last executing test programs: 13.112637168s ago: executing program 3 (id=4924): socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2000000000000004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0xffaa, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f280d", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000003c0)=r1, 0x4) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0xffffffff}, 0x48) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x20000190) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) 10.76094054s ago: executing program 3 (id=4924): socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2000000000000004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0xffaa, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f280d", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000003c0)=r1, 0x4) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0xffffffff}, 0x48) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x20000190) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) 8.538594172s ago: executing program 3 (id=4924): socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2000000000000004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0xffaa, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f280d", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000003c0)=r1, 0x4) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0xffffffff}, 0x48) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x20000190) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) 6.254578569s ago: executing program 3 (id=4924): socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2000000000000004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0xffaa, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f280d", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000003c0)=r1, 0x4) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0xffffffff}, 0x48) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x20000190) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) 3.452836998s ago: executing program 3 (id=4924): socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2000000000000004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0xffaa, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f280d", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000003c0)=r1, 0x4) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0xffffffff}, 0x48) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x20000190) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) 1.759192187s ago: executing program 0 (id=5168): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0, 0xffffffffffffffff}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0], 0x0, 0x8a, &(0x7f0000000340)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0xed, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x0, 0x8, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0xf}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xffffffffffffffff}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}, @alu={0xb, 0x1, 0x7, 0x2, 0x6, 0x0, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x8}], &(0x7f0000000200)='GPL\x00', 0x8001, 0x0, 0x0, 0x41000, 0x23, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0x7, 0x4, 0x400}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000640)=[r2, r0, r0, r2, r2], &(0x7f0000000680)=[{0x1, 0x1, 0x8}, {0x5, 0x4, 0x4, 0xa3c7b782c6880cc1}, {0x10, 0x3, 0xa, 0xc}, {0x5, 0x5, 0xb, 0x8}, {0x4, 0x4, 0xd, 0x4}], 0x10, 0xfffffffc}, 0x90) recvmsg$unix(r3, &(0x7f00000038c0)={0x0, 0x0, 0x0}, 0x1) recvmsg$unix(r3, &(0x7f0000000bc0)={0x0, 0x0, 0x0}, 0x0) 1.702538552s ago: executing program 4 (id=5170): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r3}, &(0x7f0000000340), &(0x7f0000000380)=r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x4, 0x4, 0x4, 0xbf25}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x81}, 0x48) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xe) 1.498240788s ago: executing program 4 (id=5173): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x7}, 0x48) socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2000000000000004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0xffaa, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f280d", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000003c0)=r0, 0x4) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0xffffffff}, 0x48) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x20000190) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r5) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) 1.386338087s ago: executing program 1 (id=5174): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x1, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8000000000000000, 0x0, 0x1, 0x0, 0xfffffd, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100000000000001a23250456bf963efd6020000004a69ba7c2f00000000000000000000000040"], 0x0, 0x49}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)=0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="850000002200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x17, 0x80000000, 0x5, 0x3, 0x0, r0, 0x6, '\x00', 0x0, r0, 0x0, 0x2, 0x2}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r2, &(0x7f00000000c0)='P', &(0x7f0000000000)=""/8, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r2, &(0x7f0000000100), &(0x7f0000000000)=""/8, 0x2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000500)=ANY=[@ANYBLOB="18040000000000000000000000400000850000000800000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000240)='syzkaller\x00', 0x2db3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x90) perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2000004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x7}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x200000000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1.379232747s ago: executing program 4 (id=5175): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a8500000005000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x4, 0xf1, 0x5}, 0x48) close(r2) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x7, 0x1000}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000020000000100000000000001e5ff0000200700000000000001000084060000000000000001"], 0x0, 0x42}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000c2000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_type(r1, &(0x7f00000002c0), 0x9) (async) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='kvm_unmap_hva_range\x00'}, 0x10) (async) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x501000, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000004000000bb7f1b00d600feff0000000a9500000000000001"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 1.295075225s ago: executing program 4 (id=5176): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x7}, 0x48) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2000000000000004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0xffaa, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f280d", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000003c0)=r1, 0x4) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0xffffffff}, 0x48) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x20000190) socketpair(0x1e, 0x80005, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) 1.294474614s ago: executing program 4 (id=5177): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008180000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x1, 0x8008}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0), 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = openat$tun(0xffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000002280)={'pim6reg0\x00', 0x2102}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'wlan1\x00', 0x400}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x61}]}) r1 = openat$tun(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000002280)={'pim6reg0\x00', 0x2102}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0xf, &(0x7f0000000000), 0x4) 1.246198568s ago: executing program 1 (id=5178): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000001000000000000000b710000000071120700000000009500000000000000", @ANYRES32=r0, @ANYRES32=r1, @ANYRESDEC=r0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x50, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0xb, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0xf72}, 0x1c004, 0x0, 0x0, 0x7, 0xfffffffffffffffe, 0x3, 0x0, 0x0, 0x10000}, 0x0, 0xf, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @perf_config_ext, 0x100404, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xbd, &(0x7f000000cf3d)=""/189, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{r3, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f00000002c0)='%pB \x00'}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001800)=@base={0x19, 0x6, 0x7, 0x0, 0x611, 0xffffffffffffffff, 0x3, '\x00', r5, 0xffffffffffffffff, 0x4}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@bloom_filter={0x1e, 0x3153, 0xffffff2f, 0x6, 0x3105, r4, 0x3ff, '\x00', r5, 0xffffffffffffffff, 0x1, 0x5, 0x2, 0xe}, 0x48) mkdir(0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x5, 0x5, 0x9fd, 0x84, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r6}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x10001, 0x7, 0x1, 0x108, r4, 0x7, '\x00', r5, r3, 0x0, 0x3, 0x1, 0xf}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r6, 0x58, &(0x7f00000005c0)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='rcu_utilization\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.245886648s ago: executing program 3 (id=4924): socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2000000000000004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0xffaa, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f280d", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000003c0)=r1, 0x4) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0xffffffff}, 0x48) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x20000190) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) 1.079179112s ago: executing program 2 (id=5179): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020100008500000043000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x2, 0x8, 0xd0eb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) 1.078701272s ago: executing program 4 (id=5180): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x2b, 0x0, 0x2, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xe13623878b97f0fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r2) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000d40)={0x0, 0x7000000, &(0x7f00000023c0)=[{&(0x7f0000000b40)='?', 0x1}, {0x0, 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x20001) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) close(r0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x76}, 0x8) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x19, 0x12, 0x8, 0x0, 0x0, 0x0, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x8, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0xa, 0x2, 0x8, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r7}, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r7, &(0x7f00000003c0)="a8", &(0x7f0000000200)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="85000000a0000000350000000000000085000000070000009500000000000000b5e00b0ebefac2325cd01fd071effbba4275f6c3a98095b65a658ca5a63dcf0683e9769c9f0e6cac6f86a0389488370939ef4d6fcc6c5e6fd667ad19733af656382665737822f09545d815b3ea00700d3232851ee9da7de1df478fdd66ab3bbcec087ffbf9c84c734807ef73b796eb8fbcaa"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153}, 0x15) 1.034579405s ago: executing program 2 (id=5181): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)={0x1, 0x0, [0x0]}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000026c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='mm_page_alloc\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x14, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000077cb0000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) sendmsg(r2, &(0x7f0000003480)={0x0, 0x0, 0x0, 0x3a0, &(0x7f0000001300)=ANY=[@ANYBLOB="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"/8200], 0x2008}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00'}) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x100, 0x0) ioctl$TUNSETOFFLOAD(r8, 0x400454d0, 0x11) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r6}, &(0x7f0000000340), &(0x7f0000000380)=r6}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x10}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r5, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f00000008c0)=[0x0], &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xcd, &(0x7f0000000940)=[{}], 0x8, 0x10, &(0x7f0000000980), &(0x7f00000009c0), 0x8, 0x7e, 0x8, 0x8, &(0x7f0000000a00)}}, 0x10) write$cgroup_freezer_state(r6, &(0x7f0000000080)='FROZEN\x00', 0x7) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x15, 0x3, &(0x7f0000000480)=@raw=[@jmp={0x5, 0x0, 0xa, 0x4, 0x7}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x5}], 0x0, 0x11, 0xdf, &(0x7f0000000680)=""/223, 0x40f00, 0x64, '\x00', 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x4, 0xa9f8, 0x2}, 0x10, r9, r1, 0x5, 0x0, &(0x7f0000000c80)=[{0x1, 0x4, 0x6, 0xc}, {0x0, 0x1, 0x7}, {0x0, 0x3, 0x10, 0x3}, {0x3, 0x5, 0x10, 0x9}, {0x2, 0x2, 0xa, 0xb}], 0x10, 0x6}, 0x90) ioctl$TUNSETLINK(r7, 0x8905, 0x2000fcc6) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x20000, &(0x7f00000001c0)="099c841db4d00c240191b9706fdb11ec55393b8e00b005d2ea89617b88f6d18965ef4d228ad72d5ce01a9d4a97a047cd9dc9487e16dccb2fc0138c6e0cf01cd66a675f1982d4f2aeaa6bb5f4c098dfba008ba78cd0cd28f4eaf3abfa86388709679009c1671475b44adbb2b424486998e6c64a3ae0c690dbb1e2789e65ffef6c3a769242bcdb281e0028faa3dacc37def846809ad56271e5", 0x98, &(0x7f0000000040), &(0x7f0000000280), &(0x7f00000005c0)="2c03cf9fd6813b9654149030c8e900c52028977f27fdca9899bf2605f3f3813acea20de9be0456dea1a8351a78e29d591da142d1d3416be3faa3ab8c228a3c885d1b6373138c51c376043ae603318458d352837217ed48dcdc34ec22562d45d5880b171af98f60246ebdf6f25308fdfe4a8a57040480eead5d9ab3add9ab45997c037caf0c61137c52dbdc4e69adadd80d68f47ad3a2a28e9551") 891.134058ms ago: executing program 0 (id=5182): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x6, 0x0, 0x0, 0x1}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001b80)={{r2}, &(0x7f0000001b00), &(0x7f0000001b40)=r3}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r0, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x9, 0x0}, 0x8) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x10, 0x4, &(0x7f0000000080)=@raw=[@ldst={0x0, 0x0, 0x4, 0x0, 0x6, 0x8, 0x8}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}], &(0x7f00000000c0)='syzkaller\x00', 0x1000, 0xbc, &(0x7f0000000100)=""/188, 0x40f00, 0x9, '\x00', r6, 0x1a, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000400)={0x4, 0xb, 0x0, 0x8}, 0x10, r8, r9, 0x6, &(0x7f00000004c0)=[r0, r0, r0], &(0x7f0000000500)=[{0x5, 0x1, 0x6, 0x3}, {0x1, 0x2, 0xb, 0xb}, {0x0, 0x4, 0x1, 0x2}, {0x1, 0x2, 0x8, 0xc}, {0x5, 0x1, 0xb, 0x5}, {0x1, 0x3, 0x8, 0x2}], 0x10, 0x6}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), 0x0}, 0x38) socketpair$tipc(0x1e, 0x4, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r10, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a5cfd55", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 861.60816ms ago: executing program 1 (id=5183): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r3}, &(0x7f0000000340), &(0x7f0000000380)=r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x4, 0x4, 0x4, 0xbf25}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x81}, 0x48) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xe) 805.528424ms ago: executing program 0 (id=5184): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x0, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001300000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000300)="87fb74cf4d67adbbd062637f514c1f5eb18d7b442e6457a356c6cb1f71a43dfae773c8489cce5145f92615d4bdb13ef54d6ae90ec7733180fcf5adf3e13fdb05b57b748bd14eda042a97fdd84498304a504a0a159b972e8200c2d0f536a3465ec498ed12b924bd134057df36129d3ebe3dd3ce9f0671e5278143e4afa3d43f444681de1b5f9725fca34fa357fe2154981666fb9dc202fc17a0199eb1c25bdd1005e590e84783ee9894c888998dc25a83c14aeee31d114acfa0bcd235d571", 0xbe}], 0x1}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd6372ce22667f2c00db"], 0xfdef) 655.514087ms ago: executing program 2 (id=5185): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008180000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0xf4240, 0xf, &(0x7f0000000000), 0x4) 598.394862ms ago: executing program 1 (id=5186): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x7}, 0x48) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0xffaa, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f280d", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000003c0)=r1, 0x4) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0xffffffff}, 0x48) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x20000190) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) 536.421637ms ago: executing program 2 (id=5187): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x7}, 0x48) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2000000000000004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0xffaa, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f280d", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000003c0)=r1, 0x4) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0xffffffff}, 