15/0x1b [ 295.993030][T16252] should_fail_ex+0x3d0/0x520 [ 295.997546][T16252] should_fail+0xb/0x10 [ 296.001533][T16252] should_fail_usercopy+0x1a/0x20 [ 296.006394][T16252] copyin+0x1e/0x90 [ 296.010052][T16252] _copy_from_iter+0x3c9/0xe00 [ 296.014731][T16252] ? copyout_mc+0x80/0x80 [ 296.018906][T16252] skb_copy_datagram_from_iter+0x100/0x6d0 [ 296.024535][T16252] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 296.030179][T16252] unix_stream_sendmsg+0x78f/0x1070 [ 296.035249][T16252] ? unix_stream_sendmsg+0x8b1/0x1070 [ 296.040429][T16252] ? unix_show_fdinfo+0x2f0/0x2f0 [ 296.045284][T16252] ? security_socket_sendmsg+0x82/0xb0 [ 296.050661][T16252] ? unix_show_fdinfo+0x2f0/0x2f0 [ 296.055523][T16252] ____sys_sendmsg+0x5d3/0x9a0 [ 296.060126][T16252] ? __sys_sendmsg_sock+0x40/0x40 [ 296.064985][T16252] __sys_sendmsg+0x2a9/0x390 [ 296.069408][T16252] ? ____sys_sendmsg+0x9a0/0x9a0 [ 296.074185][T16252] ? __kasan_check_write+0x14/0x20 [ 296.079129][T16252] ? mutex_unlock+0xb2/0x260 [ 296.083558][T16252] ? restore_fpregs_from_fpstate+0xfc/0x230 [ 296.089285][T16252] ? __kasan_check_write+0x14/0x20 [ 296.094228][T16252] ? fpregs_restore_userregs+0x130/0x290 [ 296.099698][T16252] __x64_sys_sendmsg+0x7f/0x90 [ 296.104299][T16252] do_syscall_64+0x3d/0xb0 [ 296.108550][T16252] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 296.114280][T16252] RIP: 0033:0x7f23a327d0a9 [ 296.118534][T16252] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 296.137974][T16252] RSP: 002b:00007f23a3f8d0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 296.146221][T16252] RAX: ffffffffffffffda RBX: 00007f23a33b3f80 RCX: 00007f23a327d0a9 [ 296.154030][T16252] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000007 [ 296.161846][T16252] RBP: 00007f23a3f8d120 R08: 0000000000000000 R09: 0000000000000000 [ 296.169651][T16252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 296.177463][T16252] R13: 000000000000000b R14: 00007f23a33b3f80 R15: 00007ffef6a016d8 [ 296.185281][T16252] [ 296.567745][T16278] device syzkaller0 entered promiscuous mode [ 297.210082][T16316] device syzkaller0 entered promiscuous mode [ 297.386392][T16331] device pim6reg1 entered promiscuous mode [ 298.112255][T16377] syz-executor.4[16377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.112378][T16377] syz-executor.4[16377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.145209][T16377] syz-executor.4[16377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.160807][T16377] syz-executor.4[16377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.604422][T16405] Â: renamed from pim6reg1 [ 299.592993][T16468] syz-executor.0[16468] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.163289][T16511] device pim6reg1 entered promiscuous mode [ 300.196316][T16511] FAULT_INJECTION: forcing a failure. [ 300.196316][T16511] name failslab, interval 1, probability 0, space 0, times 0 [ 300.208766][T16511] CPU: 0 PID: 16511 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 300.218722][T16511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 300.228615][T16511] Call Trace: [ 300.231823][T16511] [ 300.234602][T16511] dump_stack_lvl+0x151/0x1b7 [ 300.239122][T16511] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 300.244420][T16511] dump_stack+0x15/0x1b [ 300.248399][T16511] should_fail_ex+0x3d0/0x520 [ 300.252924][T16511] ? __alloc_skb+0xcc/0x2d0 [ 300.257266][T16511] __should_failslab+0xaf/0xf0 [ 300.261856][T16511] should_failslab+0x9/0x20 [ 300.266193][T16511] kmem_cache_alloc_node+0x3e/0x2d0 [ 300.271228][T16511] ? _find_next_bit+0x126/0x130 [ 300.275912][T16511] __alloc_skb+0xcc/0x2d0 [ 300.280085][T16511] inet6_rt_notify+0x2db/0x560 [ 300.284779][T16511] ? rt6_nh_dump_exceptions+0x650/0x650 [ 300.290159][T16511] ? call_fib_notifiers+0x9f/0xc0 [ 300.295021][T16511] fib6_del+0xce0/0x1060 [ 300.299104][T16511] ? fib6_locate+0x560/0x560 [ 300.303523][T16511] ? __kernel_text_address+0xd/0x40 [ 300.308592][T16511] ? unwind_get_return_address+0x4d/0x90 [ 300.314032][T16511] fib6_clean_node+0x2ed/0x550 [ 300.318745][T16511] ? node_free_rcu+0x30/0x30 [ 300.323158][T16511] ? __stack_depot_save+0x36/0x480 [ 300.328110][T16511] fib6_walk_continue+0x52d/0x720 [ 300.333084][T16511] fib6_walk+0x172/0x2d0 [ 300.337151][T16511] fib6_clean_all+0x202/0x2c0 [ 300.341669][T16511] ? rt6_sync_down_dev+0x170/0x170 [ 300.346607][T16511] ? fib6_del+0x1060/0x1060 [ 300.350948][T16511] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 300.356589][T16511] ? node_free_rcu+0x30/0x30 [ 300.361018][T16511] ? rt6_sync_down_dev+0x170/0x170 [ 300.365961][T16511] ? cpu_curr_snapshot+0x90/0x90 [ 300.370740][T16511] rt6_disable_ip+0x166/0x9e0 [ 300.375249][T16511] ? wake_up_process+0x10/0x20 [ 300.379850][T16511] ? insert_work+0x283/0x310 [ 300.384276][T16511] ? fib6_ifdown+0x510/0x510 [ 300.388714][T16511] ? __kasan_check_read+0x11/0x20 [ 300.393565][T16511] addrconf_ifdown+0x15e/0x1ab0 [ 300.398254][T16511] ? __fput+0x3ab/0x870 [ 300.402244][T16511] ? ____fput+0x15/0x20 [ 300.406321][T16511] ? wq_worker_last_func+0x50/0x50 [ 300.411272][T16511] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 300.417172][T16511] ? addrconf_cleanup+0x140/0x140 [ 300.422031][T16511] ? mutex_unlock+0xb2/0x260 [ 300.426460][T16511] ? __mutex_lock_slowpath+0x10/0x10 [ 300.431590][T16511] ? nf_nat_masq_schedule+0x600/0x600 [ 300.436887][T16511] ? masq_device_event+0xd0/0xd0 [ 300.441668][T16511] addrconf_notify+0x32f/0xe10 [ 300.446256][T16511] ? ip6mr_device_event+0x1e3/0x210 [ 300.451295][T16511] raw_notifier_call_chain+0x8c/0xf0 [ 300.456414][T16511] dev_close_many+0x37c/0x530 [ 300.460937][T16511] ? __dev_open+0x4e0/0x4e0 [ 300.465263][T16511] ? __kasan_check_read+0x11/0x20 [ 300.470126][T16511] unregister_netdevice_many+0x4d1/0x1740 [ 300.475763][T16511] ? __queue_work+0x9d9/0xd70 [ 300.480279][T16511] ? alloc_netdev_mqs+0xf90/0xf90 [ 300.485139][T16511] ? __queue_delayed_work+0x182/0x1f0 [ 300.490350][T16511] ? queue_delayed_work_on+0x13f/0x180 [ 300.495644][T16511] ? linkwatch_fire_event+0x1e4/0x240 [ 300.500850][T16511] ? __kasan_check_read+0x11/0x20 [ 300.505710][T16511] unregister_netdevice_queue+0x2e6/0x350 [ 300.511265][T16511] ? list_netdevice+0x710/0x710 [ 300.515948][T16511] ? linkwatch_fire_event+0x211/0x240 [ 300.521161][T16511] __tun_detach+0xcf9/0x14c0 [ 300.525585][T16511] ? bit_wait_io_timeout+0x120/0x120 [ 300.530756][T16511] tun_chr_close+0x92/0x140 [ 300.535043][T16511] ? tun_chr_open+0x530/0x530 [ 300.539558][T16511] __fput+0x3ab/0x870 [ 300.543379][T16511] ____fput+0x15/0x20 [ 300.547205][T16511] task_work_run+0x24d/0x2e0 [ 300.551621][T16511] ? __kasan_check_write+0x14/0x20 [ 300.556573][T16511] ? task_work_cancel+0x2b0/0x2b0 [ 300.561518][T16511] ? filp_close+0x105/0x150 [ 300.565949][T16511] exit_to_user_mode_loop+0x94/0xa0 [ 300.571011][T16511] exit_to_user_mode_prepare+0x5a/0xa0 [ 300.576272][T16511] syscall_exit_to_user_mode+0x26/0x140 [ 300.581654][T16511] do_syscall_64+0x49/0xb0 [ 300.585907][T16511] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 300.591724][T16511] RIP: 0033:0x7f86b847d0a9 [ 300.595977][T16511] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 300.615502][T16511] RSP: 002b:00007f86b77f70c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 300.623744][T16511] RAX: 0000000000000000 RBX: 00007f86b85b3f80 RCX: 00007f86b847d0a9 [ 300.631560][T16511] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 300.639456][T16511] RBP: 00007f86b77f7120 R08: 0000000000000000 R09: 0000000000000000 [ 300.647274][T16511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 300.655088][T16511] R13: 000000000000000b R14: 00007f86b85b3f80 R15: 00007ffdf60bbb48 [ 300.662896][T16511] [ 301.065901][T16546] device pim6reg1 entered promiscuous mode [ 302.213949][T16597] device syzkaller0 entered promiscuous mode [ 302.683685][T16630] device syzkaller0 entered promiscuous mode [ 303.058078][T16666] device syzkaller0 entered promiscuous mode [ 303.311365][T16687] syzkaller0: refused to change device tx_queue_len [ 303.947892][T16701] device syzkaller0 entered promiscuous mode [ 304.268370][T16744] device syzkaller0 entered promiscuous mode [ 306.375942][T16817] device syzkaller0 entered promiscuous mode [ 309.290637][T16946] device syzkaller0 entered promiscuous mode [ 310.008984][T16963] bond_slave_1: mtu less than device minimum [ 310.120178][T16970] device veth0_vlan left promiscuous mode [ 310.126564][T16970] device veth0_vlan entered promiscuous mode [ 310.168038][T16978] device syzkaller0 entered promiscuous mode [ 310.660857][T17040] device pim6reg1 entered promiscuous mode [ 310.850635][T17056] device pim6reg1 entered promiscuous mode [ 311.377878][T17081] device syzkaller0 entered promiscuous mode [ 311.874254][T17101] bridge0: port 3(syz_tun) entered disabled state [ 311.883007][T17101] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.893967][T17101] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.055247][T17114] device syz_tun left promiscuous mode [ 312.063593][T17114] bridge0: port 3(syz_tun) entered disabled state [ 312.089351][T17114] device bridge_slave_1 left promiscuous mode [ 312.114607][T17114] bridge0: port 2(bridge_slave_1) entered disabled state [ 312.137176][T17114] device bridge_slave_0 left promiscuous mode [ 312.156795][T17114] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.385654][T17127] device syzkaller0 entered promiscuous mode [ 312.946284][T17161] device syzkaller0 entered promiscuous mode [ 313.078848][T17181] bpf_get_probe_write_proto: 5 callbacks suppressed [ 313.078868][T17181] syz-executor.1[17181] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.095052][T17181] syz-executor.1[17181] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.265819][T17204] device syzkaller0 entered promiscuous mode [ 313.459169][T17220] FAULT_INJECTION: forcing a failure. [ 313.459169][T17220] name failslab, interval 1, probability 0, space 0, times 0 [ 313.471651][T17220] CPU: 1 PID: 17220 Comm: syz-executor.4 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 313.481574][T17220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 313.491486][T17220] Call Trace: [ 313.494591][T17220] [ 313.497373][T17220] dump_stack_lvl+0x151/0x1b7 [ 313.501885][T17220] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 313.507268][T17220] ? __kasan_check_write+0x14/0x20 [ 313.512214][T17220] dump_stack+0x15/0x1b [ 313.516402][T17220] should_fail_ex+0x3d0/0x520 [ 313.520921][T17220] ? tipc_topsrv_queue_evt+0x162/0x350 [ 313.526210][T17220] __should_failslab+0xaf/0xf0 [ 313.530813][T17220] should_failslab+0x9/0x20 [ 313.535151][T17220] __kmem_cache_alloc_node+0x3d/0x250 [ 313.540359][T17220] ? tipc_topsrv_queue_evt+0x350/0x350 [ 313.545655][T17220] ? tipc_topsrv_queue_evt+0x162/0x350 [ 313.550962][T17220] kmalloc_trace+0x2a/0xa0 [ 313.555290][T17220] tipc_topsrv_queue_evt+0x162/0x350 [ 313.560411][T17220] tipc_sub_report_overlap+0x4ac/0x840 [ 313.565703][T17220] tipc_nametbl_remove_publ+0xd46/0x1b40 [ 313.571176][T17220] tipc_nametbl_withdraw+0x147/0x390 [ 313.576303][T17220] tipc_sk_leave+0x51e/0x700 [ 313.580724][T17220] ? __tipc_shutdown+0x1520/0x1520 [ 313.585670][T17220] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 313.591568][T17220] tipc_release+0x110/0x1310 [ 313.595992][T17220] ? rwsem_write_trylock+0x15b/0x290 [ 313.601116][T17220] ? tipc_sock_destruct+0x190/0x190 [ 313.606237][T17220] sock_close+0xdf/0x270 [ 313.610311][T17220] ? sock_mmap+0xa0/0xa0 [ 313.614391][T17220] __fput+0x3ab/0x870 [ 313.618211][T17220] ____fput+0x15/0x20 [ 313.622030][T17220] task_work_run+0x24d/0x2e0 [ 313.626453][T17220] ? __kasan_check_write+0x14/0x20 [ 313.631405][T17220] ? task_work_cancel+0x2b0/0x2b0 [ 313.636262][T17220] ? filp_close+0x105/0x150 [ 313.640606][T17220] exit_to_user_mode_loop+0x94/0xa0 [ 313.645637][T17220] exit_to_user_mode_prepare+0x5a/0xa0 [ 313.650931][T17220] syscall_exit_to_user_mode+0x26/0x140 [ 313.656314][T17220] do_syscall_64+0x49/0xb0 [ 313.660568][T17220] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 313.666304][T17220] RIP: 0033:0x7f9d5667d0a9 [ 313.670559][T17220] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 313.689991][T17220] RSP: 002b:00007f9d574080c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 313.698231][T17220] RAX: 0000000000000000 RBX: 00007f9d567b3f80 RCX: 00007f9d5667d0a9 [ 313.706060][T17220] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 313.713856][T17220] RBP: 00007f9d57408120 R08: 0000000000000000 R09: 0000000000000000 [ 313.721666][T17220] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 313.729478][T17220] R13: 000000000000000b R14: 00007f9d567b3f80 R15: 00007ffd147e7a58 [ 313.737295][T17220] [ 313.861091][T17232] device pim6reg1 entered promiscuous mode [ 313.997009][T17243] device syzkaller0 entered promiscuous mode [ 314.066294][T17258] syz-executor.0[17258] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.066374][T17258] syz-executor.0[17258] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.925276][T17293] device syzkaller0 entered promiscuous mode [ 315.124364][T17306] syz-executor.2[17306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.124450][T17306] syz-executor.2[17306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.346574][T17332] syz-executor.0[17332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.358998][T17332] syz-executor.0[17332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.503459][T17335] device syzkaller0 entered promiscuous mode [ 315.527832][T17342] bond_slave_1: mtu less than device minimum [ 315.774422][T17381] syz-executor.0[17381] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.774527][T17381] syz-executor.0[17381] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.830233][T17386] device syzkaller0 entered promiscuous mode [ 316.344337][T17428] device syzkaller0 entered promiscuous mode [ 316.855729][T17469] device syzkaller0 entered promiscuous mode [ 316.949242][T17478] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 5 (only 8 groups) [ 317.136575][T17504] device syzkaller0 entered promiscuous mode [ 317.207033][T17514] bond_slave_1: mtu less than device minimum [ 317.409115][T17533] bond_slave_1: mtu less than device minimum [ 317.535471][T17544] device syzkaller0 entered promiscuous mode [ 318.122521][T17595] device syzkaller0 entered promiscuous mode [ 318.604952][T17608] device syzkaller0 entered promiscuous mode [ 318.672698][T17602] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.684958][T17602] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.696398][T17602] device bridge_slave_0 entered promiscuous mode [ 318.781281][T17624] bpf_get_probe_write_proto: 4 callbacks suppressed [ 318.781309][T17624] syz-executor.1[17624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.787900][T17624] syz-executor.1[17624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.027971][T17602] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.046484][T17602] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.054863][T17602] device bridge_slave_1 entered promiscuous mode [ 319.074537][T17639] device syzkaller0 entered promiscuous mode [ 319.164314][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 319.173113][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 319.190026][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 319.200350][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 319.208443][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.215345][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 319.223131][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 319.231969][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 319.240514][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.247388][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 319.266662][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 319.274387][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 319.282742][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 319.299488][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 319.311516][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 319.321035][T17602] device veth0_vlan entered promiscuous mode [ 319.327591][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 319.335975][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 319.351161][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 319.360077][T17602] device veth1_macvtap entered promiscuous mode [ 319.374158][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 319.392324][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 319.989810][T17685] bridge0: port 3(veth1_macvtap) entered blocking state [ 319.999422][T17685] bridge0: port 3(veth1_macvtap) entered disabled state [ 320.472842][T17740] device syzkaller0 entered promiscuous mode [ 320.565861][T17750] device veth1_macvtap left promiscuous mode [ 320.593747][T17750] device veth1_macvtap entered promiscuous mode [ 320.603138][T17750] device macsec0 entered promiscuous mode [ 320.877405][T17780] device syzkaller0 entered promiscuous mode [ 321.022565][T17804] FAULT_INJECTION: forcing a failure. [ 321.022565][T17804] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 321.042520][T17804] CPU: 1 PID: 17804 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 321.052522][T17804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 321.062511][T17804] Call Trace: [ 321.065638][T17804] [ 321.068408][T17804] dump_stack_lvl+0x151/0x1b7 [ 321.073056][T17804] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 321.078339][T17804] ? vfs_write+0xbb3/0xeb0 [ 321.082590][T17804] dump_stack+0x15/0x1b [ 321.086589][T17804] should_fail_ex+0x3d0/0x520 [ 321.091099][T17804] should_fail+0xb/0x10 [ 321.095087][T17804] should_fail_usercopy+0x1a/0x20 [ 321.099947][T17804] _copy_from_user+0x1e/0xc0 [ 321.104373][T17804] __sys_bpf+0x23b/0x7f0 [ 321.108465][T17804] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 321.113667][T17804] ? debug_smp_processor_id+0x17/0x20 [ 321.118886][T17804] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 321.124772][T17804] __x64_sys_bpf+0x7c/0x90 [ 321.129024][T17804] do_syscall_64+0x3d/0xb0 [ 321.133274][T17804] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 321.139005][T17804] RIP: 0033:0x7f8ecb47d0a9 [ 321.143262][T17804] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 321.162786][T17804] RSP: 002b:00007f8ecc10c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 321.171029][T17804] RAX: ffffffffffffffda RBX: 00007f8ecb5b3f80 RCX: 00007f8ecb47d0a9 [ 321.178917][T17804] RDX: 0000000000000069 RSI: 00000000200002c0 RDI: 000000000000000a [ 321.186650][T17804] RBP: 00007f8ecc10c120 R08: 0000000000000000 R09: 0000000000000000 [ 321.194465][T17804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 321.202276][T17804] R13: 000000000000000b R14: 00007f8ecb5b3f80 R15: 00007ffd858f9978 [ 321.210099][T17804] [ 321.238435][T17813] device veth1_macvtap left promiscuous mode [ 321.298821][T17813] device veth1_macvtap entered promiscuous mode [ 321.305453][T17813] device macsec0 entered promiscuous mode [ 321.517070][T17846] device syzkaller0 entered promiscuous mode [ 321.566025][T17856] device syzkaller0 entered promiscuous mode [ 321.888260][T17872] syz-executor.0[17872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 321.888344][T17872] syz-executor.0[17872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 322.460987][T17886] device syzkaller0 entered promiscuous mode [ 322.600263][T17902] syz-executor.2[17902] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 322.600347][T17902] syz-executor.2[17902] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 322.964545][T17926] device syzkaller0 entered promiscuous mode [ 323.220676][T17934] syz-executor.1[17934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.220758][T17934] syz-executor.1[17934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.327804][T17938] device wg2 left promiscuous mode [ 323.581195][T17957] device syzkaller0 entered promiscuous mode [ 324.574226][T17990] device syzkaller0 entered promiscuous mode [ 324.849817][T18015] device pim6reg1 entered promiscuous mode [ 325.040218][T18031] device veth1_macvtap entered promiscuous mode [ 325.046662][T18031] device macsec0 entered promiscuous mode [ 325.054110][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 325.189937][T18040] syz-executor.1[18040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.190018][T18040] syz-executor.1[18040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.792685][T18047] device syzkaller0 entered promiscuous mode [ 326.189633][T18069] device pim6reg1 entered promiscuous mode [ 326.342024][T18089] FAULT_INJECTION: forcing a failure. [ 326.342024][T18089] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 326.342097][T18087] device syzkaller0 entered promiscuous mode [ 326.355535][T18089] CPU: 1 PID: 18089 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 326.371160][T18089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 326.381055][T18089] Call Trace: [ 326.384422][T18089] [ 326.387199][T18089] dump_stack_lvl+0x151/0x1b7 [ 326.391709][T18089] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 326.397003][T18089] ? __alloc_pages+0x780/0x780 [ 326.401612][T18089] dump_stack+0x15/0x1b [ 326.405680][T18089] should_fail_ex+0x3d0/0x520 [ 326.410191][T18089] should_fail_alloc_page+0x68/0x90 [ 326.415409][T18089] __alloc_pages+0x1f4/0x780 [ 326.419833][T18089] ? prep_new_page+0x110/0x110 [ 326.424427][T18089] ? _raw_spin_trylock_bh+0x190/0x190 [ 326.429639][T18089] __get_free_pages+0xe/0x30 [ 326.434061][T18089] kasan_populate_vmalloc_pte+0x39/0x130 [ 326.439524][T18089] ? __apply_to_page_range+0x8ca/0xbe0 [ 326.444824][T18089] __apply_to_page_range+0x8dd/0xbe0 [ 326.449942][T18089] ? kasan_populate_vmalloc+0x70/0x70 [ 326.455153][T18089] ? kasan_populate_vmalloc+0x70/0x70 [ 326.460362][T18089] apply_to_page_range+0x3b/0x50 [ 326.465130][T18089] kasan_populate_vmalloc+0x65/0x70 [ 326.470180][T18089] alloc_vmap_area+0x1961/0x1aa0 [ 326.474942][T18089] ? vm_map_ram+0x940/0x940 [ 326.479279][T18089] ? __kasan_kmalloc+0x9c/0xb0 [ 326.483876][T18089] ? kmalloc_node_trace+0x3d/0xb0 [ 326.488739][T18089] __get_vm_area_node+0x171/0x370 [ 326.493600][T18089] __vmalloc_node_range+0x36e/0x1540 [ 326.498724][T18089] ? queue_stack_map_alloc+0xc3/0x1f0 [ 326.503932][T18089] ? vmap+0x2b0/0x2b0 [ 326.507749][T18089] bpf_map_area_alloc+0xdc/0xf0 [ 326.512431][T18089] ? queue_stack_map_alloc+0xc3/0x1f0 [ 326.517639][T18089] queue_stack_map_alloc+0xc3/0x1f0 [ 326.522671][T18089] map_create+0x44a/0xcf0 [ 326.526839][T18089] __sys_bpf+0x2e6/0x7f0 [ 326.530918][T18089] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 326.536127][T18089] ? debug_smp_processor_id+0x17/0x20 [ 326.541336][T18089] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 326.547235][T18089] __x64_sys_bpf+0x7c/0x90 [ 326.551487][T18089] do_syscall_64+0x3d/0xb0 [ 326.555739][T18089] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 326.561466][T18089] RIP: 0033:0x7f8ecb47d0a9 [ 326.565720][T18089] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 326.585161][T18089] RSP: 002b:00007f8ecc10c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 326.593494][T18089] RAX: ffffffffffffffda RBX: 00007f8ecb5b3f80 RCX: 00007f8ecb47d0a9 [ 326.601303][T18089] RDX: 0000000000000048 RSI: 0000000020000680 RDI: 0000000000000000 [ 326.609120][T18089] RBP: 00007f8ecc10c120 R08: 0000000000000000 R09: 0000000000000000 [ 326.616929][T18089] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 326.624738][T18089] R13: 000000000000000b R14: 00007f8ecb5b3f80 R15: 00007ffd858f9978 [ 326.632554][T18089] [ 326.965294][T18122] syz-executor.3[18122] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 326.965367][T18122] syz-executor.3[18122] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.214196][T18127] device syzkaller0 entered promiscuous mode [ 327.339045][T18125] device syzkaller0 entered promiscuous mode [ 327.854075][T18160] device syzkaller0 entered promiscuous mode [ 327.919103][T18163] device syzkaller0 entered promiscuous mode [ 328.229596][T18180] device syzkaller0 entered promiscuous mode [ 328.784918][T18195] syz-executor.4[18195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.785001][T18195] syz-executor.4[18195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.910431][T18201] device syzkaller0 entered promiscuous mode [ 329.002866][T18199] device syzkaller0 entered promiscuous mode [ 330.036306][T18242] device syzkaller0 entered promiscuous mode [ 330.206186][T18252] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.213234][T18252] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.308701][T18253] device bridge_slave_1 left promiscuous mode [ 330.315148][T18253] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.344421][T18253] device bridge_slave_0 left promiscuous mode [ 