0x48) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x20000190) socketpair(0x1e, 0x80005, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) 475.282811ms ago: executing program 0 (id=5188): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x1, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8000000000000000, 0x0, 0x1, 0x0, 0xfffffd, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100000000000001a23250456bf963efd6020000004a69ba7c2f00000000000000000000000040"], 0x0, 0x49}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)=0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="850000002200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x17, 0x80000000, 0x5, 0x3, 0x0, r0, 0x6, '\x00', 0x0, r0, 0x0, 0x2, 0x2}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r2, &(0x7f00000000c0)='P', &(0x7f0000000000)=""/8, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r2, &(0x7f0000000100), &(0x7f0000000000)=""/8, 0x2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000500)=ANY=[@ANYBLOB="18040000000000000000000000400000850000000800000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000240)='syzkaller\x00', 0x2db3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x90) perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2000004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x7}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x200000000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 474.826952ms ago: executing program 1 (id=5189): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a1, &(0x7f0000000080)) 419.751476ms ago: executing program 2 (id=5190): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r3, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x14}, 0x20) 326.339324ms ago: executing program 0 (id=5191): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020100008500000043000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x2, 0x8, 0xd0eb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) 326.001574ms ago: executing program 2 (id=5192): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0, 0xffffffffffffffff}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0], 0x0, 0x8a, &(0x7f0000000340)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0xed, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x0, 0x8, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0xf}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xffffffffffffffff}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}, @alu={0xb, 0x1, 0x7, 0x2, 0x6, 0x0, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x8}], &(0x7f0000000200)='GPL\x00', 0x8001, 0x0, 0x0, 0x41000, 0x23, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0x7, 0x4, 0x400}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000640)=[r2, r0, r0, r2, r2], &(0x7f0000000680)=[{0x1, 0x1, 0x8}, {0x5, 0x4, 0x4, 0xa3c7b782c6880cc1}, {0x10, 0x3, 0xa, 0xc}, {0x5, 0x5, 0xb, 0x8}, {0x4, 0x4, 0xd, 0x4}], 0x10, 0xfffffffc}, 0x90) recvmsg$unix(r3, &(0x7f00000038c0)={0x0, 0x0, 0x0}, 0x1) recvmsg$unix(r3, &(0x7f0000000bc0)={0x0, 0x0, 0x0}, 0x0) 321.404824ms ago: executing program 0 (id=5193): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000107000000000000000026001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000040)="1d14ddd5de739ecce8546e1c923372d2d9a8a900132c2b0f665bf62ee7"}, 0x20) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0xe, 0x4, 0x4, 0x20002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x10}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 1 (id=5194): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@typedef={0x3}, @restrict={0x0, 0x0, 0x0, 0x2, 0x3}, @func_proto={0x0, 0x0, 0x0, 0x9, 0x3}]}, {0x0, [0x0, 0x0, 0x2e]}}, 0x0, 0x41}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="b40200000200000061114c0000000000850000001c0000009500117455c82e79886f000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x6d}, 0x30) kernel console output (not intermixed with test programs): 13223] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 564.819283][T13223] CPU: 1 PID: 13223 Comm: syz.2.4801 Not tainted 5.15.150-syzkaller-00330-g9044d25b8ff5 #0 [ 564.829069][T13223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 564.838963][T13223] Call Trace: [ 564.842084][T13223] [ 564.844862][T13223] dump_stack_lvl+0x151/0x1b7 [ 564.849464][T13223] ? io_uring_drop_tctx_refs+0x190/0x190 [ 564.854930][T13223] dump_stack+0x15/0x17 [ 564.858932][T13223] should_fail+0x3c6/0x510 [ 564.863176][T13223] should_fail_alloc_page+0x5a/0x80 [ 564.868211][T13223] prepare_alloc_pages+0x15c/0x700 [ 564.873161][T13223] ? __alloc_pages_bulk+0xe40/0xe40 [ 564.878192][T13223] ? do_syscall_64+0x3d/0xb0 [ 564.882615][T13223] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 564.888529][T13223] __alloc_pages+0x18c/0x8f0 [ 564.892947][T13223] ? prep_new_page+0x110/0x110 [ 564.897551][T13223] kmalloc_order+0x4a/0x160 [ 564.901889][T13223] kmalloc_order_trace+0x1a/0xb0 [ 564.906661][T13223] __kmalloc+0x19c/0x270 [ 564.910742][T13223] trie_get_next_key+0x258/0x6d0 [ 564.915513][T13223] ? vm_mmap+0xb0/0xb0 [ 564.919420][T13223] ? _copy_from_user+0x96/0xd0 [ 564.924017][T13223] map_get_next_key+0x305/0x4e0 [ 564.928709][T13223] __sys_bpf+0x389/0x760 [ 564.932786][T13223] ? fput_many+0x160/0x1b0 [ 564.937036][T13223] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 564.942246][T13223] ? debug_smp_processor_id+0x17/0x20 [ 564.947452][T13223] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 564.953355][T13223] __x64_sys_bpf+0x7c/0x90 [ 564.957609][T13223] do_syscall_64+0x3d/0xb0 [ 564.961859][T13223] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 564.967590][T13223] RIP: 0033:0x7fd9e21e5bd9 [ 564.971842][T13223] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 564.991285][T13223] RSP: 002b:00007fd9e1467048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 564.999527][T13223] RAX: ffffffffffffffda RBX: 00007fd9e2373f60 RCX: 00007fd9e21e5bd9 [ 565.007338][T13223] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000004 [ 565.015150][T13223] RBP: 00007fd9e14670a0 R08: 0000000000000000 R09: 0000000000000000 [ 565.022961][T13223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 565.030773][T13223] R13: 000000000000000b R14: 00007fd9e2373f60 R15: 00007ffc576c8ee8 [ 565.038592][T13223] [ 565.059391][T13218] device syzkaller0 entered promiscuous mode [ 565.450627][ T30] audit: type=1400 audit(1720102361.655:140): avc: denied { append } for pid=13251 comm="syz.0.4813" name="ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 565.660036][T13273] device syzkaller0 entered promiscuous mode [ 565.990449][ T30] audit: type=1400 audit(1720102362.195:141): avc: denied { create } for pid=13300 comm="syz.3.4831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 566.348586][T13309] Â: renamed from pim6reg1 [ 566.440444][T13310] device syzkaller0 entered promiscuous mode [ 566.540145][T13321] FAULT_INJECTION: forcing a failure. [ 566.540145][T13321] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 566.553027][T13321] CPU: 0 PID: 13321 Comm: syz.3.4838 Not tainted 5.15.150-syzkaller-00330-g9044d25b8ff5 #0 [ 566.562795][T13321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 566.572689][T13321] Call Trace: [ 566.575816][T13321] [ 566.578595][T13321] dump_stack_lvl+0x151/0x1b7 [ 566.583105][T13321] ? io_uring_drop_tctx_refs+0x190/0x190 [ 566.588574][T13321] ? kmem_cache_free+0x116/0x2e0 [ 566.593349][T13321] ? kasan_set_track+0x5d/0x70 [ 566.597954][T13321] ? kasan_set_free_info+0x23/0x40 [ 566.602896][T13321] ? ____kasan_slab_free+0x126/0x160 [ 566.608016][T13321] ? __kasan_slab_free+0x11/0x20 [ 566.612790][T13321] ? kmem_cache_free+0x116/0x2e0 [ 566.617564][T13321] ? kfree_skbmem+0x104/0x170 [ 566.622075][T13321] dump_stack+0x15/0x17 [ 566.626065][T13321] should_fail+0x3c6/0x510 [ 566.630322][T13321] should_fail_usercopy+0x1a/0x20 [ 566.635180][T13321] strncpy_from_user+0x24/0x2d0 [ 566.639875][T13321] strncpy_from_user_nofault+0x73/0x150 [ 566.645251][T13321] bpf_probe_read_compat_str+0xec/0x180 [ 566.650632][T13321] bpf_prog_e42f6260c1b72fb3+0x35/0xba8 [ 566.656012][T13321] bpf_trace_run3+0x11e/0x250 [ 566.660523][T13321] ? bpf_trace_run2+0x210/0x210 [ 566.665213][T13321] ? kfree_skbmem+0x104/0x170 [ 566.669724][T13321] ? ____kasan_slab_free+0x131/0x160 [ 566.674845][T13321] ? kfree_skbmem+0x104/0x170 [ 566.679358][T13321] ? kfree_skbmem+0x104/0x170 [ 566.683871][T13321] __bpf_trace_kmem_cache_free+0x99/0xc0 [ 566.689341][T13321] kmem_cache_free+0x2c3/0x2e0 [ 566.693942][T13321] kfree_skbmem+0x104/0x170 [ 566.698280][T13321] consume_skb+0xb4/0x250 [ 566.702446][T13321] netlink_broadcast_filtered+0x10f4/0x1220 [ 566.708172][T13321] ? nla_put+0x13a/0x1f0 [ 566.712256][T13321] nlmsg_notify+0x101/0x1c0 [ 566.716591][T13321] rtnl_notify+0x9c/0xd0 [ 566.720670][T13321] fdb_notify+0xcb/0x120 [ 566.724752][T13321] fdb_delete+0x83c/0xac0 [ 566.728918][T13321] fdb_delete_local+0x3d1/0x470 [ 566.733604][T13321] br_fdb_changeaddr+0x1bb/0x1c0 [ 566.738381][T13321] br_device_event+0x3c6/0x7c0 [ 566.742985][T13321] ? br_boolopt_multi_get+0xf0/0xf0 [ 566.748014][T13321] ? packet_notifier+0x8ad/0x8c0 [ 566.752795][T13321] ? ipv6_mc_netdev_event+0xa4/0x480 [ 566.757907][T13321] raw_notifier_call_chain+0x8c/0xf0 [ 566.763035][T13321] dev_set_mac_address+0x325/0x470 [ 566.767979][T13321] ? dev_pre_changeaddr_notify+0x220/0x220 [ 566.773617][T13321] dev_set_mac_address_user+0x31/0x50 [ 566.778825][T13321] dev_ifsioc+0x7ef/0x10c0 [ 566.783078][T13321] ? dev_ioctl+0xe70/0xe70 [ 566.787332][T13321] ? mutex_lock+0x135/0x1e0 [ 566.791669][T13321] ? wait_for_completion_killable_timeout+0x10/0x10 [ 566.798094][T13321] dev_ioctl+0x54d/0xe70 [ 566.802174][T13321] sock_do_ioctl+0x34f/0x5a0 [ 566.806954][T13321] ? sock_show_fdinfo+0xa0/0xa0 [ 566.811721][T13321] ? selinux_file_ioctl+0x3cc/0x540 [ 566.816756][T13321] sock_ioctl+0x455/0x740 [ 566.820923][T13321] ? sock_poll+0x400/0x400 [ 566.825173][T13321] ? __fget_files+0x31e/0x380 [ 566.829688][T13321] ? security_file_ioctl+0x84/0xb0 [ 566.834634][T13321] ? sock_poll+0x400/0x400 [ 566.838885][T13321] __se_sys_ioctl+0x114/0x190 [ 566.843399][T13321] __x64_sys_ioctl+0x7b/0x90 [ 566.847834][T13321] do_syscall_64+0x3d/0xb0 [ 566.852078][T13321] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 566.857807][T13321] RIP: 0033:0x7f886e27cbd9 [ 566.862064][T13321] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 566.881505][T13321] RSP: 002b:00007f886d4fe048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 566.889750][T13321] RAX: ffffffffffffffda RBX: 00007f886e40af60 RCX: 00007f886e27cbd9 [ 566.897558][T13321] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 0000000000000007 [ 566.905371][T13321] RBP: 00007f886d4fe0a0 R08: 0000000000000000 R09: 0000000000000000 [ 566.913181][T13321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 566.920993][T13321] R13: 000000000000000b R14: 00007f886e40af60 R15: 00007ffdf90a2ce8 [ 566.928815][T13321] [ 567.444956][T13359] device syzkaller0 entered promiscuous mode [ 567.580665][T13368] FAULT_INJECTION: forcing a failure. [ 567.580665][T13368] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 567.688920][T13368] CPU: 0 PID: 13368 Comm: syz.1.4856 Not tainted 5.15.150-syzkaller-00330-g9044d25b8ff5 #0 [ 567.698815][T13368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 567.708709][T13368] Call Trace: [ 567.711831][T13368] [ 567.714608][T13368] dump_stack_lvl+0x151/0x1b7 [ 567.719122][T13368] ? io_uring_drop_tctx_refs+0x190/0x190 [ 567.724588][T13368] ? __kmalloc+0x13a/0x270 [ 567.728840][T13368] ? kvmalloc_node+0x1f0/0x4d0 [ 567.733442][T13368] dump_stack+0x15/0x17 [ 567.737436][T13368] should_fail+0x3c6/0x510 [ 567.741692][T13368] should_fail_usercopy+0x1a/0x20 [ 567.746548][T13368] _copy_from_user+0x20/0xd0 [ 567.750974][T13368] map_update_elem+0x5b3/0x770 [ 567.755575][T13368] __sys_bpf+0x405/0x760 [ 567.759662][T13368] ? fput_many+0x160/0x1b0 [ 567.763906][T13368] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 567.769258][T13368] ? debug_smp_processor_id+0x17/0x20 [ 567.774451][T13368] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 567.780353][T13368] __x64_sys_bpf+0x7c/0x90 [ 567.784604][T13368] do_syscall_64+0x3d/0xb0 [ 567.788863][T13368] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 567.794585][T13368] RIP: 0033:0x7fe9fe2e9bd9 [ 567.798839][T13368] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 567.818280][T13368] RSP: 002b:00007fe9fd56b048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 567.826523][T13368] RAX: ffffffffffffffda RBX: 00007fe9fe477f60 RCX: 00007fe9fe2e9bd9 [ 567.834334][T13368] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000002 [ 567.842148][T13368] RBP: 00007fe9fd56b0a0 R08: 0000000000000000 R09: 0000000000000000 [ 567.849957][T13368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 567.857770][T13368] R13: 000000000000000b R14: 00007fe9fe477f60 R15: 00007ffc91644a38 [ 567.865587][T13368] [ 568.050830][T13380] FAULT_INJECTION: forcing a failure. [ 568.050830][T13380] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 568.074607][T13380] CPU: 0 PID: 13380 Comm: syz.2.4863 Not tainted 5.15.150-syzkaller-00330-g9044d25b8ff5 #0 [ 568.084416][T13380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 568.094309][T13380] Call Trace: [ 568.097438][T13380] [ 568.100210][T13380] dump_stack_lvl+0x151/0x1b7 [ 568.104724][T13380] ? io_uring_drop_tctx_refs+0x190/0x190 [ 568.110192][T13380] ? vsnprintf+0x1b96/0x1c70 [ 568.114619][T13380] dump_stack+0x15/0x17 [ 568.118610][T13380] should_fail+0x3c6/0x510 [ 568.122863][T13380] should_fail_usercopy+0x1a/0x20 [ 568.127723][T13380] _copy_to_user+0x20/0x90 [ 568.131976][T13380] bpf_verifier_vlog+0x1ab/0x330 [ 568.136749][T13380] __btf_verifier_log+0xd1/0x120 [ 568.141523][T13380] ? bpf_verifier_vlog+0x1b8/0x330 [ 568.146471][T13380] ? btf_check_sec_info+0x4f0/0x4f0 [ 568.151506][T13380] ? kvmalloc_node+0x281/0x4d0 [ 568.156105][T13380] ? memcpy+0x56/0x70 [ 568.159923][T13380] btf_parse_hdr+0x3a7/0x7c0 [ 568.164350][T13380] btf_new_fd+0x3fb/0x910 [ 568.168519][T13380] bpf_btf_load+0x6f/0x90 [ 568.172685][T13380] __sys_bpf+0x50e/0x760 [ 568.176761][T13380] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 568.181967][T13380] ? bpf_trace_run2+0xf1/0x210 [ 568.186572][T13380] ? __bpf_trace_sys_enter+0x62/0x70 [ 568.191689][T13380] __x64_sys_bpf+0x7c/0x90 [ 568.195943][T13380] do_syscall_64+0x3d/0xb0 [ 568.200197][T13380] ? sysvec_call_function_single+0x52/0xb0 [ 568.205836][T13380] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 568.211566][T13380] RIP: 0033:0x7fd9e21e5bd9 [ 568.215820][T13380] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 568.235260][T13380] RSP: 002b:00007fd9e1467048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 568.243505][T13380] RAX: ffffffffffffffda RBX: 00007fd9e2373f60 RCX: 00007fd9e21e5bd9 [ 568.251318][T13380] RDX: 0000000000000020 RSI: 00000000200007c0 RDI: 0000000000000012 [ 568.259128][T13380] RBP: 00007fd9e14670a0 R08: 0000000000000000 R09: 0000000000000000 [ 568.266938][T13380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 568.274752][T13380] R13: 000000000000000b R14: 00007fd9e2373f60 R15: 00007ffc576c8ee8 [ 568.282569][T13380] [ 568.450268][T13403] device syzkaller0 entered promiscuous mode [ 568.489916][T13405] device syzkaller0 entered promiscuous mode [ 568.676281][T13422] device vxcan1 entered promiscuous mode [ 568.704664][T13426] FAULT_INJECTION: forcing a failure. [ 568.704664][T13426] name failslab, interval 1, probability 0, space 0, times 0 [ 568.717124][T13426] CPU: 0 PID: 13426 Comm: syz.1.4878 Not tainted 5.15.150-syzkaller-00330-g9044d25b8ff5 #0 [ 568.726887][T13426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 568.736779][T13426] Call Trace: [ 568.739901][T13426] [ 568.742679][T13426] dump_stack_lvl+0x151/0x1b7 [ 568.747193][T13426] ? io_uring_drop_tctx_refs+0x190/0x190 [ 568.752664][T13426] dump_stack+0x15/0x17 [ 568.756654][T13426] should_fail+0x3c6/0x510 [ 568.760906][T13426] __should_failslab+0xa4/0xe0 [ 568.765507][T13426] ? dst_alloc+0x164/0x1e0 [ 568.769759][T13426] should_failslab+0x9/0x20 [ 568.774112][T13426] slab_pre_alloc_hook+0x37/0xd0 [ 568.778875][T13426] ? dst_alloc+0x164/0x1e0 [ 568.783138][T13426] kmem_cache_alloc+0x44/0x200 [ 568.787725][T13426] dst_alloc+0x164/0x1e0 [ 568.791808][T13426] ip_route_output_key_hash_rcu+0x129a/0x20b0 [ 568.797710][T13426] ip_route_output_flow+0x144/0x310 [ 568.802748][T13426] ? ipv4_sk_update_pmtu+0x1e00/0x1e00 [ 568.808038][T13426] ip_tunnel_xmit+0xa68/0x2780 [ 568.812637][T13426] ? ip_tunnel_xmit+0x181/0x2780 [ 568.817409][T13426] ? __kernel_text_address+0x9b/0x110 [ 568.822621][T13426] ? tnl_update_pmtu+0xba0/0xba0 [ 568.827390][T13426] ? skb_push+0x70/0x120 [ 568.831468][T13426] ? skb_network_protocol+0x578/0x770 [ 568.836676][T13426] ? gre_build_header+0x233/0x7a0 [ 568.841539][T13426] ipgre_xmit+0x87a/0xc30 [ 568.845705][T13426] dev_hard_start_xmit+0x228/0x620 [ 568.850655][T13426] __dev_queue_xmit+0x18b4/0x2e70 [ 568.855516][T13426] ? dev_queue_xmit+0x20/0x20 [ 568.860024][T13426] ? __kasan_check_write+0x14/0x20 [ 568.864973][T13426] ? skb_release_data+0x1c3/0xa80 [ 568.869839][T13426] ? __kasan_check_write+0x14/0x20 [ 568.874778][T13426] ? pskb_expand_head+0xc8f/0x1240 [ 568.879728][T13426] dev_queue_xmit+0x17/0x20 [ 568.884064][T13426] __bpf_redirect+0x690/0xe60 [ 568.888584][T13426] bpf_clone_redirect+0x24d/0x390 [ 568.893445][T13426] bpf_prog_e2f29814702bf05a+0x56/0x9a0 [ 568.898823][T13426] ? trace_event_raw_event_sys_enter+0x70/0x130 [ 568.904896][T13426] ? __stack_depot_save+0x34/0x470 [ 568.909846][T13426] ? __kasan_slab_alloc+0xc3/0xe0 [ 568.914705][T13426] ? __kasan_slab_alloc+0xb1/0xe0 [ 568.919567][T13426] ? slab_post_alloc_hook+0x53/0x2c0 [ 568.924687][T13426] ? kmem_cache_alloc+0xf5/0x200 [ 568.929460][T13426] ? __build_skb+0x2a/0x300 [ 568.933797][T13426] ? build_skb+0x25/0x1f0 [ 568.937963][T13426] ? bpf_prog_test_run_skb+0x38e/0x1420 [ 568.943360][T13426] ? bpf_prog_test_run+0x3b0/0x630 [ 568.948292][T13426] ? __sys_bpf+0x525/0x760 [ 568.952543][T13426] ? __x64_sys_bpf+0x7c/0x90 [ 568.956973][T13426] ? do_syscall_64+0x3d/0xb0 [ 568.961398][T13426] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 568.967305][T13426] ? ktime_get+0x12f/0x160 [ 568.971554][T13426] bpf_test_run+0x478/0xa10 [ 568.975896][T13426] ? convert___skb_to_skb+0x570/0x570 [ 568.981101][T13426] ? eth_type_trans+0x2c6/0x600 [ 568.985789][T13426] ? eth_get_headlen+0x240/0x240 [ 568.990561][T13426] ? bpf_prog_test_run_skb+0x7bd/0x1420 [ 568.995940][T13426] ? convert___skb_to_skb+0x44/0x570 [ 569.001063][T13426] ? memcpy+0x56/0x70 [ 569.004882][T13426] bpf_prog_test_run_skb+0xb41/0x1420 [ 569.010099][T13426] ? __kasan_check_write+0x14/0x20 [ 569.015039][T13426] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 569.020764][T13426] ? __kasan_check_write+0x14/0x20 [ 569.025708][T13426] ? fput_many+0x160/0x1b0 [ 569.029962][T13426] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 569.035689][T13426] bpf_prog_test_run+0x3b0/0x630 [ 569.040465][T13426] ? bpf_prog_query+0x220/0x220 [ 569.045153][T13426] ? selinux_bpf+0xd2/0x100 [ 569.049492][T13426] ? security_bpf+0x82/0xb0 [ 569.053830][T13426] __sys_bpf+0x525/0x760 [ 569.057913][T13426] ? fput_many+0x160/0x1b0 [ 569.062163][T13426] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 569.067374][T13426] ? debug_smp_processor_id+0x17/0x20 [ 569.072578][T13426] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 569.078511][T13426] __x64_sys_bpf+0x7c/0x90 [ 569.082734][T13426] do_syscall_64+0x3d/0xb0 [ 569.086986][T13426] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 569.092886][T13426] RIP: 0033:0x7fe9fe2e9bd9 [ 569.097142][T13426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 569.116583][T13426] RSP: 002b:00007fe9fd56b048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 569.124827][T13426] RAX: ffffffffffffffda RBX: 00007fe9fe477f60 RCX: 00007fe9fe2e9bd9 [ 569.133250][T13426] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 569.141064][T13426] RBP: 00007fe9fd56b0a0 R08: 0000000000000000 R09: 0000000000000000 [ 569.148877][T13426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 569.156681][T13426] R13: 000000000000000b R14: 00007fe9fe477f60 R15: 00007ffc91644a38 [ 569.164497][T13426] [ 569.479636][T13445] device syzkaller0 entered promiscuous mode [ 569.516879][T13452] FAULT_INJECTION: forcing a failure. [ 569.516879][T13452] name failslab, interval 1, probability 0, space 0, times 0 [ 569.532055][T13452] CPU: 0 PID: 13452 Comm: syz.2.4889 Not tainted 5.15.150-syzkaller-00330-g9044d25b8ff5 #0 [ 569.542030][T13452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 569.551921][T13452] Call Trace: [ 569.555043][T13452] [ 569.557824][T13452] dump_stack_lvl+0x151/0x1b7 [ 569.562336][T13452] ? io_uring_drop_tctx_refs+0x190/0x190 [ 569.567803][T13452] ? __kasan_check_write+0x14/0x20 [ 569.572750][T13452] ? wait_for_completion_killable_timeout+0x10/0x10 [ 569.579172][T13452] dump_stack+0x15/0x17 [ 569.583166][T13452] should_fail+0x3c6/0x510 [ 569.587423][T13452] __should_failslab+0xa4/0xe0 [ 569.592019][T13452] ? getname_flags+0xba/0x520 [ 569.596530][T13452] should_failslab+0x9/0x20 [ 569.600872][T13452] slab_pre_alloc_hook+0x37/0xd0 [ 569.605644][T13452] ? getname_flags+0xba/0x520 [ 569.610163][T13452] kmem_cache_alloc+0x44/0x200 [ 569.614758][T13452] getname_flags+0xba/0x520 [ 569.619102][T13452] __x64_sys_unlink+0x3c/0x50 [ 569.623622][T13452] do_syscall_64+0x3d/0xb0 [ 569.627864][T13452] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 569.633595][T13452] RIP: 0033:0x7fd9e21e5bd9 [ 569.637858][T13452] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 569.657287][T13452] RSP: 002b:00007fd9e1467048 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 569.665531][T13452] RAX: ffffffffffffffda RBX: 00007fd9e2373f60 RCX: 00007fd9e21e5bd9 [ 569.673430][T13452] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000200 [ 569.681241][T13452] RBP: 00007fd9e14670a0 R08: 0000000000000000 R09: 0000000000000000 [ 569.689055][T13452] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 569.696864][T13452] R13: 000000000000000b R14: 00007fd9e2373f60 R15: 00007ffc576c8ee8 [ 569.704680][T13452] [ 569.726018][T13460] FAULT_INJECTION: forcing a failure. [ 569.726018][T13460] name failslab, interval 1, probability 0, space 0, times 0 [ 569.738557][T13460] CPU: 1 PID: 13460 Comm: syz.2.4892 Not tainted 5.15.150-syzkaller-00330-g9044d25b8ff5 #0 [ 569.748331][T13460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 569.758217][T13460] Call Trace: [ 569.761348][T13460] [ 569.764124][T13460] dump_stack_lvl+0x151/0x1b7 [ 569.768632][T13460] ? io_uring_drop_tctx_refs+0x190/0x190 [ 569.774100][T13460] ? stack_trace_save+0x1c0/0x1c0 [ 569.778975][T13460] ? __bpf_trace_fib_table_lookup+0x33/0x40 [ 569.784688][T13460] dump_stack+0x15/0x17 [ 569.788680][T13460] should_fail+0x3c6/0x510 [ 569.792936][T13460] __should_failslab+0xa4/0xe0 [ 569.797535][T13460] ? dst_alloc+0x164/0x1e0 [ 569.801790][T13460] should_failslab+0x9/0x20 [ 569.806127][T13460] slab_pre_alloc_hook+0x37/0xd0 [ 569.810901][T13460] ? dst_alloc+0x164/0x1e0 [ 569.815272][T13460] kmem_cache_alloc+0x44/0x200 [ 569.819870][T13460] dst_alloc+0x164/0x1e0 [ 569.823947][T13460] ip_route_output_key_hash_rcu+0x129a/0x20b0 [ 569.829852][T13460] ip_route_output_flow+0x144/0x310 [ 569.834883][T13460] ? ipv4_sk_update_pmtu+0x1e00/0x1e00 [ 569.840179][T13460] ip_tunnel_xmit+0xa68/0x2780 [ 569.844779][T13460] ? ip_tunnel_xmit+0x181/0x2780 [ 569.849554][T13460] ? __kernel_text_address+0x9b/0x110 [ 569.854759][T13460] ? tnl_update_pmtu+0xba0/0xba0 [ 569.859531][T13460] ? skb_push+0x70/0x120 [ 569.863610][T13460] ? skb_network_protocol+0x578/0x770 [ 569.868819][T13460] ? gre_build_header+0x233/0x7a0 [ 569.873683][T13460] ipgre_xmit+0x87a/0xc30 [ 569.877849][T13460] dev_hard_start_xmit+0x228/0x620 [ 569.882795][T13460] __dev_queue_xmit+0x18b4/0x2e70 [ 569.887657][T13460] ? dev_queue_xmit+0x20/0x20 [ 569.892166][T13460] ? __kasan_check_write+0x14/0x20 [ 569.897114][T13460] ? skb_release_data+0x1c3/0xa80 [ 569.901975][T13460] ? __kasan_check_write+0x14/0x20 [ 569.906920][T13460] ? pskb_expand_head+0xc8f/0x1240 [ 569.911870][T13460] dev_queue_xmit+0x17/0x20 [ 569.916209][T13460] __bpf_redirect+0x690/0xe60 [ 569.920721][T13460] bpf_clone_redirect+0x24d/0x390 [ 569.925585][T13460] bpf_prog_e2f29814702bf05a+0x56/0xbdc [ 569.930963][T13460] ? trace_event_raw_event_sys_enter+0x70/0x130 [ 569.937041][T13460] ? __stack_depot_save+0x34/0x470 [ 569.941986][T13460] ? __kasan_slab_alloc+0xc3/0xe0 [ 569.946844][T13460] ? __kasan_slab_alloc+0xb1/0xe0 [ 569.951704][T13460] ? slab_post_alloc_hook+0x53/0x2c0 [ 569.956828][T13460] ? kmem_cache_alloc+0xf5/0x200 [ 569.961600][T13460] ? __build_skb+0x2a/0x300 [ 569.965938][T13460] ? build_skb+0x25/0x1f0 [ 569.970109][T13460] ? bpf_prog_test_run_skb+0x38e/0x1420 [ 569.975487][T13460] ? bpf_prog_test_run+0x3b0/0x630 [ 569.980435][T13460] ? __sys_bpf+0x525/0x760 [ 569.984686][T13460] ? __x64_sys_bpf+0x7c/0x90 [ 569.989113][T13460] ? do_syscall_64+0x3d/0xb0 [ 569.993540][T13460] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 569.999445][T13460] ? ktime_get+0x12f/0x160 [ 570.003698][T13460] bpf_test_run+0x478/0xa10 [ 570.008039][T13460] ? convert___skb_to_skb+0x570/0x570 [ 570.013247][T13460] ? eth_type_trans+0x2c6/0x600 [ 570.017930][T13460] ? eth_get_headlen+0x240/0x240 [ 570.022702][T13460] ? bpf_prog_test_run_skb+0x7bd/0x1420 [ 570.028087][T13460] ? convert___skb_to_skb+0x44/0x570 [ 570.033207][T13460] ? memcpy+0x56/0x70 [ 570.037032][T13460] bpf_prog_test_run_skb+0xb41/0x1420 [ 570.042240][T13460] ? __kasan_check_write+0x14/0x20 [ 570.047182][T13460] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 570.052910][T13460] ? __kasan_check_write+0x14/0x20 [ 570.057853][T13460] ? fput_many+0x160/0x1b0 [ 570.062108][T13460] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 570.067836][T13460] bpf_prog_test_run+0x3b0/0x630 [ 570.072611][T13460] ? bpf_prog_query+0x220/0x220 [ 570.077297][T13460] ? selinux_bpf+0xd2/0x100 [ 570.081635][T13460] ? security_bpf+0x82/0xb0 [ 570.085976][T13460] __sys_bpf+0x525/0x760 [ 570.090054][T13460] ? fput_many+0x160/0x1b0 [ 570.094307][T13460] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 570.099518][T13460] ? debug_smp_processor_id+0x17/0x20 [ 570.104724][T13460] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 570.110625][T13460] __x64_sys_bpf+0x7c/0x90 [ 570.114883][T13460] do_syscall_64+0x3d/0xb0 [ 570.119133][T13460] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 570.124858][T13460] RIP: 0033:0x7fd9e21e5bd9 [ 570.129115][T13460] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 570.148559][T13460] RSP: 002b:00007fd9e1467048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 570.156799][T13460] RAX: ffffffffffffffda RBX: 00007fd9e2373f60 RCX: 00007fd9e21e5bd9 [ 570.164611][T13460] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 570.172423][T13460] RBP: 00007fd9e14670a0 R08: 0000000000000000 R09: 0000000000000000 [ 570.180234][T13460] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 570.188047][T13460] R13: 000000000000000b R14: 00007fd9e2373f60 R15: 00007ffc576c8ee8 [ 570.195860][T13460] [ 570.249256][T13463] device veth0_vlan left promiscuous mode [ 570.436216][T13463] device veth0_vlan entered promiscuous mode [ 570.559941][T13495] FAULT_INJECTION: forcing a failure. [ 570.559941][T13495] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 570.577132][T13495] CPU: 1 PID: 13495 Comm: syz.4.4904 Not tainted 5.15.150-syzkaller-00330-g9044d25b8ff5 #0 [ 570.586934][T13495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 570.596823][T13495] Call Trace: [ 570.599952][T13495] [ 570.602726][T13495] dump_stack_lvl+0x151/0x1b7 [ 570.607238][T13495] ? io_uring_drop_tctx_refs+0x190/0x190 [ 570.612705][T13495] ? ____sys_recvmsg+0x420/0x530 [ 570.617479][T13495] dump_stack+0x15/0x17 [ 570.621471][T13495] should_fail+0x3c6/0x510 [ 570.625725][T13495] should_fail_usercopy+0x1a/0x20 [ 570.630586][T13495] _copy_to_user+0x20/0x90 [ 570.634837][T13495] simple_read_from_buffer+0xc7/0x150 [ 570.640046][T13495] proc_fail_nth_read+0x1a3/0x210 [ 570.644904][T13495] ? proc_fault_inject_write+0x390/0x390 [ 570.650373][T13495] ? fsnotify_perm+0x470/0x5d0 [ 570.654976][T13495] ? security_file_permission+0x86/0xb0 [ 570.660354][T13495] ? proc_fault_inject_write+0x390/0x390 [ 570.665824][T13495] vfs_read+0x27d/0xd40 [ 570.669814][T13495] ? kernel_read+0x1f0/0x1f0 [ 570.674241][T13495] ? __kasan_check_write+0x14/0x20 [ 570.679188][T13495] ? mutex_lock+0xb6/0x1e0 [ 570.683443][T13495] ? wait_for_completion_killable_timeout+0x10/0x10 [ 570.689867][T13495] ? __fdget_pos+0x2e7/0x3a0 [ 570.694290][T13495] ? ksys_read+0x77/0x2c0 [ 570.698457][T13495] ksys_read+0x199/0x2c0 [ 570.702536][T13495] ? ___sys_recvmsg+0x690/0x690 [ 570.707223][T13495] ? vfs_write+0x1110/0x1110 [ 570.711654][T13495] ? debug_smp_processor_id+0x17/0x20 [ 570.716859][T13495] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 570.722761][T13495] __x64_sys_read+0x7b/0x90 [ 570.727100][T13495] do_syscall_64+0x3d/0xb0 [ 570.731350][T13495] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 570.737081][T13495] RIP: 0033:0x7fb128ee86bc [ 570.741335][T13495] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8c 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 1f 8d 02 00 48 [ 570.760775][T13495] RSP: 002b:00007fb12816b040 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 570.769020][T13495] RAX: ffffffffffffffda RBX: 00007fb129077f60 RCX: 00007fb128ee86bc [ 570.776834][T13495] RDX: 000000000000000f RSI: 00007fb12816b0b0 RDI: 0000000000000006 [ 570.784646][T13495] RBP: 00007fb12816b0a0 R08: 0000000000000000 R09: 0000000000000000 [ 570.792454][T13495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 570.800273][T13495] R13: 000000000000000b R14: 00007fb129077f60 R15: 00007fff39264ff8 [ 570.808080][T13495] [ 570.899812][T13502] device syzkaller0 entered promiscuous mode [ 570.919997][T13501] device syzkaller0 entered promiscuous mode [ 571.485434][T13533] device syzkaller0 entered promiscuous mode [ 571.717554][T12968] syz-executor (12968) used greatest stack depth: 20792 bytes left [ 571.929474][T13548] bridge0: port 1(bridge_slave_0) entered blocking state [ 571.958412][T13548] bridge0: port 1(bridge_slave_0) entered disabled state [ 571.965858][T13548] device bridge_slave_0 entered promiscuous mode [ 571.992437][T13548] bridge0: port 2(bridge_slave_1) entered blocking state [ 572.003278][T13548] bridge0: port 2(bridge_slave_1) entered disabled state [ 572.010632][T13548] device bridge_slave_1 entered promiscuous mode [ 572.087764][T13548] bridge0: port 2(bridge_slave_1) entered blocking state [ 572.094644][T13548] bridge0: port 2(bridge_slave_1) entered forwarding state [ 572.101737][T13548] bridge0: port 1(bridge_slave_0) entered blocking state [ 572.108517][T13548] bridge0: port 1(bridge_slave_0) entered forwarding state [ 572.217591][T13572] device syzkaller0 entered promiscuous mode [ 572.237995][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 572.245615][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 572.253215][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 572.314033][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 572.322093][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 572.328934][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 572.336212][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 572.344239][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 572.351081][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 572.361205][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 572.369112][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 572.377084][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 572.384871][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 572.483745][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 572.492185][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 572.504083][T13548] device veth0_vlan entered promiscuous mode [ 572.510874][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 572.518752][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 572.531978][T13548] device veth1_macvtap entered promiscuous mode [ 572.539694][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 572.547683][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 572.554986][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 572.563482][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 572.571678][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 572.586096][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 572.594374][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 572.602729][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 572.610936][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 572.648004][T13586] device syzkaller0 entered promiscuous mode [ 572.736504][T13588] bridge0: port 1(bridge_slave_0) entered blocking state [ 572.743578][T13588] bridge0: port 1(bridge_slave_0) entered disabled state [ 572.751290][T13588] device bridge_slave_0 entered promiscuous mode [ 572.758990][T13588] bridge0: port 2(bridge_slave_1) entered blocking state [ 572.765828][T13588] bridge0: port 2(bridge_slave_1) entered disabled state [ 572.775019][T13588] device bridge_slave_1 entered promiscuous mode [ 573.241756][T13637] syz.0.4946[13637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 573.241823][T13637] syz.0.4946[13637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 573.291888][T13588] bridge0: port 2(bridge_slave_1) entered blocking state [ 573.309947][T13588] bridge0: port 2(bridge_slave_1) entered forwarding state [ 573.317067][T13588] bridge0: port 1(bridge_slave_0) entered blocking state [ 573.323823][T13588] bridge0: port 1(bridge_slave_0) entered forwarding state [ 573.333370][T12155] bridge0: port 1(bridge_slave_0) entered disabled state [ 573.346599][T12155] bridge0: port 2(bridge_slave_1) entered disabled state [ 573.356811][ T30] audit: type=1400 audit(1720102369.555:142): avc: denied { create } for pid=13635 comm="syz.0.4946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 573.466424][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 573.473708][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 573.481846][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 573.497133][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 573.505273][T12155] bridge0: port 1(bridge_slave_0) entered blocking state [ 573.512134][T12155] bridge0: port 1(bridge_slave_0) entered forwarding state [ 573.543531][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 573.599552][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 573.658250][T12155] bridge0: port 2(bridge_slave_1) entered blocking state [ 573.665123][T12155] bridge0: port 2(bridge_slave_1) entered forwarding state [ 574.088036][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 574.101337][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 574.109167][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 574.117066][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 574.140446][T13649] FAULT_INJECTION: forcing