330.367156][T18253] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.936822][T18279] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.976399][T18279] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.005175][T18279] device bridge_slave_0 entered promiscuous mode [ 331.066461][ T8] device veth1_macvtap left promiscuous mode [ 331.351790][T18279] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.358802][T18279] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.366192][T18279] device bridge_slave_1 entered promiscuous mode [ 331.479516][T18300] device syzkaller0 entered promiscuous mode [ 331.656088][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 331.668010][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 331.707792][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 331.747508][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 331.791957][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.798980][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.869714][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 331.908780][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 331.951421][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.958293][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 332.058810][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 332.123342][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 332.183061][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 332.255836][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 332.289496][T18279] device veth0_vlan entered promiscuous mode [ 332.314860][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 332.333167][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 332.347960][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 332.356109][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 332.365315][T18279] device veth1_macvtap entered promiscuous mode [ 332.380846][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 332.396042][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 332.404648][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 332.607399][T18341] device syzkaller0 entered promiscuous mode [ 332.793517][T18347] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.800538][T18347] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.808024][T18347] device bridge_slave_0 entered promiscuous mode [ 332.817791][T18347] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.826489][T18347] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.834585][T18347] device bridge_slave_1 entered promiscuous mode [ 333.001965][ T8] device bridge_slave_1 left promiscuous mode [ 333.016767][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.026972][ T8] device bridge_slave_0 left promiscuous mode [ 333.033313][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.044565][ T8] device veth1_macvtap left promiscuous mode [ 333.050765][ T8] device veth0_vlan left promiscuous mode [ 333.350994][T18347] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.357890][T18347] bridge0: port 2(bridge_slave_1) entered forwarding state [ 333.365000][T18347] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.371776][T18347] bridge0: port 1(bridge_slave_0) entered forwarding state [ 333.491386][ T6] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.502869][ T6] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.644229][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 333.657324][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 333.699771][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 333.732115][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 333.754635][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.761582][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 333.827116][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 333.859873][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 333.889104][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.895994][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 333.970555][T18385] device syzkaller0 entered promiscuous mode [ 333.993677][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 334.063250][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 334.071178][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 334.079416][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 334.120097][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 334.135445][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 334.151712][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 334.161157][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 334.172626][T18347] device veth0_vlan entered promiscuous mode [ 334.178984][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 334.186240][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 334.195773][T18402] geneve1: tun_chr_ioctl cmd 1074025681 [ 334.205784][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 334.214247][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 334.223592][T18347] device veth1_macvtap entered promiscuous mode [ 334.233254][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 334.245610][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 334.254586][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 334.265471][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 334.274934][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 334.597159][T18418] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.609601][T18418] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.619986][T18418] device bridge_slave_0 entered promiscuous mode [ 334.631505][T18429] Â: renamed from pim6reg1 [ 334.636581][T18418] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.646260][T18418] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.656354][T18418] device bridge_slave_1 entered promiscuous mode [ 334.759578][T18431] device syzkaller0 entered promiscuous mode [ 334.785146][T18418] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.792054][T18418] bridge0: port 2(bridge_slave_1) entered forwarding state [ 334.799236][T18418] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.805989][T18418] bridge0: port 1(bridge_slave_0) entered forwarding state [ 334.841516][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 334.857844][ T4649] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.867816][ T4649] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.876561][T18433] syz-executor.2[18433] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.876640][T18433] syz-executor.2[18433] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.924226][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 334.944227][ T2002] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.951128][ T2002] bridge0: port 1(bridge_slave_0) entered forwarding state [ 334.970531][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 334.980924][ T2002] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.987926][ T2002] bridge0: port 2(bridge_slave_1) entered forwarding state [ 335.034992][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 335.044288][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 335.058801][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 335.071122][ T8] device bridge_slave_1 left promiscuous mode [ 335.077089][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.085423][ T8] device bridge_slave_0 left promiscuous mode [ 335.091758][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.100719][ T8] device veth1_macvtap left promiscuous mode [ 335.106664][ T8] device veth0_vlan left promiscuous mode [ 335.344225][T18418] device veth0_vlan entered promiscuous mode [ 335.397080][T18463] device syzkaller0 entered promiscuous mode [ 335.429711][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 335.447534][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 335.468906][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 335.495031][T18418] device veth1_macvtap entered promiscuous mode [ 335.554069][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 335.579255][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 335.587428][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 335.634993][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 335.673745][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 336.162781][T18487] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.169993][T18487] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.184894][T18487] device bridge_slave_0 entered promiscuous mode [ 336.199533][T18487] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.216620][T18487] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.230957][T18487] device bridge_slave_1 entered promiscuous mode [ 336.243375][T18502] device pim6reg1 entered promiscuous mode [ 336.333841][T18487] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.340727][T18487] bridge0: port 2(bridge_slave_1) entered forwarding state [ 336.347823][T18487] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.354622][T18487] bridge0: port 1(bridge_slave_0) entered forwarding state [ 336.390599][ T8] device bridge_slave_1 left promiscuous mode [ 336.401345][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.424960][ T8] device bridge_slave_0 left promiscuous mode [ 336.431167][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.443995][ T8] device veth1_macvtap left promiscuous mode [ 336.450185][ T8] device veth0_vlan left promiscuous mode [ 336.662038][T18511] device syzkaller0 entered promiscuous mode [ 336.681412][ T2002] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.692413][ T2002] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.719867][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 336.734031][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 336.742000][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 336.768991][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 336.777799][ T315] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.784711][ T315] bridge0: port 1(bridge_slave_0) entered forwarding state [ 336.792791][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 336.806888][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 336.823929][ T315] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.830861][ T315] bridge0: port 2(bridge_slave_1) entered forwarding state [ 336.851784][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 336.871609][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 336.879713][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 336.887799][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 336.915582][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 336.924235][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 336.938012][T18487] device veth0_vlan entered promiscuous mode [ 336.946681][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 336.955211][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 336.975679][T18487] device veth1_macvtap entered promiscuous mode [ 336.992894][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 337.000359][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 337.007907][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 337.016114][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 337.024533][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 337.033194][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 337.041440][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 337.050222][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 337.058763][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 337.433128][T18547] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.440265][T18547] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.447619][T18547] device bridge_slave_0 entered promiscuous mode [ 337.457888][T18547] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.465005][T18547] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.472585][T18547] device bridge_slave_1 entered promiscuous mode [ 337.690119][ T8] device bridge_slave_1 left promiscuous mode [ 337.696100][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.756457][ T8] device bridge_slave_0 left promiscuous mode [ 337.781019][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.823243][ T8] device veth1_macvtap left promiscuous mode [ 337.858562][ T8] device veth0_vlan left promiscuous mode [ 338.165191][T18563] device syzkaller0 entered promiscuous mode [ 338.351546][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 338.360880][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 338.382195][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 338.390564][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 338.398811][ T2002] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.405673][ T2002] bridge0: port 1(bridge_slave_0) entered forwarding state [ 338.413215][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 338.421525][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 338.431060][ T2002] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.437933][ T2002] bridge0: port 2(bridge_slave_1) entered forwarding state [ 338.445699][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 338.461830][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 338.470286][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 338.488944][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 338.497137][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 338.508279][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 338.522216][T18547] device veth0_vlan entered promiscuous mode [ 338.530838][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 338.539111][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 338.546478][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 338.573107][T18547] device veth1_macvtap entered promiscuous mode [ 338.584401][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 338.596425][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 338.605016][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 338.616050][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 338.624892][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 338.779594][T18606] FAULT_INJECTION: forcing a failure. [ 338.779594][T18606] name failslab, interval 1, probability 0, space 0, times 0 [ 338.792881][T18606] CPU: 1 PID: 18606 Comm: syz-executor.2 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 338.802865][T18606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 338.812851][T18606] Call Trace: [ 338.816060][T18606] [ 338.818841][T18606] dump_stack_lvl+0x151/0x1b7 [ 338.823352][T18606] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 338.828734][T18606] ? selinux_kernfs_init_security+0x14a/0x720 [ 338.834632][T18606] ? idr_alloc_cyclic+0x369/0x5d0 [ 338.839498][T18606] dump_stack+0x15/0x1b [ 338.843487][T18606] should_fail_ex+0x3d0/0x520 [ 338.847999][T18606] ? __kernfs_new_node+0xdb/0x700 [ 338.852861][T18606] __should_failslab+0xaf/0xf0 [ 338.857464][T18606] should_failslab+0x9/0x20 [ 338.861812][T18606] kmem_cache_alloc+0x3b/0x2c0 [ 338.866403][T18606] __kernfs_new_node+0xdb/0x700 [ 338.871095][T18606] ? kernfs_new_node+0x230/0x230 [ 338.875862][T18606] ? rwsem_write_trylock+0x15b/0x290 [ 338.880986][T18606] ? up_write+0x79/0x1f0 [ 338.885061][T18606] ? kernfs_activate+0x1e6/0x200 [ 338.889834][T18606] kernfs_new_node+0x130/0x230 [ 338.894437][T18606] __kernfs_create_file+0x4a/0x270 [ 338.899383][T18606] sysfs_add_file_mode_ns+0x1c8/0x270 [ 338.904590][T18606] internal_create_group+0x545/0xed0 [ 338.909723][T18606] ? sysfs_create_group+0x30/0x30 [ 338.914573][T18606] ? up_write+0x79/0x1f0 [ 338.918654][T18606] ? kernfs_activate+0x1e6/0x200 [ 338.923430][T18606] sysfs_create_groups+0x5b/0x130 [ 338.928288][T18606] device_add_attrs+0xe1/0x5f0 [ 338.932884][T18606] ? kernfs_put+0x4e5/0x520 [ 338.937223][T18606] ? get_device_parent+0x410/0x410 [ 338.942174][T18606] ? sysfs_do_create_link_sd+0xe2/0x110 [ 338.947648][T18606] device_add+0x5f7/0xf10 [ 338.951815][T18606] netdev_register_kobject+0x177/0x320 [ 338.957098][T18606] ? raw_notifier_call_chain+0xdf/0xf0 [ 338.962395][T18606] register_netdevice+0xe43/0x1490 [ 338.967345][T18606] ? netif_stacked_transfer_operstate+0x240/0x240 [ 338.973597][T18606] ? tun_net_initialize+0x15c/0x460 [ 338.978628][T18606] ? tun_setup+0x2b0/0x2b0 [ 338.982873][T18606] ? alloc_netdev_mqs+0xbf2/0xf90 [ 338.987739][T18606] tun_set_iff+0x836/0xee0 [ 338.992008][T18606] __tun_chr_ioctl+0x80e/0x22d0 [ 338.996769][T18606] ? tun_flow_create+0x320/0x320 [ 