a failure. [ 574.140446][T13649] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 574.153737][T13649] CPU: 1 PID: 13649 Comm: syz.0.4950 Not tainted 5.15.150-syzkaller-00330-g9044d25b8ff5 #0 [ 574.163533][T13649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 574.173423][T13649] Call Trace: [ 574.176549][T13649] [ 574.179327][T13649] dump_stack_lvl+0x151/0x1b7 [ 574.183838][T13649] ? io_uring_drop_tctx_refs+0x190/0x190 [ 574.189308][T13649] ? proc_fail_nth_write+0x20b/0x290 [ 574.194430][T13649] ? __mutex_lock_slowpath+0xe/0x10 [ 574.199460][T13649] dump_stack+0x15/0x17 [ 574.203541][T13649] should_fail+0x3c6/0x510 [ 574.207794][T13649] should_fail_usercopy+0x1a/0x20 [ 574.212651][T13649] _copy_from_user+0x20/0xd0 [ 574.217079][T13649] __tun_chr_ioctl+0x1428/0x2290 [ 574.221855][T13649] ? tun_flow_create+0x320/0x320 [ 574.226633][T13649] tun_chr_ioctl+0x2a/0x40 [ 574.230880][T13649] ? tun_chr_poll+0x6d0/0x6d0 [ 574.235392][T13649] __se_sys_ioctl+0x114/0x190 [ 574.239909][T13649] __x64_sys_ioctl+0x7b/0x90 [ 574.244334][T13649] do_syscall_64+0x3d/0xb0 [ 574.248585][T13649] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 574.254313][T13649] RIP: 0033:0x7f3192912bd9 [ 574.258571][T13649] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 574.278008][T13649] RSP: 002b:00007f3191b73048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 574.286254][T13649] RAX: ffffffffffffffda RBX: 00007f3192aa1038 RCX: 00007f3192912bd9 [ 574.294065][T13649] RDX: 00000000200000c0 RSI: 00000000401054d5 RDI: 0000000000000005 [ 574.301878][T13649] RBP: 00007f3191b730a0 R08: 0000000000000000 R09: 0000000000000000 [ 574.309773][T13649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 574.317587][T13649] R13: 000000000000006e R14: 00007f3192aa1038 R15: 00007ffd345e4338 [ 574.325402][T13649] [ 574.356727][T11067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 574.364846][T11067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 574.374095][ T7706] device bridge_slave_1 left promiscuous mode [ 574.380172][ T7706] bridge0: port 2(bridge_slave_1) entered disabled state [ 574.387638][ T7706] device bridge_slave_0 left promiscuous mode [ 574.393587][ T7706] bridge0: port 1(bridge_slave_0) entered disabled state [ 574.401277][ T7706] device veth1_macvtap left promiscuous mode [ 574.512702][T13588] device veth0_vlan entered promiscuous mode [ 574.525846][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 574.534148][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 574.542399][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 574.549884][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 574.563353][T13588] device veth1_macvtap entered promiscuous mode [ 574.588235][T11067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 574.646603][T11067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 574.654613][T11067] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 574.712438][ T30] audit: type=1400 audit(1720102370.895:143): avc: denied { create } for pid=13659 comm="syz.0.4953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 574.745185][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 574.758672][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 574.767132][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 574.775167][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 574.785145][ T30] audit: type=1400 audit(1720102370.915:144): avc: denied { setopt } for pid=13659 comm="syz.0.4953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 574.815004][ T30] audit: type=1400 audit(1720102371.015:145): avc: denied { read } for pid=13666 comm="syz.1.4956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 574.880279][ T30] audit: type=1400 audit(1720102371.065:146): avc: denied { write } for pid=13666 comm="syz.1.4956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 575.051111][T13669] device syzkaller0 entered promiscuous mode [ 575.064998][T13684] syz.2.4961[13684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 575.065058][T13684] syz.2.4961[13684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 575.165182][T13676] bridge0: port 1(bridge_slave_0) entered blocking state [ 575.183286][T13676] bridge0: port 1(bridge_slave_0) entered disabled state [ 575.191022][T13676] device bridge_slave_0 entered promiscuous mode [ 575.207202][T13676] bridge0: port 2(bridge_slave_1) entered blocking state [ 575.214044][T13676] bridge0: port 2(bridge_slave_1) entered disabled state [ 575.239080][T13676] device bridge_slave_1 entered promiscuous mode [ 575.488877][T11067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 575.496616][T11067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 575.517045][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 575.525196][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 575.533308][T12155] bridge0: port 1(bridge_slave_0) entered blocking state [ 575.540177][T12155] bridge0: port 1(bridge_slave_0) entered forwarding state [ 575.634418][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 575.656846][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 575.664869][T12155] bridge0: port 2(bridge_slave_1) entered blocking state [ 575.671734][T12155] bridge0: port 2(bridge_slave_1) entered forwarding state [ 575.682234][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 575.718851][T13711] FAULT_INJECTION: forcing a failure. [ 575.718851][T13711] name failslab, interval 1, probability 0, space 0, times 0 [ 575.720538][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 575.734414][T13711] CPU: 0 PID: 13711 Comm: syz.2.4972 Not tainted 5.15.150-syzkaller-00330-g9044d25b8ff5 #0 [ 575.749540][T13711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 575.759432][T13711] Call Trace: [ 575.762555][T13711] [ 575.765332][T13711] dump_stack_lvl+0x151/0x1b7 [ 575.769848][T13711] ? io_uring_drop_tctx_refs+0x190/0x190 [ 575.775313][T13711] dump_stack+0x15/0x17 [ 575.779304][T13711] should_fail+0x3c6/0x510 [ 575.783558][T13711] __should_failslab+0xa4/0xe0 [ 575.788157][T13711] ? getname_flags+0xba/0x520 [ 575.792670][T13711] should_failslab+0x9/0x20 [ 575.797012][T13711] slab_pre_alloc_hook+0x37/0xd0 [ 575.801785][T13711] ? getname_flags+0xba/0x520 [ 575.806296][T13711] kmem_cache_alloc+0x44/0x200 [ 575.810900][T13711] getname_flags+0xba/0x520 [ 575.815238][T13711] __x64_sys_unlink+0x3c/0x50 [ 575.819751][T13711] do_syscall_64+0x3d/0xb0 [ 575.824002][T13711] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 575.829646][T13711] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 575.835371][T13711] RIP: 0033:0x7fd9e21e5bd9 [ 575.839629][T13711] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 575.859069][T13711] RSP: 002b:00007fd9e1467048 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 575.867311][T13711] RAX: ffffffffffffffda RBX: 00007fd9e2373f60 RCX: 00007fd9e21e5bd9 [ 575.875125][T13711] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000200 [ 575.882943][T13711] RBP: 00007fd9e14670a0 R08: 0000000000000000 R09: 0000000000000000 [ 575.890747][T13711] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 575.898557][T13711] R13: 000000000000000b R14: 00007fd9e2373f60 R15: 00007ffc576c8ee8 [ 575.906382][T13711] [ 575.927105][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 575.935029][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 575.944150][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 576.018678][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 576.087174][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 576.105451][T13676] device veth0_vlan entered promiscuous mode [ 576.151066][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 576.167012][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 576.174309][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 576.227096][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 576.270952][T13676] device veth1_macvtap entered promiscuous mode [ 576.323987][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 576.341262][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 576.426594][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 576.434646][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 576.768513][ T7706] device bridge_slave_1 left promiscuous mode [ 576.774475][ T7706] bridge0: port 2(bridge_slave_1) entered disabled state [ 576.793044][ T7706] device bridge_slave_0 left promiscuous mode [ 576.805563][ T7706] bridge0: port 1(bridge_slave_0) entered disabled state [ 576.820094][ T7706] device bridge_slave_1 left promiscuous mode [ 576.826067][ T7706] bridge0: port 2(bridge_slave_1) entered disabled state [ 576.833410][ T7706] device bridge_slave_0 left promiscuous mode [ 576.839480][ T7706] bridge0: port 1(bridge_slave_0) entered disabled state [ 576.848174][ T7706] device veth1_macvtap left promiscuous mode [ 576.854138][ T7706] device veth0_vlan left promiscuous mode [ 576.859941][ T7706] device veth1_macvtap left promiscuous mode [ 576.865797][ T7706] device veth0_vlan left promiscuous mode [ 577.055980][T13775] FAULT_INJECTION: forcing a failure. [ 577.055980][T13775] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 577.069994][T13775] CPU: 0 PID: 13775 Comm: syz.4.4996 Not tainted 5.15.150-syzkaller-00330-g9044d25b8ff5 #0 [ 577.079793][T13775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 577.089689][T13775] Call Trace: [ 577.092811][T13775] [ 577.095586][T13775] dump_stack_lvl+0x151/0x1b7 [ 577.100101][T13775] ? io_uring_drop_tctx_refs+0x190/0x190 [ 577.105570][T13775] dump_stack+0x15/0x17 [ 577.109560][T13775] should_fail+0x3c6/0x510 [ 577.113813][T13775] should_fail_usercopy+0x1a/0x20 [ 577.118673][T13775] _copy_from_user+0x20/0xd0 [ 577.123100][T13775] ___sys_recvmsg+0x150/0x690 [ 577.127615][T13775] ? __sys_recvmsg+0x260/0x260 [ 577.132214][T13775] ? vfs_write+0x9ec/0x1110 [ 577.136559][T13775] ? __fdget+0x1bc/0x240 [ 577.140634][T13775] __x64_sys_recvmsg+0x1dc/0x2b0 [ 577.145405][T13775] ? fput+0x1a/0x20 [ 577.149051][T13775] ? ___sys_recvmsg+0x690/0x690 [ 577.153745][T13775] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 577.159640][T13775] ? exit_to_user_mode_prepare+0x39/0xa0 [ 577.165108][T13775] do_syscall_64+0x3d/0xb0 [ 577.169361][T13775] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 577.175089][T13775] RIP: 0033:0x7fb128ee9bd9 [ 577.179344][T13775] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 577.198783][T13775] RSP: 002b:00007fb12816b048 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 577.207029][T13775] RAX: ffffffffffffffda RBX: 00007fb129077f60 RCX: 00007fb128ee9bd9 [ 577.214841][T13775] RDX: 0000000000000000 RSI: 0000000020000bc0 RDI: 0000000000000004 [ 577.222653][T13775] RBP: 00007fb12816b0a0 R08: 0000000000000000 R09: 0000000000000000 [ 577.230463][T13775] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 577.238275][T13775] R13: 000000000000000b R14: 00007fb129077f60 R15: 00007fff39264ff8 [ 577.246090][T13775] [ 577.298947][T13776] bridge0: port 1(bridge_slave_0) entered blocking state [ 577.305867][T13776] bridge0: port 1(bridge_slave_0) entered disabled state [ 577.313396][T13776] device bridge_slave_0 entered promiscuous mode [ 577.320389][T13776] bridge0: port 2(bridge_slave_1) entered blocking state [ 577.332897][T13776] bridge0: port 2(bridge_slave_1) entered disabled state [ 577.381356][T13776] device bridge_slave_1 entered promiscuous mode [ 577.665895][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 577.673362][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 577.699438][T11067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 577.714579][T11067] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 577.735122][T11067] bridge0: port 1(bridge_slave_0) entered blocking state [ 577.742010][T11067] bridge0: port 1(bridge_slave_0) entered forwarding state [ 577.780853][T11067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 577.791033][T11067] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 577.799152][T11067] bridge0: port 2(bridge_slave_1) entered blocking state [ 577.806007][T11067] bridge0: port 2(bridge_slave_1) entered forwarding state [ 577.813619][T11067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 577.821679][T11067] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 577.844409][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 577.852162][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 577.860311][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 577.875640][T13776] device veth0_vlan entered promiscuous mode [ 577.894541][T11067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 577.913057][T11067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 577.932228][T11067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 577.943290][T11067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 578.068890][T13776] device veth1_macvtap entered promiscuous mode [ 578.088151][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 578.095432][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 578.213000][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 578.307687][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 578.315709][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 578.361357][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 578.369777][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 578.378984][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 578.667558][T13853] FAULT_INJECTION: forcing a failure. [ 578.667558][T13853] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 578.700891][T13853] CPU: 1 PID: 13853 Comm: syz.1.5020 Not tainted 5.15.150-syzkaller-00330-g9044d25b8ff5 #0 [ 578.710701][T13853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 578.720601][T13853] Call Trace: [ 578.723714][T13853] [ 578.726491][T13853] dump_stack_lvl+0x151/0x1b7 [ 578.731008][T13853] ? io_uring_drop_tctx_refs+0x190/0x190 [ 578.736478][T13853] ? kmem_cache_free+0x116/0x2e0 [ 578.741249][T13853] dump_stack+0x15/0x17 [ 578.745246][T13853] should_fail+0x3c6/0x510 [ 578.749497][T13853] should_fail_usercopy+0x1a/0x20 [ 578.754355][T13853] _copy_from_user+0x20/0xd0 [ 578.758781][T13853] __copy_msghdr_from_user+0xaf/0x7c0 [ 578.763990][T13853] ? __ia32_sys_shutdown+0x70/0x70 [ 578.768937][T13853] ___sys_sendmsg+0x166/0x2e0 [ 578.773450][T13853] ? __sys_sendmsg+0x260/0x260 [ 578.778058][T13853] ? __fdget+0x1bc/0x240 [ 578.782130][T13853] __se_sys_sendmsg+0x19a/0x260 [ 578.786814][T13853] ? __x64_sys_sendmsg+0x90/0x90 [ 578.791587][T13853] ? ksys_write+0x260/0x2c0 [ 578.795929][T13853] ? debug_smp_processor_id+0x17/0x20 [ 578.801135][T13853] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 578.807037][T13853] __x64_sys_sendmsg+0x7b/0x90 [ 578.811635][T13853] do_syscall_64+0x3d/0xb0 [ 578.815888][T13853] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 578.821616][T13853] RIP: 0033:0x7fe9fe2e9bd9 [ 578.825880][T13853] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 578.845311][T13853] RSP: 002b:00007fe9fd56b048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 578.853557][T13853] RAX: ffffffffffffffda RBX: 00007fe9fe477f60 RCX: 00007fe9fe2e9bd9 [ 578.861369][T13853] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 578.869178][T13853] RBP: 00007fe9fd56b0a0 R08: 0000000000000000 R09: 0000000000000000 [ 578.876991][T13853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 578.884802][T13853] R13: 000000000000000b R14: 00007fe9fe477f60 R15: 00007ffc91644a38 [ 578.892618][T13853] [ 578.939430][T13855] bridge0: port 1(bridge_slave_0) entered blocking state [ 578.946915][T13855] bridge0: port 1(bridge_slave_0) entered disabled state [ 578.954149][T13855] device bridge_slave_0 entered promiscuous mode [ 578.962121][T13863] bond_slave_1: mtu greater than device maximum [ 578.979685][T13855] bridge0: port 2(bridge_slave_1) entered blocking state [ 578.986551][T13855] bridge0: port 2(bridge_slave_1) entered disabled state [ 578.993663][T13855] device bridge_slave_1 entered promiscuous mode [ 579.007404][T13854] bridge0: port 1(bridge_slave_0) entered blocking state [ 579.014253][T13854] bridge0: port 1(bridge_slave_0) entered disabled state [ 579.021535][T13854] device bridge_slave_0 entered promiscuous mode [ 579.028306][T13854] bridge0: port 2(bridge_slave_1) entered blocking state [ 579.035180][T13854] bridge0: port 2(bridge_slave_1) entered disabled state [ 579.043568][T13854] device bridge_slave_1 entered promiscuous mode [ 579.129925][T13855] bridge0: port 2(bridge_slave_1) entered blocking state [ 579.136953][T13855] bridge0: port 2(bridge_slave_1) entered forwarding state [ 579.143969][T13855] bridge0: port 1(bridge_slave_0) entered blocking state [ 579.150768][T13855] bridge0: port 1(bridge_slave_0) entered forwarding state [ 579.163490][T13854] bridge0: port 2(bridge_slave_1) entered blocking state [ 579.170396][T13854] bridge0: port 2(bridge_slave_1) entered forwarding state [ 579.177432][T13854] bridge0: port 1(bridge_slave_0) entered blocking state [ 579.184222][T13854] bridge0: port 1(bridge_slave_0) entered forwarding state [ 579.214742][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 579.222714][ T39] bridge0: port 1(bridge_slave_0) entered disabled state [ 579.230056][ T39] bridge0: port 2(bridge_slave_1) entered disabled state [ 579.237157][ T39] bridge0: port 1(bridge_slave_0) entered disabled state [ 579.244163][ T39] bridge0: port 2(bridge_slave_1) entered disabled state [ 579.253556][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 579.264425][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 579.272374][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 579.279218][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 579.295549][T13344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 579.303595][T13344] bridge0: port 1(bridge_slave_0) entered blocking state [ 579.310444][T13344] bridge0: port 1(bridge_slave_0) entered forwarding state [ 579.317595][T13344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 579.325513][T13344] bridge0: port 2(bridge_slave_1) entered blocking state [ 579.332350][T13344] bridge0: port 2(bridge_slave_1) entered forwarding state [ 579.339869][T13344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 579.347662][T13344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 579.364667][T13344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 579.372630][T13344] bridge0: port 2(bridge_slave_1) entered blocking state [ 579.379471][T13344] bridge0: port 2(bridge_slave_1) entered forwarding state [ 579.386858][T13344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 579.395433][ T7706] device bridge_slave_1 left promiscuous mode [ 579.401633][ T7706] bridge0: port 2(bridge_slave_1) entered disabled state [ 579.409048][ T7706] device bridge_slave_0 left promiscuous mode [ 579.415001][ T7706] bridge0: port 1(bridge_slave_0) entered disabled state [ 579.422982][ T7706] device bridge_slave_1 left promiscuous mode [ 579.428947][ T7706] bridge0: port 2(bridge_slave_1) entered disabled state [ 579.436076][ T7706] device bridge_slave_0 left promiscuous mode [ 579.442179][ T7706] bridge0: port 1(bridge_slave_0) entered disabled state [ 579.450083][ T7706] device veth1_macvtap left promiscuous mode [ 579.455880][ T7706] device veth0_vlan left promiscuous mode [ 579.461790][ T7706] device veth1_macvtap left promiscuous mode [ 579.467624][ T7706] device veth0_vlan left promiscuous mode [ 579.646092][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 579.653865][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 579.665331][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 579.673368][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 579.681884][T13875] device syzkaller0 entered promiscuous mode [ 579.690054][T13854] device veth0_vlan entered promiscuous mode [ 579.696171][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 579.703434][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 579.713365][T13344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 579.721660][T13344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 579.733819][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 579.741529][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 579.749627][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 579.756899][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 579.765974][T13855] device veth0_vlan entered promiscuous mode [ 579.773150][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 579.781594][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 579.793291][T13854] device veth1_macvtap entered promiscuous mode [ 579.806157][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 579.813607][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 579.821652][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 579.831064][T13855] device veth1_macvtap entered promiscuous mode [ 579.841897][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 579.850088][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 579.858181][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 579.883449][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 579.893241][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 579.901461][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 579.910242][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 579.924762][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 579.933101][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 580.432139][T13897] bridge0: port 1(bridge_slave_0) entered blocking state [ 580.439126][T13897] bridge0: port 1(bridge_slave_0) entered disabled state [ 580.446677][T13897] device bridge_slave_0 entered promiscuous mode [ 580.453813][T13897] bridge0: port 2(bridge_slave_1) entered blocking state [ 580.461396][T13897] bridge0: port 2(bridge_slave_1) entered disabled state [ 580.468804][T13897] device bridge_slave_1 entered promiscuous mode [ 580.500354][T13898] bridge0: port 1(bridge_slave_0) entered blocking state [ 580.507276][T13898] bridge0: port 1(bridge_slave_0) entered disabled state [ 580.515381][T13898] device bridge_slave_0 entered promiscuous mode [ 580.522541][T13898] bridge0: port 2(bridge_slave_1) entered blocking state [ 580.529534][T13898] bridge0: port 2(bridge_slave_1) entered disabled state [ 580.536789][T13898] device bridge_slave_1 entered promiscuous mode [ 580.870340][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 580.878425][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 580.896919][ T7706] device bridge_slave_1 left promiscuous mode [ 580.903475][ T7706] bridge0: port 2(bridge_slave_1) entered disabled state [ 580.933242][ T7706] device bridge_slave_0 left promiscuous mode [ 580.939305][ T7706] bridge0: port 1(bridge_slave_0) entered disabled state [ 580.947454][ T7706] device bridge_slave_1 left promiscuous mode [ 580.953422][ T7706] bridge0: port 2(bridge_slave_1) entered disabled state [ 580.960701][ T7706] device bridge_slave_0 left promiscuous mode [ 580.966828][ T7706] bridge0: port 1(bridge_slave_0) entered disabled state [ 580.975036][ T7706] device veth1_macvtap left promiscuous mode [ 580.981026][ T7706] device veth0_vlan left promiscuous mode [ 580.986891][ T7706] device veth1_macvtap left promiscuous mode [ 581.242481][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 581.250885][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 581.258975][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 581.265810][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 581.273929][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 581.283143][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 581.293631][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 581.300497][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 581.308035][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 581.315302][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 581.322841][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 581.331116][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 581.340890][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 581.347750][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 581.355057][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 581.363198][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 581.371313][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 581.378155][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 581.385277][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 581.392979][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 581.400709][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 581.408522][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 581.416664][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 581.424096][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 581.453334][T13898] device veth0_vlan entered promiscuous mode [ 581.464390][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 581.472899][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 581.482120][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 581.492091][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 581.499429][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 581.511302][T13897] device veth0_vlan entered promiscuous mode [ 581.526773][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 581.534626][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 581.541939][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 581.553327][T13898] device veth1_macvtap entered promiscuous mode [ 581.565967][ T1784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 581.577131][T13897] device veth1_macvtap entered promiscuous mode [ 581.584470][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 581.619435][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 581.628563][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 581.636788][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 581.644770][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 581.653498][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 581.661562][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 581.693569][T13938] device syzkaller0 entered promiscuous mode [ 582.674335][ T7706] device bridge_slave_1 left promiscuous mode [ 582.680503][ T7706] bridge0: port 2(bridge_slave_1) entered disabled state [ 582.711857][ T7706] device bridge_slave_0 left promiscuous mode [ 582.720887][ T7706] bridge0: port 1(bridge_slave_0) entered disabled state [ 582.735455][ T7706] device bridge_slave_1 left promiscuous mode [ 582.741478][ T7706] bridge0: port 2(bridge_slave_1) entered disabled state [ 582.749656][ T7706] device bridge_slave_0 left promiscuous mode [ 582.755666][ T7706] bridge0: port 1(bridge_slave_0) entered disabled state [ 582.764534][ T7706] device veth1_macvtap left promiscuous mode [ 582.770463][ T7706] device veth0_vlan left promiscuous mode [ 582.796632][ T7706] device veth1_macvtap left promiscuous mode [ 582.806013][ T7706] device veth0_vlan left promiscuous mode [ 583.102093][T13966] bridge0: port 1(bridge_slave_0) entered blocking state [ 583.109888][T13966] bridge0: port 1(bridge_slave_0) entered disabled state [ 583.117224][T13966] device bridge_slave_0 entered promiscuous mode [ 583.124270][T13966] bridge0: port 2(bridge_slave_1) entered blocking state [ 583.131203][T13966] bridge0: port 2(bridge_slave_1) entered disabled state [ 583.138498][T13966] device bridge_slave_1 entered promiscuous mode [ 583.210842][T13966] bridge0: port 2(bridge_slave_1) entered blocking state [ 583.217723][T13966] bridge0: port 2(bridge_slave_1) entered forwarding state [ 583.224760][T13966] bridge0: port 1(bridge_slave_0) entered blocking state [ 583.231592][T13966] bridge0: port 1(bridge_slave_0) entered forwarding state [ 583.250865][T12155] bridge0: port 1(bridge_slave_0) entered disabled state [ 583.258874][T12155] bridge0: port 2(bridge_slave_1) entered disabled state [ 583.268154][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 583.275766][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 583.286855][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 583.294816][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 583.301651][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 583.308831][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 583.316801][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 583.323630][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 583.339473][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 583.348427][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 583.363781][T13966] device veth0_vlan entered promiscuous mode [ 583.370791][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 583.378977][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 583.386971][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 583.394130][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 583.408497][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 583.419582][T13966] device veth1_macvtap entered promiscuous mode [ 583.431163][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 583.442989][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 583.695202][T14005] device syzkaller0 entered promiscuous mode [ 584.017051][ T7706] device bridge_slave_1 left promiscuous mode [ 584.022993][ T7706] bridge0: port 2(bridge_slave_1) entered disabled state [ 584.030291][ T7706] device bridge_slave_0 left promiscuous mode [ 584.036194][ T7706] bridge0: port 1(bridge_slave_0) entered disabled state [ 584.043879][ T7706] device veth1_macvtap left promiscuous mode [ 584.050101][ T7706] device veth0_vlan left promiscuous mode [ 584.419699][T14015] bridge0: port 1(bridge_slave_0) entered blocking state [ 584.426660][T14015] bridge0: port 1(bridge_slave_0) entered disabled state [ 584.433829][T14015] device bridge_slave_0 entered promiscuous mode [ 584.445350][T14015] bridge0: port 2(bridge_slave_1) entered blocking state [ 584.452256][T14015] bridge0: port 2(bridge_slave_1) entered disabled state [ 584.473354][T14015] device bridge_slave_1 entered promiscuous mode [ 584.562813][T14031] FAULT_INJECTION: forcing a failure. [ 584.562813][T14031] name failslab, interval 1, probability 0, space 0, times 0 [ 584.575274][T14031] CPU: 0 PID: 14031 Comm: syz.1.5075 Not tainted 5.15.150-syzkaller-00330-g9044d25b8ff5 #0 [ 584.585037][T14031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 584.594927][T14031] Call Trace: [ 584.598165][T14031] [ 584.600949][T14031] dump_stack_lvl+0x151/0x1b7 [ 584.605452][T14031] ? io_uring_drop_tctx_refs+0x190/0x190 [ 584.610923][T14031] dump_stack+0x15/0x17 [ 584.614912][T14031] should_fail+0x3c6/0x510 [ 584.619166][T14031] __should_failslab+0xa4/0xe0 [ 584.623765][T14031] should_failslab+0x9/0x20 [ 584.628106][T14031] slab_pre_alloc_hook+0x37/0xd0 [ 584.632877][T14031] kmem_cache_alloc_trace+0x48/0x210 [ 584.637998][T14031] ? slhc_init+0x77/0x7a0 [ 584.642165][T14031] slhc_init+0x77/0x7a0 [ 584.646158][T14031] ppp_ioctl+0x13de/0x19a0 [ 584.650410][T14031] ? __mutex_lock_slowpath+0x10/0x10 [ 584.655531][T14031] ? ppp_poll+0x250/0x250 [ 584.659699][T14031] ? security_file_ioctl+0x84/0xb0 [ 584.664644][T14031] ? ppp_poll+0x250/0x250 [ 584.668810][T14031] __se_sys_ioctl+0x114/0x190 [ 584.673326][T14031] __x64_sys_ioctl+0x7b/0x90 [ 584.677752][T14031] do_syscall_64+0x3d/0xb0 [ 584.682003][T14031] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 584.687737][T14031] RIP: 0033:0x7f1745c61bd9 [ 584.691985][T14031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 584.711427][T14031] RSP: 002b:00007f1744ec2048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 584.719673][T14031] RAX: ffffffffffffffda RBX: 00007f1745df0038 RCX: 00007f1745c61bd9 [ 584.727485][T14031] RDX: 000000002000000c RSI: 0000000040047451 RDI: 0000000000000003 [ 584.735295][T14031] RBP: 00007f1744ec20a0 R08: 0000000000000000 R09: 0000000000000000 [ 584.743106][T14031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 584.750916][T14031] R13: 000000000000006e R14: 00007f1745df0038 R15: 00007ffd73d6f868 [ 584.758733][T14031] [ 584.882389][T14015] bridge0: port 2(bridge_slave_1) entered blocking state [ 584.889534][T14015] bridge0: port 2(bridge_slave_1) entered forwarding state [ 584.896623][T14015] bridge0: port 1(bridge_slave_0) entered blocking state [ 584.903389][T14015] bridge0: port 1(bridge_slave_0) entered forwarding state [ 584.944132][T13840] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 584.951727][T13840] bridge0: port 1(bridge_slave_0) entered disabled state [ 584.959854][T13840] bridge0: port 2(bridge_slave_1) entered disabled state [ 585.006566][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 585.014799][T12155] bridge0: port 1(bridge_slave_0) entered blocking state [ 585.021651][T12155] bridge0: port 1(bridge_slave_0) entered forwarding state [ 585.216670][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 585.327515][T12155] bridge0: port 2(bridge_slave_1) entered blocking state [ 585.334389][T12155] bridge0: port 2(bridge_slave_1) entered forwarding state [ 585.375220][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 585.436797][T12155] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 585.487484][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 585.495856][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 585.512485][T14015] device veth0_vlan entered promiscuous mode [ 585.519315][T13074] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 585.527619][T13074] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 585.541223][T14015] device veth1_macvtap entered promiscuous mode [ 585.548657][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 585.555983][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 585.564636][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 585.573238][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 585.582066][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 585.611280][T14062] FAULT_INJECTION: forcing a failure. [ 585.611280][T14062] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 585.626860][T14062] CPU: 0 PID: 14062 Comm: syz.2.5087 Not tainted 5.15.150-syzkaller-00330-g9044d25b8ff5 #0 [ 585.636664][T14062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 585.646555][T14062] Call Trace: [ 585.649678][T14062] [ 585.652456][T14062] dump_stack_lvl+0x151/0x1b7 [ 585.656972][T14062] ? io_uring_drop_tctx_refs+0x190/0x190 [ 585.662439][T14062] dump_stack+0x15/0x17 [ 585.666438][T14062] should_fail+0x3c6/0x510 [ 585.670683][T14062] should_fail_usercopy+0x1a/0x20 [ 585.675540][T14062] _copy_from_user+0x20/0xd0 [ 585.679969][T14062] __sys_bpf+0x1e9/0x760 [ 585.684049][T14062] ? fput_many+0x160/0x1b0 [ 585.688303][T14062] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 585.693511][T14062] ? debug_smp_processor_id+0x17/0x20 [ 585.698718][T14062] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 585.704620][T14062] __x64_sys_bpf+0x7c/0x90 [ 585.708883][T14062] do_syscall_64+0x3d/0xb0 [ 585.713124][T14062] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 585.718851][T14062] RIP: 0033:0x7fd9e21e5bd9 [ 585.723107][T14062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 