339.001540][T18606] ? __fget_files+0x2cb/0x330 [ 339.006059][T18606] tun_chr_ioctl+0x2a/0x40 [ 339.010304][T18606] ? tun_chr_poll+0x670/0x670 [ 339.014817][T18606] __se_sys_ioctl+0x114/0x190 [ 339.019332][T18606] __x64_sys_ioctl+0x7b/0x90 [ 339.023758][T18606] do_syscall_64+0x3d/0xb0 [ 339.028017][T18606] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 339.033824][T18606] RIP: 0033:0x7fa91187d0a9 [ 339.038076][T18606] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 339.057526][T18606] RSP: 002b:00007fa91256e0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 339.065764][T18606] RAX: ffffffffffffffda RBX: 00007fa9119b3f80 RCX: 00007fa91187d0a9 [ 339.073579][T18606] RDX: 0000000020000200 RSI: 00000000400454ca RDI: 0000000000000006 [ 339.081399][T18606] RBP: 00007fa91256e120 R08: 0000000000000000 R09: 0000000000000000 [ 339.089195][T18606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 339.097017][T18606] R13: 000000000000000b R14: 00007fa9119b3f80 R15: 00007ffe097d5a28 [ 339.104827][T18606] [ 339.247376][T18615] device syzkaller0 entered promiscuous mode [ 339.628605][T18619] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.635633][T18619] bridge0: port 1(bridge_slave_0) entered disabled state [ 339.657638][T18619] device bridge_slave_0 entered promiscuous mode [ 339.673782][T18619] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.681144][T18619] bridge0: port 2(bridge_slave_1) entered disabled state [ 339.716864][T18619] device bridge_slave_1 entered promiscuous mode [ 339.923245][ T8] device bridge_slave_1 left promiscuous mode [ 339.930772][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 339.949349][ T8] device bridge_slave_0 left promiscuous mode [ 339.955368][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 339.963698][ T8] device veth1_macvtap left promiscuous mode [ 339.969729][ T8] device veth0_vlan left promiscuous mode [ 340.075170][T18619] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.082209][T18619] bridge0: port 2(bridge_slave_1) entered forwarding state [ 340.089291][T18619] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.096315][T18619] bridge0: port 1(bridge_slave_0) entered forwarding state [ 340.118498][T18661] device syzkaller0 entered promiscuous mode [ 340.152518][ T333] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.160197][ T333] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.197540][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 340.205315][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 340.221729][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 340.230390][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 340.241321][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.248197][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 340.263532][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 340.275677][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 340.285464][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.292376][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 340.323986][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 340.343649][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 340.372595][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 340.399184][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 340.436782][T18619] device veth0_vlan entered promiscuous mode [ 340.444060][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 340.452920][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 340.461205][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 340.470569][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 340.483673][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 340.491264][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 340.505190][T18619] device veth1_macvtap entered promiscuous mode [ 340.514263][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 340.529715][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 340.548164][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 340.572984][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 340.581980][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 340.591026][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 340.599487][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 341.150521][T18690] device syzkaller0 entered promiscuous mode [ 341.595524][ T8] device bridge_slave_1 left promiscuous mode [ 341.601531][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.609421][ T8] device bridge_slave_0 left promiscuous mode [ 341.615687][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.636514][ T8] device veth1_macvtap left promiscuous mode [ 341.642592][ T8] device veth0_vlan left promiscuous mode [ 341.922843][T18701] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.929843][T18701] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.938116][T18701] device bridge_slave_0 entered promiscuous mode [ 341.946068][T18701] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.953103][T18701] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.960981][T18701] device bridge_slave_1 entered promiscuous mode [ 342.089153][T18701] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.096046][T18701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 342.103167][T18701] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.110036][T18701] bridge0: port 1(bridge_slave_0) entered forwarding state [ 342.130335][T18729] device syzkaller0 entered promiscuous mode [ 342.157480][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 342.166194][ T2002] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.174989][ T2002] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.230736][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 342.239693][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.246552][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 342.253847][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 342.264959][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.271860][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 342.280427][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 342.302281][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 342.317498][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 342.325818][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 342.334441][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 342.347720][T18701] device veth0_vlan entered promiscuous mode [ 342.368434][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 342.376530][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 342.400007][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 342.407760][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 342.418103][T18701] device veth1_macvtap entered promiscuous mode [ 342.424807][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 342.434104][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 342.442597][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 342.465730][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 342.474289][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 342.489000][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 342.497191][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 343.151822][T18788] syz-executor.0[18788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.151905][T18788] syz-executor.0[18788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.166052][ T431] device bridge_slave_1 left promiscuous mode [ 343.220469][ T431] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.248023][ T431] device bridge_slave_0 left promiscuous mode [ 343.272394][ T431] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.303824][ T431] device veth1_macvtap left promiscuous mode [ 343.327544][ T431] device veth0_vlan left promiscuous mode [ 343.624428][T18786] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.635728][T18786] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.654463][T18786] device bridge_slave_0 entered promiscuous mode [ 343.667655][T18786] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.675017][T18786] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.724094][T18786] device bridge_slave_1 entered promiscuous mode [ 343.960000][T18801] device syzkaller0 entered