585.742547][T14062] RSP: 002b:00007fd9e1467048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 585.750793][T14062] RAX: ffffffffffffffda RBX: 00007fd9e2373f60 RCX: 00007fd9e21e5bd9 [ 585.758604][T14062] RDX: 0000000000000020 RSI: 00000000200000c0 RDI: 0000000000000004 [ 585.766414][T14062] RBP: 00007fd9e14670a0 R08: 0000000000000000 R09: 0000000000000000 [ 585.774225][T14062] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 585.782038][T14062] R13: 000000000000000b R14: 00007fd9e2373f60 R15: 00007ffc576c8ee8 [ 585.789855][T14062] [ 585.799688][T13074] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 585.811300][T13074] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 585.828813][T13074] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 585.838087][T13074] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 586.387089][ T45] device bridge_slave_1 left promiscuous mode [ 586.393005][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 586.400314][ T45] device bridge_slave_0 left promiscuous mode [ 586.406222][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 586.413857][ T45] device veth1_macvtap left promiscuous mode [ 586.419694][ T45] device veth0_vlan left promiscuous mode [ 587.116167][T14086] device syzkaller0 entered promiscuous mode [ 587.233943][T14082] bridge0: port 1(bridge_slave_0) entered blocking state [ 587.242116][T14082] bridge0: port 1(bridge_slave_0) entered disabled state [ 587.249841][T14082] device bridge_slave_0 entered promiscuous mode [ 587.256757][T14082] bridge0: port 2(bridge_slave_1) entered blocking state [ 587.263619][T14082] bridge0: port 2(bridge_slave_1) entered disabled state [ 587.270967][T14082] device bridge_slave_1 entered promiscuous mode [ 587.464135][T14109] FAULT_INJECTION: forcing a failure. [ 587.464135][T14109] name failslab, interval 1, probability 0, space 0, times 0 [ 587.476992][T14109] CPU: 1 PID: 14109 Comm: syz.1.5099 Not tainted 5.15.150-syzkaller-00330-g9044d25b8ff5 #0 [ 587.486780][T14109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 587.496678][T14109] Call Trace: [ 587.499801][T14109] [ 587.502576][T14109] dump_stack_lvl+0x151/0x1b7 [ 587.507091][T14109] ? io_uring_drop_tctx_refs+0x190/0x190 [ 587.512558][T14109] dump_stack+0x15/0x17 [ 587.516551][T14109] should_fail+0x3c6/0x510 [ 587.520803][T14109] __should_failslab+0xa4/0xe0 [ 587.525403][T14109] should_failslab+0x9/0x20 [ 587.529748][T14109] slab_pre_alloc_hook+0x37/0xd0 [ 587.534519][T14109] kmem_cache_alloc_trace+0x48/0x210 [ 587.539637][T14109] ? slhc_init+0x77/0x7a0 [ 587.543805][T14109] slhc_init+0x77/0x7a0 [ 587.547799][T14109] ppp_ioctl+0x13de/0x19a0 [ 587.552049][T14109] ? __mutex_lock_slowpath+0x10/0x10 [ 587.557170][T14109] ? ppp_poll+0x250/0x250 [ 587.561339][T14109] ? security_file_ioctl+0x84/0xb0 [ 587.566281][T14109] ? ppp_poll+0x250/0x250 [ 587.570450][T14109] __se_sys_ioctl+0x114/0x190 [ 587.574966][T14109] __x64_sys_ioctl+0x7b/0x90 [ 587.579390][T14109] do_syscall_64+0x3d/0xb0 [ 587.583643][T14109] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 587.589371][T14109] RIP: 0033:0x7f1745c61bd9 [ 587.593623][T14109] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 587.613071][T14109] RSP: 002b:00007f1744ee3048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 587.621310][T14109] RAX: ffffffffffffffda RBX: 00007f1745deff60 RCX: 00007f1745c61bd9 [ 587.629120][T14109] RDX: 000000002000000c RSI: 0000000040047451 RDI: 0000000000000006 [ 587.636936][T14109] RBP: 00007f1744ee30a0 R08: 0000000000000000 R09: 0000000000000000 [ 587.644744][T14109] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 587.652555][T14109] R13: 000000000000000b R14: 00007f1745deff60 R15: 00007ffd73d6f868 [ 587.660372][T14109] [ 587.706707][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 587.714139][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 587.729816][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 587.738180][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 587.746162][T14066] bridge0: port 1(bridge_slave_0) entered blocking state [ 587.753028][T14066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 587.761003][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 587.769161][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 587.777195][T14066] bridge0: port 2(bridge_slave_1) entered blocking state [ 587.784039][T14066] bridge0: port 2(bridge_slave_1) entered forwarding state [ 587.819181][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 587.827638][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 587.836932][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 587.844756][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 587.852684][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 587.868739][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 587.877301][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 587.885101][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 587.899790][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 587.914759][T14082] device veth0_vlan entered promiscuous mode [ 587.934036][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 587.947759][T14082] device veth1_macvtap entered promiscuous mode [ 587.969457][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 587.982007][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 588.012061][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 588.027875][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 588.298249][T14135] device pim6reg1 entered promiscuous mode [ 588.370392][T14139] bridge0: port 1(bridge_slave_0) entered blocking state [ 588.377309][T14139] bridge0: port 1(bridge_slave_0) entered disabled state [ 588.384524][T14139] device bridge_slave_0 entered promiscuous mode [ 588.401933][T14139] bridge0: port 2(bridge_slave_1) entered blocking state [ 588.409047][T14139] bridge0: port 2(bridge_slave_1) entered disabled state [ 588.416293][T14139] device bridge_slave_1 entered promiscuous mode [ 588.455169][T14142] bridge0: port 1(bridge_slave_0) entered blocking state [ 588.462049][T14142] bridge0: port 1(bridge_slave_0) entered disabled state [ 588.469554][T14142] device bridge_slave_0 entered promiscuous mode [ 588.483789][T14142] bridge0: port 2(bridge_slave_1) entered blocking state [ 588.490969][T14142] bridge0: port 2(bridge_slave_1) entered disabled state [ 588.498279][T14142] device bridge_slave_1 entered promiscuous mode [ 588.571264][T14139] bridge0: port 2(bridge_slave_1) entered blocking state [ 588.578117][T14139] bridge0: port 2(bridge_slave_1) entered forwarding state [ 588.585222][T14139] bridge0: port 1(bridge_slave_0) entered blocking state [ 588.592019][T14139] bridge0: port 1(bridge_slave_0) entered forwarding state [ 588.632072][T14142] bridge0: port 2(bridge_slave_1) entered blocking state [ 588.638933][T14142] bridge0: port 2(bridge_slave_1) entered forwarding state [ 588.646019][T14142] bridge0: port 1(bridge_slave_0) entered blocking state [ 588.652830][T14142] bridge0: port 1(bridge_slave_0) entered forwarding state [ 588.670463][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 588.677798][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 588.684791][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 588.692923][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 588.699923][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 588.713125][ T5820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 588.721610][ T5820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 588.730372][ T5820] bridge0: port 1(bridge_slave_0) entered blocking state [ 588.737248][ T5820] bridge0: port 1(bridge_slave_0) entered forwarding state [ 588.761657][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 588.769963][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 588.778708][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 588.785573][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 588.793377][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 588.801340][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 588.816852][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 588.824350][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 588.831877][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 588.840708][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 588.849109][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 588.855978][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 588.863359][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 588.871580][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 588.879738][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 588.886598][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 588.902874][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 588.915013][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 588.927164][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 588.935041][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 588.943178][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 588.951580][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 588.973385][T14169] FAULT_INJECTION: forcing a failure. [ 588.973385][T14169] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 588.982355][T14142] device veth0_vlan entered promiscuous mode [ 588.986358][T14169] CPU: 0 PID: 14169 Comm: syz.1.5120 Not tainted 5.15.150-syzkaller-00330-g9044d25b8ff5 #0 [ 588.992452][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 589.001845][T14169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 589.001856][T14169] Call Trace: [ 589.001862][T14169] [ 589.001868][T14169] dump_stack_lvl+0x151/0x1b7 [ 589.001891][T14169] ? io_uring_drop_tctx_refs+0x190/0x190 [ 589.001910][T14169] ? kmem_cache_free+0x116/0x2e0 [ 589.001929][T14169] dump_stack+0x15/0x17 [ 589.001944][T14169] should_fail+0x3c6/0x510 [ 589.001959][T14169] should_fail_usercopy+0x1a/0x20 [ 589.001975][T14169] _copy_from_user+0x20/0xd0 [ 589.011016][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 589.019642][T14169] __copy_msghdr_from_user+0xaf/0x7c0 [ 589.019669][T14169] ? __ia32_sys_shutdown+0x70/0x70 [ 589.023265][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 589.025543][T14169] ___sys_sendmsg+0x166/0x2e0 [ 589.025566][T14169] ? __sys_sendmsg+0x260/0x260 [ 589.030671][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 589.035531][T14169] ? __fdget+0x1bc/0x240 [ 589.040820][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 589.044288][T14169] __se_sys_sendmsg+0x19a/0x260 [ 589.048973][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 589.053405][T14169] ? __x64_sys_sendmsg+0x90/0x90 [ 589.058270][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 589.065726][T14169] ? ksys_write+0x260/0x2c0 [ 589.065749][T14169] ? debug_smp_processor_id+0x17/0x20 [ 589.071381][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 589.075881][T14169] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 589.075904][T14169] __x64_sys_sendmsg+0x7b/0x90 [ 589.083936][T14139] device veth0_vlan entered promiscuous mode [ 589.087863][T14169] do_syscall_64+0x3d/0xb0 [ 589.087884][T14169] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 589.101054][T14142] device veth1_macvtap entered promiscuous mode [ 589.104003][T14169] RIP: 0033:0x7f1745c61bd9 [ 589.112480][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 589.116588][T14169] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 589.116605][T14169] RSP: 002b:00007f1744ee3048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 589.116624][T14169] RAX: ffffffffffffffda RBX: 00007f1745deff60 RCX: 00007f1745c61bd9 [ 589.116637][T14169] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000007 [ 589.116648][T14169] RBP: 00007f1744ee30a0 R08: 0000000000000000 R09: 0000000000000000 [ 589.116661][T14169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 589.116671][T14169] R13: 000000000000000b R14: 00007f1745deff60 R15: 00007ffd73d6f868 [ 589.116686][T14169] [ 589.125288][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 589.274483][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 589.281835][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 589.290295][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 589.302430][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 589.310625][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 589.333357][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 589.341677][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 589.349927][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 589.358418][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 589.366519][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 589.374399][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 589.392339][ T45] device bridge_slave_1 left promiscuous mode [ 589.405568][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 589.423949][ T45] device bridge_slave_0 left promiscuous mode [ 589.430405][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 589.439123][ T45] device veth1_macvtap left promiscuous mode [ 589.445125][ T45] device veth0_vlan left promiscuous mode [ 589.680829][T14139] device veth1_macvtap entered promiscuous mode [ 589.695408][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 589.798710][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 589.820399][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 589.883765][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 589.909159][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 590.333078][T14210] device pim6reg1 entered promiscuous mode [ 590.365170][T14207] device pim6reg1 entered promiscuous mode [ 590.917012][ T45] device bridge_slave_1 left promiscuous mode [ 590.922949][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 590.930496][ T45] device bridge_slave_0 left promiscuous mode [ 590.936511][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 590.944234][ T45] device bridge_slave_1 left promiscuous mode [ 590.950214][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 590.957318][ T45] device bridge_slave_0 left promiscuous mode [ 590.963210][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 590.971074][ T45] device veth1_macvtap left promiscuous mode [ 590.976885][ T45] device veth0_vlan left promiscuous mode [ 590.982625][ T45] device veth0_vlan left promiscuous mode [ 592.356041][T14234] bridge0: port 1(bridge_slave_0) entered blocking state [ 592.375839][T14234] bridge0: port 1(bridge_slave_0) entered disabled state [ 592.383362][T14234] device bridge_slave_0 entered promiscuous mode [ 592.391906][T14252] device pim6reg1 entered promiscuous mode [ 592.429553][T14234] bridge0: port 2(bridge_slave_1) entered blocking state [ 592.445829][T14234] bridge0: port 2(bridge_slave_1) entered disabled state [ 592.480336][T14234] device bridge_slave_1 entered promiscuous mode [ 592.822331][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 592.829817][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 592.857209][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 592.865377][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 592.873921][T14066] bridge0: port 1(bridge_slave_0) entered blocking state [ 592.880782][T14066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 592.888365][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 592.896749][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 592.904733][T14066] bridge0: port 2(bridge_slave_1) entered blocking state [ 592.911587][T14066] bridge0: port 2(bridge_slave_1) entered forwarding state [ 592.918788][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 592.927353][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 592.935036][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 592.942900][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 592.958200][ T5820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 592.960127][T14268] syz.2.5152[14268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 592.966176][T14268] syz.2.5152[14268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 592.970601][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 592.998609][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 593.006155][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 593.016005][T14234] device veth0_vlan entered promiscuous mode [ 593.027871][T14066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 593.037086][T14234] device veth1_macvtap entered promiscuous mode [ 593.047550][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 593.055600][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 593.074538][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 593.092459][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 593.170978][T14274] syz.2.5155[14274] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 593.171049][T14274] syz.2.5155[14274] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 593.807791][ T7706] device bridge_slave_1 left promiscuous mode [ 593.824923][ T7706] bridge0: port 2(bridge_slave_1) entered disabled state [ 593.832288][ T7706] device bridge_slave_0 left promiscuous mode [ 593.838275][ T7706] bridge0: port 1(bridge_slave_0) entered disabled state [ 593.845751][ T7706] device veth1_macvtap left promiscuous mode [ 593.851599][ T7706] device veth0_vlan left promiscuous mode [ 594.413741][T14283] device syzkaller0 entered promiscuous mode [ 594.676213][T14288] bridge0: port 1(bridge_slave_0) entered blocking state [ 594.686010][T14288] bridge0: port 1(bridge_slave_0) entered disabled state [ 594.706646][T14288] device bridge_slave_0 entered promiscuous mode [ 594.713433][T14288] bridge0: port 2(bridge_slave_1) entered blocking state [ 594.720806][T14288] bridge0: port 2(bridge_slave_1) entered disabled state [ 594.731019][T14288] device bridge_slave_1 entered promiscuous mode [ 594.999615][T14316] device pim6reg1 entered promiscuous mode [ 595.018235][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 595.025862][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 595.053694][T14319] device syzkaller0 entered promiscuous mode [ 595.066623][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 595.074718][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 595.082876][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 595.089734][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 595.097425][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 595.105578][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 595.113872][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 595.120724][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 595.147172][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 595.154610][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 595.162688][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 595.171176][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 595.179048][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 595.191754][T14288] device veth0_vlan entered promiscuous mode [ 595.198802][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 595.207480][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 595.214675][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 595.222091][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 595.244749][T14288] device veth1_macvtap entered promiscuous mode [ 595.263596][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 595.276500][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 595.286059][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 595.295399][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 595.303572][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 595.713200][T14348] device veth1_macvtap left promiscuous mode [ 595.804339][T14348] device veth1_macvtap entered promiscuous mode [ 595.812824][T14348] device macsec0 entered promiscuous mode [ 595.860721][T14351] device pim6reg1 entered promiscuous mode [ 595.920026][T14356] device syzkaller0 entered promiscuous mode [ 595.952885][T14343] bridge0: port 1(bridge_slave_0) entered blocking state [ 595.960153][T14343] bridge0: port 1(bridge_slave_0) entered disabled state [ 595.967676][T14343] device bridge_slave_0 entered promiscuous mode [ 596.010974][T14346] bridge0: port 1(bridge_slave_0) entered blocking state [ 596.039558][T14346] bridge0: port 1(bridge_slave_0) entered disabled state [ 596.052247][T14346] device bridge_slave_0 entered promiscuous mode [ 596.117666][T14343] bridge0: port 2(bridge_slave_1) entered blocking state [ 596.134664][T14343] bridge0: port 2(bridge_slave_1) entered disabled state [ 596.142129][T14343] device bridge_slave_1 entered promiscuous mode [ 596.152556][T14346] bridge0: port 2(bridge_slave_1) entered blocking state [ 596.174087][T14346] bridge0: port 2(bridge_slave_1) entered disabled state [ 596.209331][T14346] device bridge_slave_1 entered promiscuous mode [ 596.495960][ T7706] device bridge_slave_1 left promiscuous mode [ 596.501976][ T7706] bridge0: port 2(bridge_slave_1) entered disabled state [ 596.509510][ T7706] device bridge_slave_0 left promiscuous mode [ 596.515582][ T7706] bridge0: port 1(bridge_slave_0) entered disabled state [ 596.523533][ T7706] device veth1_macvtap left promiscuous mode [ 596.529476][ T7706] device veth0_vlan left promiscuous mode [ 696.656362][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 696.662803][ C1] rcu: 1-...!: (10000 ticks this GP) idle=da1/1/0x4000000000000000 softirq=66772/66772 fqs=0 last_accelerate: 7395/9aa5 dyntick_enabled: 1 [ 696.676837][ C1] (t=10000 jiffies g=74113 q=37) [ 696.681688][ C1] rcu: rcu_preempt kthread timer wakeup didn't happen for 9999 jiffies! g74113 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 [ 696.693753][ C1] rcu: Possible timer handling issue on cpu=1 timer-softirq=18611 [ 696.701479][ C1] rcu: rcu_preempt kthread starved for 10000 jiffies! g74113 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=1 [ 696.712673][ C1] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 696.722480][ C1] rcu: RCU grace-period kthread stack dump: [ 696.728210][ C1] task:rcu_preempt state:I stack:28288 pid: 14 ppid: 2 flags:0x00004000 [ 696.737237][ C1] Call Trace: [ 696.740360][ C1] [ 696.743144][ C1] __schedule+0xccc/0x1590 [ 696.747394][ C1] ? __sched_text_start+0x8/0x8 [ 696.752080][ C1] ? __kasan_check_write+0x14/0x20 [ 696.757023][ C1] schedule+0x11f/0x1e0 [ 696.761016][ C1] schedule_timeout+0x18c/0x370 [ 696.765703][ C1] ? _raw_spin_unlock_irq+0x4e/0x70 [ 696.770738][ C1] ? console_conditional_schedule+0x30/0x30 [ 696.776468][ C1] ? update_process_times+0x200/0x200 [ 696.781675][ C1] ? prepare_to_swait_event+0x308/0x320 [ 696.787057][ C1] rcu_gp_fqs_loop+0x2af/0xf80 [ 696.791658][ C1] ? debug_smp_processor_id+0x17/0x20 [ 696.796864][ C1] ? __note_gp_changes+0x4ab/0x920 [ 696.801811][ C1] ? rcu_gp_init+0xc30/0xc30 [ 696.806236][ C1] ? _raw_spin_unlock_irq+0x4e/0x70 [ 696.811271][ C1] ? rcu_gp_init+0x9cf/0xc30 [ 696.815698][ C1] rcu_gp_kthread+0xa4/0x350 [ 696.820129][ C1] ? _raw_spin_lock+0x1b0/0x1b0 [ 696.824811][ C1] ? wake_nocb_gp+0x1e0/0x1e0 [ 696.829325][ C1] ? __kasan_check_read+0x11/0x20 [ 696.834185][ C1] ? __kthread_parkme+0xb2/0x200 [ 696.838958][ C1] kthread+0x421/0x510 [ 696.842863][ C1] ? wake_nocb_gp+0x1e0/0x1e0 [ 696.847377][ C1] ? kthread_blkcg+0xd0/0xd0 [ 696.851805][ C1] ret_from_fork+0x1f/0x30 [ 696.856058][ C1] [ 696.858923][ C1] rcu: Stack dump where RCU GP kthread last ran: [ 696.865091][ C1] NMI backtrace for cpu 1 [ 696.869252][ C1] CPU: 1 PID: 14346 Comm: syz-executor Not tainted 5.15.150-syzkaller-00330-g9044d25b8ff5 #0 [ 696.879230][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 696.889126][ C1] Call Trace: [ 696.892251][ C1] [ 696.894939][ C1] dump_stack_lvl+0x151/0x1b7 [ 696.899455][ C1] ? io_uring_drop_tctx_refs+0x190/0x190 [ 696.904923][ C1] dump_stack+0x15/0x17 [ 696.908929][ C1] nmi_cpu_backtrace+0x2f7/0x300 [ 696.913688][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 696.919677][ C1] ? panic+0x751/0x751 [ 696.923583][ C1] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 696.929485][ C1] nmi_trigger_cpumask_backtrace+0x15d/0x270 [ 696.935298][ C1] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 696.941202][ C1] arch_trigger_cpumask_backtrace+0x10/0x20 [ 696.946931][ C1] rcu_check_gp_kthread_starvation+0x1e3/0x250 [ 696.952919][ C1] ? rcu_check_gp_kthread_expired_fqs_timer+0x18e/0x230 [ 696.959688][ C1] print_cpu_stall+0x310/0x5f0 [ 696.964287][ C1] rcu_sched_clock_irq+0x989/0x12f0 [ 696.969323][ C1] ? rcu_boost_kthread_setaffinity+0x340/0x340 [ 696.975310][ C1] ? hrtimer_run_queues+0x15f/0x440 [ 696.980347][ C1] update_process_times+0x198/0x200 [ 696.985379][ C1] tick_sched_timer+0x188/0x240 [ 696.990071][ C1] ? tick_setup_sched_timer+0x480/0x480 [ 696.995446][ C1] __hrtimer_run_queues+0x41a/0xad0 [ 697.000484][ C1] ? hrtimer_interrupt+0xaa0/0xaa0 [ 697.005427][ C1] ? clockevents_program_event+0x22f/0x300 [ 697.011073][ C1] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 697.016978][ C1] hrtimer_interrupt+0x40c/0xaa0 [ 697.021759][ C1] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 697.027476][ C1] sysvec_apic_timer_interrupt+0x95/0xc0 [ 697.032944][ C1] [ 697.035718][ C1] [ 697.038498][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 697.044313][ C1] RIP: 0010:kvm_wait+0x147/0x180 [ 697.049087][ C1] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 4b 02 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 697.068527][ C1] RSP: 0018:ffffc90000a55140 EFLAGS: 00000246 [ 697.074427][ C1] RAX: 0000000000000003 RBX: 1ffff9200014aa2c RCX: ffffffff8154fbbf [ 697.082240][ C1] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff888113165c18 [ 697.090055][ C1] RBP: ffffc90000a551f0 R08: dffffc0000000000 R09: ffffed102262cb84 [ 697.097865][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 697.105674][ C1] R13: ffff888113165c18 R14: 0000000000000003 R15: 1ffff9200014aa30 [ 697.113489][ C1] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 697.119564][ C1] ? asm_common_interrupt+0x27/0x40 [ 697.124595][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 697.129544][ C1] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 697.135618][ C1] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 697.141522][ C1] ? post_alloc_hook+0x1a3/0x1b0 [ 697.146295][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 697.152543][ C1] ? get_page_from_freelist+0x3550/0x35d0 [ 697.158100][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 697.162872][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 697.167907][ C1] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 697.173224][ C1] sock_hash_delete_elem+0xb1/0x2f0 [ 697.178236][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0xe00 [ 697.183616][ C1] bpf_trace_run4+0x13f/0x270 [ 697.188129][ C1] ? bpf_trace_run3+0x250/0x250 [ 697.192816][ C1] ? __alloc_pages+0x8f0/0x8f0 [ 697.197417][ C1] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 697.202712][ C1] __traceiter_mm_page_alloc+0x3a/0x60 [ 697.208005][ C1] __alloc_pages+0x3cb/0x8f0 [ 697.212431][ C1] ? prep_new_page+0x110/0x110 [ 697.217033][ C1] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 697.222501][ C1] ? stack_trace_save+0x113/0x1c0 [ 697.227362][ C1] __stack_depot_save+0x38d/0x470 [ 697.232220][ C1] stack_depot_save+0xe/0x10 [ 697.236646][ C1] save_stack+0x104/0x1e0 [ 697.240817][ C1] ? __reset_page_owner+0x190/0x190 [ 697.245858][ C1] ? post_alloc_hook+0x1a3/0x1b0 [ 697.250625][ C1] ? prep_new_page+0x1b/0x110 [ 697.255137][ C1] ? get_page_from_freelist+0x3550/0x35d0 [ 697.260699][ C1] ? __alloc_pages+0x27e/0x8f0 [ 697.265289][ C1] ? __stack_depot_save+0x38d/0x470 [ 697.270323][ C1] ? kasan_set_track+0x5d/0x70 [ 697.274923][ C1] ? kasan_set_free_info+0x23/0x40 [ 697.279871][ C1] ? ____kasan_slab_free+0x126/0x160 [ 697.284992][ C1] ? __kasan_slab_free+0x11/0x20 [ 697.289767][ C1] ? slab_free_freelist_hook+0xbd/0x190 [ 697.295146][ C1] ? kfree+0xc8/0x220 [ 697.298965][ C1] ? sock_map_unref+0x352/0x4d0 [ 697.303651][ C1] ? sock_hash_delete_elem+0x274/0x2f0 [ 697.308951][ C1] ? bpf_prog_2c29ac5cdc6b1842+0x3a/0xe00 [ 697.314500][ C1] ? bpf_trace_run4+0x13f/0x270 [ 697.319188][ C1] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 697.324655][ C1] ? stack_trace_save+0x1c0/0x1c0 [ 697.329519][ C1] ? __kernel_text_address+0x9b/0x110 [ 697.334742][ C1] __set_page_owner+0x28/0x2e0 [ 697.339327][ C1] ? kernel_init_free_pages+0xda/0xf0 [ 697.344533][ C1] post_alloc_hook+0x1a3/0x1b0 [ 697.349134][ C1] prep_new_page+0x1b/0x110 [ 697.353486][ C1] get_page_from_freelist+0x3550/0x35d0 [ 697.358868][ C1] ? lruvec_init+0x150/0x150 [ 697.363377][ C1] ? __alloc_pages+0x8f0/0x8f0 [ 697.367997][ C1] ? __alloc_pages_bulk+0xe40/0xe40 [ 697.373013][ C1] ? stack_trace_save+0x1c0/0x1c0 [ 697.377864][ C1] __alloc_pages+0x27e/0x8f0 [ 697.382300][ C1] ? prep_new_page+0x110/0x110 [ 697.386893][ C1] ? stack_trace_save+0x113/0x1c0 [ 697.391750][ C1] ? stack_trace_snprint+0xf0/0xf0 [ 697.396696][ C1] __stack_depot_save+0x38d/0x470 [ 697.401558][ C1] ? kfree+0xc8/0x220 [ 697.405378][ C1] kasan_set_track+0x5d/0x70 [ 697.409806][ C1] ? kasan_set_track+0x4b/0x70 [ 697.414405][ C1] ? kasan_set_free_info+0x23/0x40 [ 697.419359][ C1] ? ____kasan_slab_free+0x126/0x160 [ 697.424471][ C1] ? __kasan_slab_free+0x11/0x20 [ 697.429246][ C1] ? slab_free_freelist_hook+0xbd/0x190 [ 697.434634][ C1] ? kfree+0xc8/0x220 [ 697.438445][ C1] ? sock_map_unref+0x352/0x4d0 [ 697.443131][ C1] ? sock_hash_delete_elem+0x274/0x2f0 [ 697.448426][ C1] ? bpf_prog_2c29ac5cdc6b1842+0x3a/0xe00 [ 697.453979][ C1] ? bpf_trace_run4+0x13f/0x270 [ 697.458666][ C1] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 697.464136][ C1] ? __traceiter_mm_page_alloc+0x3a/0x60 [ 697.469603][ C1] ? __alloc_pages+0x3cb/0x8f0 [ 697.474202][ C1] ? new_slab+0x9a/0x4e0 [ 697.478282][ C1] ? ___slab_alloc+0x39e/0x830 [ 697.482881][ C1] ? __slab_alloc+0x4a/0x90 [ 697.487223][ C1] ? kmem_cache_alloc+0x134/0x200 [ 697.492091][ C1] ? __kernfs_new_node+0xdb/0x700 [ 697.496949][ C1] ? kernfs_new_node+0x130/0x230 [ 697.501756][ C1] ? __kernfs_create_file+0x4a/0x270 [ 697.506837][ C1] ? sysfs_add_file_mode_ns+0x273/0x320 [ 697.512219][ C1] ? internal_create_group+0x573/0xf00 [ 697.517516][ C1] ? sysfs_create_groups+0x5b/0x130 [ 697.522549][ C1] ? device_add_attrs+0x8b/0x490 [ 697.527322][ C1] ? device_add+0x5f7/0xf10 [ 697.531662][ C1] ? netdev_register_kobject+0x177/0x320 [ 697.537129][ C1] ? register_netdevice+0xde9/0x1390 [ 697.542254][ C1] ? veth_newlink+0x72e/0xe20 [ 697.546770][ C1] ? rtnl_newlink+0x1495/0x2050 [ 697.551454][ C1] ? rtnetlink_rcv_msg+0x951/0xc40 [ 697.556488][ C1] ? netlink_rcv_skb+0x1cf/0x410 [ 697.561268][ C1] ? rtnetlink_rcv+0x1c/0x20 [ 697.565696][ C1] ? netlink_unicast+0x8df/0xac0 [ 697.570462][ C1] ? netlink_sendmsg+0xa0a/0xd20 [ 697.575235][ C1] ? __sys_sendto+0x564/0x720 [ 697.579748][ C1] ? __x64_sys_sendto+0xe5/0x100 [ 697.584658][ C1] ? do_syscall_64+0x3d/0xb0 [ 697.589080][ C1] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 697.594987][ C1] kasan_set_free_info+0x23/0x40 [ 697.599758][ C1] ____kasan_slab_free+0x126/0x160 [ 697.604709][ C1] __kasan_slab_free+0x11/0x20 [ 697.609305][ C1] slab_free_freelist_hook+0xbd/0x190 [ 697.614515][ C1] ? sock_map_unref+0x352/0x4d0 [ 697.619199][ C1] kfree+0xc8/0x220 [ 697.622851][ C1] sock_map_unref+0x352/0x4d0 [ 697.627371][ C1] sock_hash_delete_elem+0x274/0x2f0 [ 697.632482][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0xe00 [ 697.637862][ C1] bpf_trace_run4+0x13f/0x270 [ 697.642370][ C1] ? bpf_trace_run3+0x250/0x250 [ 697.647058][ C1] ? __alloc_pages+0x8f0/0x8f0 [ 697.651658][ C1] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 697.656953][ C1] __traceiter_mm_page_alloc+0x3a/0x60 [ 697.662247][ C1] __alloc_pages+0x3cb/0x8f0 [ 697.666674][ C1] ? prep_new_page+0x110/0x110 [ 697.671274][ C1] ? __kasan_check_write+0x14/0x20 [ 697.676348][ C1] ? node_tag_clear+0x203/0x330 [ 697.681022][ C1] ? kernfs_xattr_get+0x80/0x90 [ 697.685724][ C1] new_slab+0x9a/0x4e0 [ 697.689616][ C1] ___slab_alloc+0x39e/0x830 [ 697.694036][ C1] ? __kernfs_new_node+0xdb/0x700 [ 697.698898][ C1] ? __kernfs_new_node+0xdb/0x700 [ 697.703757][ C1] __slab_alloc+0x4a/0x90 [ 697.707927][ C1] ? __kernfs_new_node+0xdb/0x700 [ 697.712783][ C1] kmem_cache_alloc+0x134/0x200 [ 697.717472][ C1] __kernfs_new_node+0xdb/0x700 [ 697.722159][ C1] ? rwsem_write_trylock+0x15b/0x290 [ 697.727282][ C1] ? rwsem_mark_wake+0x6b0/0x6b0 [ 697.732052][ C1] ? kernfs_new_node+0x230/0x230 [ 697.736826][ C1] ? rwsem_write_trylock+0x15b/0x290 [ 697.741948][ C1] ? up_write+0x79/0x1f0 [ 697.746024][ C1] ? kernfs_activate+0x359/0x370 [ 697.750800][ C1] kernfs_new_node+0x130/0x230 [ 697.755399][ C1] __kernfs_create_file+0x4a/0x270 [ 697.760347][ C1] sysfs_add_file_mode_ns+0x273/0x320 [ 697.765554][ C1] internal_create_group+0x573/0xf00 [ 697.770674][ C1] ? up_write+0x79/0x1f0 [ 697.774754][ C1] ? sysfs_create_group+0x30/0x30 [ 697.779614][ C1] ? __kasan_check_write+0x14/0x20 [ 697.784563][ C1] ? kernfs_put+0x4e5/0x520 [ 697.788903][ C1] sysfs_create_groups+0x5b/0x130 [ 697.793764][ C1] device_add_attrs+0x8b/0x490 [ 697.798362][ C1] device_add+0x5f7/0xf10 [ 697.802529][ C1] netdev_register_kobject+0x177/0x320 [ 697.807824][ C1] ? raw_notifier_call_chain+0xdf/0xf0 [ 697.813117][ C1] register_netdevice+0xde9/0x1390 [ 697.818064][ C1] ? get_random_bytes+0x30/0x30 [ 697.822758][ C1] ? netif_stacked_transfer_operstate+0x240/0x240 [ 697.829001][ C1] ? rtnl_create_link+0x7ba/0x9d0 [ 697.833861][ C1] veth_newlink+0x72e/0xe20 [ 697.838201][ C1] ? veth_validate+0x200/0x200 [ 697.842806][ C1] ? rtnl_create_link+0x7ba/0x9d0 [ 697.847661][ C1] ? veth_validate+0x200/0x200 [ 697.852262][ C1] rtnl_newlink+0x1495/0x2050 [ 697.856777][ C1] ? rtnl_newlink+0x541/0x2050 [ 697.861462][ C1] ? rtnl_setlink+0x540/0x540 [ 697.865979][ C1] ? __kasan_check_write+0x14/0x20 [ 697.870952][ C1] ? _raw_spin_lock+0xa4/0x1b0 [ 697.875523][ C1] ? _raw_spin_trylock_bh+0x190/0x190 [ 697.880741][ C1] ? 