promiscuous mode [ 344.103147][T18786] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.110047][T18786] bridge0: port 2(bridge_slave_1) entered forwarding state [ 344.140296][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.152395][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 344.160952][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 344.177680][T18829] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 4284481536 (only 8 groups) [ 344.199461][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 344.207665][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 344.216238][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.223114][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 344.231017][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 344.239878][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.246934][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 344.279035][T18786] device veth0_vlan entered promiscuous mode [ 344.285755][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 344.296171][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 344.304576][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 344.312313][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 344.322654][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 344.330642][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 344.346224][T18786] device veth1_macvtap entered promiscuous mode [ 344.354362][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 344.367938][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 344.380471][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 344.888027][T18860] FAULT_INJECTION: forcing a failure. [ 344.888027][T18860] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 344.901457][T18860] CPU: 1 PID: 18860 Comm: syz-executor.4 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 344.911438][T18860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 344.921337][T18860] Call Trace: [ 344.924457][T18860] [ 344.927235][T18860] dump_stack_lvl+0x151/0x1b7 [ 344.931836][T18860] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 344.936823][T18855] device syzkaller0 entered promiscuous mode [ 344.937125][T18860] ? __alloc_pages+0x780/0x780 [ 344.937153][T18860] dump_stack+0x15/0x1b [ 344.937175][T18860] should_fail_ex+0x3d0/0x520 [ 344.956059][T18860] should_fail_alloc_page+0x68/0x90 [ 344.961103][T18860] __alloc_pages+0x1f4/0x780 [ 344.965513][T18860] ? __this_cpu_preempt_check+0x13/0x20 [ 344.970888][T18860] ? prep_new_page+0x110/0x110 [ 344.975487][T18860] ? folio_add_lru+0x280/0x3f0 [ 344.980099][T18860] __folio_alloc+0x15/0x40 [ 344.984340][T18860] wp_page_copy+0x23b/0x1690 [ 344.988765][T18860] ? __kasan_check_write+0x14/0x20 [ 344.993802][T18860] ? fault_dirty_shared_page+0x300/0x300 [ 344.999270][T18860] ? vm_normal_page+0x1de/0x1f0 [ 345.003970][T18860] do_wp_page+0xc25/0xdf0 [ 345.008126][T18860] ? mas_state_walk+0x732/0x980 [ 345.012810][T18860] handle_mm_fault+0x15a2/0x2f40 [ 345.017587][T18860] ? numa_migrate_prep+0xe0/0xe0 [ 345.022359][T18860] ? __queue_map_get+0x1db/0x3b0 [ 345.027131][T18860] ? lock_mm_and_find_vma+0x9c/0x310 [ 345.032250][T18860] exc_page_fault+0x24d/0x700 [ 345.036764][T18860] asm_exc_page_fault+0x27/0x30 [ 345.041449][T18860] RIP: 0010:copy_user_enhanced_fast_string+0xa/0x40 [ 345.047979][T18860] Code: ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 8d 0c ca 89 ca eb 20 0f 01 cb 83 fa 40 72 38 89 d1 a4 31 c0 0f 01 ca c3 89 ca eb 0a 66 2e 0f 1f 84 00 00 00 00 00 [ 345.067413][T18860] RSP: 0018:ffffc90000a47ce0 EFLAGS: 00050206 [ 345.073423][T18860] RAX: ffffffff82763801 RBX: 00007fffffff3e9f RCX: 00000000000038e1 [ 345.081231][T18860] RDX: 000000000000b161 RSI: ffff888148387880 RDI: 0000000020009000 [ 345.089038][T18860] RBP: ffffc90000a47d08 R08: dffffc0000000000 R09: 0000000000000000 [ 345.096852][T18860] R10: 0000000000000005 R11: dffffc0000000001 R12: 000000000000b161 [ 345.104750][T18860] R13: 0000000000000000 R14: 0000000020001780 R15: ffff888148380000 [ 345.112565][T18860] ? _copy_from_user+0x61/0xc0 [ 345.117218][T18860] ? _copy_to_user+0x74/0x90 [ 345.121602][T18860] map_lookup_elem+0x45a/0x5c0 [ 345.126205][T18860] __sys_bpf+0x4ba/0x7f0 [ 345.130277][T18860] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 345.135480][T18860] ? debug_smp_processor_id+0x17/0x20 [ 345.140684][T18860] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 345.146585][T18860] __x64_sys_bpf+0x7c/0x90 [ 345.150838][T18860] do_syscall_64+0x3d/0xb0 [ 345.155096][T18860] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 345.160818][T18860] RIP: 0033:0x7f9d5667d0a9 [ 345.165161][T18860] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 345.184599][T18860] RSP: 002b:00007f9d574080c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 345.192843][T18860] RAX: ffffffffffffffda RBX: 00007f9d567b3f80 RCX: 00007f9d5667d0a9 [ 345.200654][T18860] RDX: 0000000000000020 RSI: 0000000020000200 RDI: 0000000000000001 [ 345.208471][T18860] RBP: 00007f9d57408120 R08: 0000000000000000 R09: 0000000000000000 [ 345.216278][T18860] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 345.224090][T18860] R13: 000000000000000b R14: 00007f9d567b3f80 R15: 00007ffd147e7a58 [ 345.231919][T18860] [ 345.292126][T18853] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.303426][T18853] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.311556][T18853] device bridge_slave_0 entered promiscuous mode [ 345.324033][T18853] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.333345][T18853] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.341892][T18853] device bridge_slave_1 entered promiscuous mode [ 345.362022][T18873] device syzkaller0 entered promiscuous mode [ 345.488910][ T431] device bridge_slave_1 left promiscuous mode [ 345.500229][ T431] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.511451][ T431] device bridge_slave_0 left promiscuous mode [ 345.517420][ T431] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.526093][ T431] device veth1_macvtap left promiscuous mode [ 345.532102][ T431] device veth0_vlan left promiscuous mode [ 345.781656][T18897] device syzkaller0 entered promiscuous mode [ 345.903963][T18925] device syzkaller0 entered promiscuous mode [ 345.916880][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 345.926050][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 345.943915][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 345.952559][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 345.961325][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.968234][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 345.976500][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 345.984997][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 345.993662][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.000538][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 346.025133][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 346.033054][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 346.041600][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 346.050058][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 346.057964][ T2002] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 346.074461][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 346.087957][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 346.096305][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 346.106111][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 346.114125][T18853] device veth0_vlan entered promiscuous mode [ 346.130384][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 346.140806][T18853] device veth1_macvtap entered promiscuous mode [ 346.164097][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 346.172543][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 346.200657][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 346.239818][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 346.705015][T18949] device syzkaller0 entered promiscuous mode [ 347.033069][T18965] device syzkaller0 entered promiscuous mode [ 347.161554][T18966] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.168436][T18966] bridge0: port 1(bridge_slave_0) entered disabled state [ 