0xffffffffa0028188 [ 697.884723][ C1] ? __mutex_lock_slowpath+0xe/0x10 [ 697.889758][ C1] ? mutex_lock+0x135/0x1e0 [ 697.894097][ C1] ? security_capable+0x87/0xb0 [ 697.898783][ C1] ? wait_for_completion_killable_timeout+0x10/0x10 [ 697.905205][ C1] ? ns_capable+0x89/0xe0 [ 697.909374][ C1] ? netlink_net_capable+0x125/0x160 [ 697.914753][ C1] ? rtnl_setlink+0x540/0x540 [ 697.919267][ C1] rtnetlink_rcv_msg+0x951/0xc40 [ 697.924041][ C1] ? rtnetlink_bind+0x80/0x80 [ 697.928553][ C1] ? stack_trace_save+0x1c0/0x1c0 [ 697.933413][ C1] ? __kernel_text_address+0x9b/0x110 [ 697.938621][ C1] ? unwind_get_return_address+0x4d/0x90 [ 697.944089][ C1] ? avc_has_perm_noaudit+0x348/0x430 [ 697.949297][ C1] ? memcpy+0x56/0x70 [ 697.953116][ C1] ? avc_has_perm_noaudit+0x2dd/0x430 [ 697.958326][ C1] ? avc_denied+0x1b0/0x1b0 [ 697.962665][ C1] ? avc_has_perm+0x16f/0x260 [ 697.967177][ C1] ? ____kasan_kmalloc+0xed/0x110 [ 697.972036][ C1] ? avc_has_perm_noaudit+0x430/0x430 [ 697.977279][ C1] netlink_rcv_skb+0x1cf/0x410 [ 697.981844][ C1] ? rtnetlink_bind+0x80/0x80 [ 697.986362][ C1] ? netlink_ack+0xb10/0xb10 [ 697.990791][ C1] ? __netlink_lookup+0x37b/0x3a0 [ 697.995644][ C1] rtnetlink_rcv+0x1c/0x20 [ 697.999898][ C1] netlink_unicast+0x8df/0xac0 [ 698.004499][ C1] ? netlink_detachskb+0x90/0x90 [ 698.009271][ C1] ? security_netlink_send+0x7b/0xa0 [ 698.014391][ C1] netlink_sendmsg+0xa0a/0xd20 [ 698.018994][ C1] ? netlink_getsockopt+0x560/0x560 [ 698.024026][ C1] ? security_socket_sendmsg+0x82/0xb0 [ 698.029320][ C1] ? netlink_getsockopt+0x560/0x560 [ 698.034354][ C1] __sys_sendto+0x564/0x720 [ 698.038697][ C1] ? __ia32_sys_getpeername+0x90/0x90 [ 698.043906][ C1] ? debug_smp_processor_id+0x17/0x20 [ 698.049110][ C1] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 698.055099][ C1] __x64_sys_sendto+0xe5/0x100 [ 698.059698][ C1] do_syscall_64+0x3d/0xb0 [ 698.063953][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 698.069680][ C1] RIP: 0033:0x7f7271019913 [ 698.073945][ C1] Code: 64 89 02 48 c7 c0 ff ff ff ff eb b7 66 2e 0f 1f 84 00 00 00 00 00 90 80 3d 31 dc 15 00 00 41 89 ca 74 14 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 75 c3 0f 1f 40 00 55 48 83 ec 30 44 89 4c 24 [ 698.093374][ C1] RSP: 002b:00007fffc544b3c8 EFLAGS: 00000202 ORIG_RAX: 000000000000002c [ 698.101621][ C1] RAX: ffffffffffffffda RBX: 00007f7271cd6620 RCX: 00007f7271019913 [ 698.109430][ C1] RDX: 000000000000006c RSI: 00007f7271cd6670 RDI: 0000000000000003 [ 698.117242][ C1] RBP: 0000000000000001 R08: 00007fffc544b3e4 R09: 000000000000000c [ 698.125055][ C1] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000003 [ 698.132865][ C1] R13: 0000000000000000 R14: 00007f7271cd6670 R15: 0000000000000000 [ 698.140680][ C1] [ 698.143559][ C1] NMI backtrace for cpu 1 [ 698.147725][ C1] CPU: 1 PID: 14346 Comm: syz-executor Not tainted 5.15.150-syzkaller-00330-g9044d25b8ff5 #0 [ 698.157688][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 698.167585][ C1] Call Trace: [ 698.170708][ C1] [ 698.173398][ C1] dump_stack_lvl+0x151/0x1b7 [ 698.177998][ C1] ? io_uring_drop_tctx_refs+0x190/0x190 [ 698.183464][ C1] ? ttwu_do_wakeup+0x187/0x430 [ 698.188153][ C1] dump_stack+0x15/0x17 [ 698.192145][ C1] nmi_cpu_backtrace+0x2f7/0x300 [ 698.196926][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 698.202907][ C1] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 698.208203][ C1] ? __kasan_check_write+0x14/0x20 [ 698.213149][ C1] ? _raw_spin_lock+0x1b0/0x1b0 [ 698.217839][ C1] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 698.223738][ C1] nmi_trigger_cpumask_backtrace+0x15d/0x270 [ 698.229553][ C1] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 698.235456][ C1] arch_trigger_cpumask_backtrace+0x10/0x20 [ 698.241185][ C1] rcu_dump_cpu_stacks+0x1d8/0x330 [ 698.246131][ C1] print_cpu_stall+0x315/0x5f0 [ 698.250733][ C1] rcu_sched_clock_irq+0x989/0x12f0 [ 698.255767][ C1] ? rcu_boost_kthread_setaffinity+0x340/0x340 [ 698.261754][ C1] ? hrtimer_run_queues+0x15f/0x440 [ 698.266788][ C1] update_process_times+0x198/0x200 [ 698.271824][ C1] tick_sched_timer+0x188/0x240 [ 698.276614][ C1] ? tick_setup_sched_timer+0x480/0x480 [ 698.281995][ C1] __hrtimer_run_queues+0x41a/0xad0 [ 698.287029][ C1] ? hrtimer_interrupt+0xaa0/0xaa0 [ 698.291990][ C1] ? clockevents_program_event+0x22f/0x300 [ 698.297613][ C1] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 698.303605][ C1] hrtimer_interrupt+0x40c/0xaa0 [ 698.308380][ C1] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 698.314105][ C1] sysvec_apic_timer_interrupt+0x95/0xc0 [ 698.319579][ C1] [ 698.322351][ C1] [ 698.325129][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 698.330952][ C1] RIP: 0010:kvm_wait+0x147/0x180 [ 698.335720][ C1] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 4b 02 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 698.355167][ C1] RSP: 0018:ffffc90000a55140 EFLAGS: 00000246 [ 698.361060][ C1] RAX: 0000000000000003 RBX: 1ffff9200014aa2c RCX: ffffffff8154fbbf [ 698.368872][ C1] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff888113165c18 [ 698.376683][ C1] RBP: ffffc90000a551f0 R08: dffffc0000000000 R09: ffffed102262cb84 [ 698.384495][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 698.392312][ C1] R13: ffff888113165c18 R14: 0000000000000003 R15: 1ffff9200014aa30 [ 698.400121][ C1] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 698.406195][ C1] ? asm_common_interrupt+0x27/0x40 [ 698.411227][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 698.416174][ C1] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 698.422346][ C1] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 698.428246][ C1] ? post_alloc_hook+0x1a3/0x1b0 [ 698.433021][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 698.439269][ C1] ? get_page_from_freelist+0x3550/0x35d0 [ 698.444823][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 698.449600][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 698.454630][ C1] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 698.459926][ C1] sock_hash_delete_elem+0xb1/0x2f0 [ 698.464961][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0xe00 [ 698.470341][ C1] bpf_trace_run4+0x13f/0x270 [ 698.474854][ C1] ? bpf_trace_run3+0x250/0x250 [ 698.479543][ C1] ? __alloc_pages+0x8f0/0x8f0 [ 698.484314][ C1] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 698.489611][ C1] __traceiter_mm_page_alloc+0x3a/0x60 [ 698.494905][ C1] __alloc_pages+0x3cb/0x8f0 [ 698.499330][ C1] ? prep_new_page+0x110/0x110 [ 698.503932][ C1] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 698.509398][ C1] ? stack_trace_save+0x113/0x1c0 [ 698.514259][ C1] __stack_depot_save+0x38d/0x470 [ 698.519166][ C1] stack_depot_save+0xe/0x10 [ 698.523545][ C1] save_stack+0x104/0x1e0 [ 698.527715][ C1] ? __reset_page_owner+0x190/0x190 [ 698.532744][ C1] ? post_alloc_hook+0x1a3/0x1b0 [ 698.537519][ C1] ? prep_new_page+0x1b/0x110 [ 698.542032][ C1] ? get_page_from_freelist+0x3550/0x35d0 [ 698.547679][ C1] ? __alloc_pages+0x27e/0x8f0 [ 698.552273][ C1] ? __stack_depot_save+0x38d/0x470 [ 698.557308][ C1] ? kasan_set_track+0x5d/0x70 [ 698.561915][ C1] ? kasan_set_free_info+0x23/0x40 [ 698.566858][ C1] ? ____kasan_slab_free+0x126/0x160 [ 698.571978][ C1] ? __kasan_slab_free+0x11/0x20 [ 698.576753][ C1] ? slab_free_freelist_hook+0xbd/0x190 [ 698.582132][ C1] ? kfree+0xc8/0x220 [ 698.585951][ C1] ? sock_map_unref+0x352/0x4d0 [ 698.590680][ C1] ? sock_hash_delete_elem+0x274/0x2f0 [ 698.596027][ C1] ? bpf_prog_2c29ac5cdc6b1842+0x3a/0xe00 [ 698.601582][ C1] ? bpf_trace_run4+0x13f/0x270 [ 698.606265][ C1] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 698.611736][ C1] ? stack_trace_save+0x1c0/0x1c0 [ 698.617295][ C1] ? __kernel_text_address+0x9b/0x110 [ 698.622544][ C1] __set_page_owner+0x28/0x2e0 [ 698.627533][ C1] ? kernel_init_free_pages+0xda/0xf0 [ 698.632741][ C1] post_alloc_hook+0x1a3/0x1b0 [ 698.637340][ C1] prep_new_page+0x1b/0x110 [ 698.641678][ C1] get_page_from_freelist+0x3550/0x35d0 [ 698.647065][ C1] ? lruvec_init+0x150/0x150 [ 698.651487][ C1] ? __alloc_pages+0x8f0/0x8f0 [ 698.656089][ C1] ? __alloc_pages_bulk+0xe40/0xe40 [ 698.661122][ C1] ? stack_trace_save+0x1c0/0x1c0 [ 698.666076][ C1] __alloc_pages+0x27e/0x8f0 [ 698.670502][ C1] ? prep_new_page+0x110/0x110 [ 698.675102][ C1] ? stack_trace_save+0x113/0x1c0 [ 698.679963][ C1] ? stack_trace_snprint+0xf0/0xf0 [ 698.684952][ C1] __stack_depot_save+0x38d/0x470 [ 698.689770][ C1] ? kfree+0xc8/0x220 [ 698.693590][ C1] kasan_set_track+0x5d/0x70 [ 698.698014][ C1] ? kasan_set_track+0x4b/0x70 [ 698.702616][ C1] ? kasan_set_free_info+0x23/0x40 [ 698.707563][ C1] ? ____kasan_slab_free+0x126/0x160 [ 698.712684][ C1] ? __kasan_slab_free+0x11/0x20 [ 698.717457][ C1] ? slab_free_freelist_hook+0xbd/0x190 [ 698.722837][ C1] ? kfree+0xc8/0x220 [ 698.726656][ C1] ? sock_map_unref+0x352/0x4d0 [ 698.731344][ C1] ? sock_hash_delete_elem+0x274/0x2f0 [ 698.736648][ C1] ? bpf_prog_2c29ac5cdc6b1842+0x3a/0xe00 [ 698.742194][ C1] ? bpf_trace_run4+0x13f/0x270 [ 698.746880][ C1] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 698.752346][ C1] ? __traceiter_mm_page_alloc+0x3a/0x60 [ 698.757815][ C1] ? __alloc_pages+0x3cb/0x8f0 [ 698.762414][ C1] ? new_slab+0x9a/0x4e0 [ 698.766495][ C1] ? ___slab_alloc+0x39e/0x830 [ 698.771101][ C1] ? __slab_alloc+0x4a/0x90 [ 698.775435][ C1] ? kmem_cache_alloc+0x134/0x200 [ 698.780297][ C1] ? __kernfs_new_node+0xdb/0x700 [ 698.785157][ C1] ? kernfs_new_node+0x130/0x230 [ 698.789929][ C1] ? __kernfs_create_file+0x4a/0x270 [ 698.795048][ C1] ? sysfs_add_file_mode_ns+0x273/0x320 [ 698.800751][ C1] ? internal_create_group+0x573/0xf00 [ 698.806041][ C1] ? sysfs_create_groups+0x5b/0x130 [ 698.811077][ C1] ? device_add_attrs+0x8b/0x490 [ 698.815849][ C1] ? device_add+0x5f7/0xf10 [ 698.820188][ C1] ? netdev_register_kobject+0x177/0x320 [ 698.825663][ C1] ? register_netdevice+0xde9/0x1390 [ 698.830777][ C1] ? veth_newlink+0x72e/0xe20 [ 698.835289][ C1] ? rtnl_newlink+0x1495/0x2050 [ 698.839975][ C1] ? rtnetlink_rcv_msg+0x951/0xc40 [ 698.844921][ C1] ? netlink_rcv_skb+0x1cf/0x410 [ 698.849696][ C1] ? rtnetlink_rcv+0x1c/0x20 [ 698.854122][ C1] ? netlink_unicast+0x8df/0xac0 [ 698.858897][ C1] ? netlink_sendmsg+0xa0a/0xd20 [ 698.863670][ C1] ? __sys_sendto+0x564/0x720 [ 698.868301][ C1] ? __x64_sys_sendto+0xe5/0x100 [ 698.873077][ C1] ? do_syscall_64+0x3d/0xb0 [ 698.877505][ C1] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 698.883410][ C1] kasan_set_free_info+0x23/0x40 [ 698.888180][ C1] ____kasan_slab_free+0x126/0x160 [ 698.893134][ C1] __kasan_slab_free+0x11/0x20 [ 698.897729][ C1] slab_free_freelist_hook+0xbd/0x190 [ 698.902934][ C1] ? sock_map_unref+0x352/0x4d0 [ 698.907621][ C1] kfree+0xc8/0x220 [ 698.911267][ C1] sock_map_unref+0x352/0x4d0 [ 698.915781][ C1] sock_hash_delete_elem+0x274/0x2f0 [ 698.920899][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0xe00 [ 698.926280][ C1] bpf_trace_run4+0x13f/0x270 [ 698.930800][ C1] ? bpf_trace_run3+0x250/0x250 [ 698.935481][ C1] ? __alloc_pages+0x8f0/0x8f0 [ 698.940082][ C1] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 698.945374][ C1] __traceiter_mm_page_alloc+0x3a/0x60 [ 698.950670][ C1] __alloc_pages+0x3cb/0x8f0 [ 698.955105][ C1] ? prep_new_page+0x110/0x110 [ 698.959699][ C1] ? __kasan_check_write+0x14/0x20 [ 698.964646][ C1] ? node_tag_clear+0x203/0x330 [ 698.969330][ C1] ? kernfs_xattr_get+0x80/0x90 [ 698.974017][ C1] new_slab+0x9a/0x4e0 [ 698.977926][ C1] ___slab_alloc+0x39e/0x830 [ 698.982351][ C1] ? __kernfs_new_node+0xdb/0x700 [ 698.987209][ C1] ? __kernfs_new_node+0xdb/0x700 [ 698.992071][ C1] __slab_alloc+0x4a/0x90 [ 698.996236][ C1] ? __kernfs_new_node+0xdb/0x700 [ 699.001096][ C1] kmem_cache_alloc+0x134/0x200 [ 699.005784][ C1] __kernfs_new_node+0xdb/0x700 [ 699.010471][ C1] ? rwsem_write_trylock+0x15b/0x290 [ 699.015591][ C1] ? rwsem_mark_wake+0x6b0/0x6b0 [ 699.020450][ C1] ? kernfs_new_node+0x230/0x230 [ 699.025224][ C1] ? rwsem_write_trylock+0x15b/0x290 [ 699.030349][ C1] ? up_write+0x79/0x1f0 [ 699.034426][ C1] ? kernfs_activate+0x359/0x370 [ 699.039201][ C1] kernfs_new_node+0x130/0x230 [ 699.043879][ C1] __kernfs_create_file+0x4a/0x270 [ 699.048845][ C1] sysfs_add_file_mode_ns+0x273/0x320 [ 699.054048][ C1] internal_create_group+0x573/0xf00 [ 699.059169][ C1] ? up_write+0x79/0x1f0 [ 699.063336][ C1] ? sysfs_create_group+0x30/0x30 [ 699.068197][ C1] ? __kasan_check_write+0x14/0x20 [ 699.073138][ C1] ? kernfs_put+0x4e5/0x520 [ 699.077480][ C1] sysfs_create_groups+0x5b/0x130 [ 699.082341][ C1] device_add_attrs+0x8b/0x490 [ 699.086941][ C1] device_add+0x5f7/0xf10 [ 699.091107][ C1] netdev_register_kobject+0x177/0x320 [ 699.096401][ C1] ? raw_notifier_call_chain+0xdf/0xf0 [ 699.101695][ C1] register_netdevice+0xde9/0x1390 [ 699.106642][ C1] ? get_random_bytes+0x30/0x30 [ 699.111331][ C1] ? netif_stacked_transfer_operstate+0x240/0x240 [ 699.117614][ C1] ? rtnl_create_link+0x7ba/0x9d0 [ 699.122439][ C1] veth_newlink+0x72e/0xe20 [ 699.126779][ C1] ? veth_validate+0x200/0x200 [ 699.131386][ C1] ? rtnl_create_link+0x7ba/0x9d0 [ 699.136241][ C1] ? veth_validate+0x200/0x200 [ 699.140839][ C1] rtnl_newlink+0x1495/0x2050 [ 699.145367][ C1] ? rtnl_newlink+0x541/0x2050 [ 699.149956][ C1] ? rtnl_setlink+0x540/0x540 [ 699.154473][ C1] ? __kasan_check_write+0x14/0x20 [ 699.159505][ C1] ? _raw_spin_lock+0xa4/0x1b0 [ 699.164105][ C1] ? _raw_spin_trylock_bh+0x190/0x190 [ 699.169316][ C1] ? 0xffffffffa0028188 [ 699.173301][ C1] ? __mutex_lock_slowpath+0xe/0x10 [ 699.178336][ C1] ? mutex_lock+0x135/0x1e0 [ 699.182674][ C1] ? security_capable+0x87/0xb0 [ 699.187368][ C1] ? wait_for_completion_killable_timeout+0x10/0x10 [ 699.193787][ C1] ? ns_capable+0x89/0xe0 [ 699.197952][ C1] ? netlink_net_capable+0x125/0x160 [ 699.203071][ C1] ? rtnl_setlink+0x540/0x540 [ 699.207585][ C1] rtnetlink_rcv_msg+0x951/0xc40 [ 699.212361][ C1] ? rtnetlink_bind+0x80/0x80 [ 699.216874][ C1] ? stack_trace_save+0x1c0/0x1c0 [ 699.221732][ C1] ? __kernel_text_address+0x9b/0x110 [ 699.226940][ C1] ? unwind_get_return_address+0x4d/0x90 [ 699.232408][ C1] ? avc_has_perm_noaudit+0x348/0x430 [ 699.237617][ C1] ? memcpy+0x56/0x70 [ 699.241435][ C1] ? avc_has_perm_noaudit+0x2dd/0x430 [ 699.246643][ C1] ? avc_denied+0x1b0/0x1b0 [ 699.250982][ C1] ? avc_has_perm+0x16f/0x260 [ 699.255499][ C1] ? ____kasan_kmalloc+0xed/0x110 [ 699.260358][ C1] ? avc_has_perm_noaudit+0x430/0x430 [ 699.265565][ C1] netlink_rcv_skb+0x1cf/0x410 [ 699.270164][ C1] ? rtnetlink_bind+0x80/0x80 [ 699.274679][ C1] ? netlink_ack+0xb10/0xb10 [ 699.279104][ C1] ? __netlink_lookup+0x37b/0x3a0 [ 699.283962][ C1] rtnetlink_rcv+0x1c/0x20 [ 699.288215][ C1] netlink_unicast+0x8df/0xac0 [ 699.292818][ C1] ? netlink_detachskb+0x90/0x90 [ 699.297590][ C1] ? security_netlink_send+0x7b/0xa0 [ 699.302712][ C1] netlink_sendmsg+0xa0a/0xd20 [ 699.307313][ C1] ? netlink_getsockopt+0x560/0x560 [ 699.312351][ C1] ? security_socket_sendmsg+0x82/0xb0 [ 699.317641][ C1] ? netlink_getsockopt+0x560/0x560 [ 699.322674][ C1] __sys_sendto+0x564/0x720 [ 699.327024][ C1] ? __ia32_sys_getpeername+0x90/0x90 [ 699.332225][ C1] ? debug_smp_processor_id+0x17/0x20 [ 699.337430][ C1] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 699.343329][ C1] __x64_sys_sendto+0xe5/0x100 [ 699.347931][ C1] do_syscall_64+0x3d/0xb0 [ 699.352184][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 699.357912][ C1] RIP: 0033:0x7f7271019913 [ 699.362167][ C1] Code: 64 89 02 48 c7 c0 ff ff ff ff eb b7 66 2e 0f 1f 84 00 00 00 00 00 90 80 3d 31 dc 15 00 00 41 89 ca 74 14 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 75 c3 0f 1f 40 00 55 48 83 ec 30 44 89 4c 24 [ 699.381607][ C1] RSP: 002b:00007fffc544b3c8 EFLAGS: 00000202 ORIG_RAX: 000000000000002c [ 699.389860][ C1] RAX: ffffffffffffffda RBX: 00007f7271cd6620 RCX: 00007f7271019913 [ 699.397670][ C1] RDX: 000000000000006c RSI: 00007f7271cd6670 RDI: 0000000000000003 [ 699.405474][ C1] RBP: 0000000000000001 R08: 00007fffc544b3e4 R09: 000000000000000c [ 699.413288][ C1] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000003 [ 699.421099][ C1] R13: 0000000000000000 R14: 00007f7271cd6670 R15: 0000000000000000 [ 699.428920][ C1] [ 749.047445][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 143s! [syz.1.5195:14384] [ 749.055594][ C0] Modules linked in: [ 749.059327][ C0] CPU: 0 PID: 14384 Comm: syz.1.5195 Not tainted 5.15.150-syzkaller-00330-g9044d25b8ff5 #0 [ 749.069137][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 749.079032][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 749.083803][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 4b 02 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 749.103766][ C0] RSP: 0018:ffffc900009b7680 EFLAGS: 00000246 [ 749.109665][ C0] RAX: 0000000000000001 RBX: 1ffff92000136ed4 RCX: 1ffffffff0d1aa9c [ 749.117478][ C0] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7038ad4 [ 749.125289][ C0] RBP: ffffc900009b7730 R08: dffffc0000000000 R09: ffffed103ee0715b [ 749.133106][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 749.140912][ C0] R13: ffff8881f7038ad4 R14: 0000000000000001 R15: 1ffff92000136ed8 [ 749.148726][ C0] FS: 00007f1744ee36c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 749.157489][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 749.163918][ C0] CR2: 00007f01ff4569c8 CR3: 0000000119b38000 CR4: 00000000003506b0 [ 749.172100][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 749.179902][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 749.187714][ C0] Call Trace: [ 749.190838][ C0] [ 749.193531][ C0] ? show_regs+0x58/0x60 [ 749.197607][ C0] ? watchdog_timer_fn+0x4b1/0x5f0 [ 749.202554][ C0] ? proc_watchdog_cpumask+0xd0/0xd0 [ 749.207676][ C0] ? __hrtimer_run_queues+0x41a/0xad0 [ 749.212883][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 749.217829][ C0] ? clockevents_program_event+0x22f/0x300 [ 749.223470][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 749.229373][ C0] ? hrtimer_interrupt+0x40c/0xaa0 [ 749.234329][ C0] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 749.240223][ C0] ? sysvec_apic_timer_interrupt+0x95/0xc0 [ 749.245864][ C0] [ 749.248643][ C0] [ 749.251419][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 749.257409][ C0] ? kvm_wait+0x147/0x180 [ 749.261574][ C0] ? asm_common_interrupt+0x27/0x40 [ 749.266985][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 749.271926][ C0] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 749.277827][ C0] ? prep_compound_page+0x271/0x4a0 [ 749.282862][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 749.289114][ C0] ? get_page_from_freelist+0x3550/0x35d0 [ 749.294668][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 749.299439][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 749.304472][ C0] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 