347.181386][T18986] syz-executor.0[18986] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.181471][T18986] syz-executor.0[18986] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.203271][T18966] device bridge_slave_0 entered promiscuous mode [ 347.225515][T18966] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.232914][T18966] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.240293][T18966] device bridge_slave_1 entered promiscuous mode [ 347.374665][ T431] device bridge_slave_1 left promiscuous mode [ 347.382649][ T431] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.413934][ T431] device bridge_slave_0 left promiscuous mode [ 347.453035][ T431] bridge0: port 1(bridge_slave_0) entered disabled state [ 347.501158][ T431] device veth1_macvtap left promiscuous mode [ 347.531660][ T431] device veth0_vlan left promiscuous mode [ 348.068756][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 348.080686][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 348.111429][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 348.153837][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 348.213847][T19021] syz-executor.2[19021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 348.213927][T19021] syz-executor.2[19021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 348.217699][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 348.243888][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 348.384294][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 348.398826][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 348.406901][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 348.413791][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 348.448231][T18966] device veth0_vlan entered promiscuous mode [ 348.492183][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 348.508996][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 348.517010][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 348.562616][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 348.601203][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 348.631071][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 348.657078][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 348.720703][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 348.761689][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 348.813042][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 348.841832][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 348.870635][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 348.877975][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 348.916612][T18966] device veth1_macvtap entered promiscuous mode [ 348.942933][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 348.966266][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 348.991269][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 349.049281][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 349.105781][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 349.249710][T19062] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 349.618790][T19074] bridge0: port 1(bridge_slave_0) entered blocking state [ 349.625672][T19074] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.648989][T19074] device bridge_slave_0 entered promiscuous mode [ 349.692352][T19074] bridge0: port 2(bridge_slave_1) entered blocking state [ 349.705034][T19074] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.717760][T19074] device bridge_slave_1 entered promiscuous mode [ 349.835382][T19097] Â: renamed from pim6reg1 [ 349.853960][T19095] device pim6reg1 entered promiscuous mode [ 349.889424][T19089] bridge0: port 1(bridge_slave_0) entered blocking state [ 349.896328][T19089] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.904206][T19089] device bridge_slave_0 entered promiscuous mode [ 349.912190][T19089] bridge0: port 2(bridge_slave_1) entered blocking state [ 349.919416][T19089] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.926933][T19089] device bridge_slave_1 entered promiscuous mode [ 349.963108][ T431] device bridge_slave_1 left promiscuous mode [ 349.974702][ T431] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.987155][ T431] device bridge_slave_0 left promiscuous mode [ 349.993420][ T431] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.002529][ T431] device veth1_macvtap left promiscuous mode [ 350.009014][ T431] device veth0_vlan left promiscuous mode [ 354.150353][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 354.170313][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 354.185272][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 354.213481][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 354.222526][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.229579][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 354.238289][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 354.247230][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 354.255440][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.262336][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 354.291553][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 354.299405][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 354.307372][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 354.345946][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 354.355540][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 354.365188][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 354.373647][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 354.392181][T19074] device veth0_vlan entered promiscuous mode [ 354.398377][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 354.406577][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 354.428704][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 354.436137][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 354.449862][T19074] device veth1_macvtap entered promiscuous mode [ 354.467136][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 354.475454][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 354.484975][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 354.493053][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 354.500652][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 354.507962][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 354.516574][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 354.524963][ T4649] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.531851][ T4649] bridge0: port 1(bridge_slave_0) entered forwarding state [ 354.539631][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 354.547914][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 354.556433][ T4649] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.563334][ T4649] bridge0: port 2(bridge_slave_1) entered forwarding state [ 354.588842][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 354.596747][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 354.605297][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 354.614569][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 354.622787][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 354.631193][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 354.639692][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 354.647840][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 354.674691][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 354.683136][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 354.691548][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 354.700407][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 354.711073][T19089] device veth0_vlan entered promiscuous mode [ 354.742624][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 354.753001][T19089] device veth1_macvtap entered promiscuous mode [ 354.785047][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 354.807756][ T4649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 2024/06/23 23:58:54 SYZFATAL: executor 3 failed 11 times: executor 3: exit status 67 err exit status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 exit status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 exit status 67 [ 354.877303][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 354.928848][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready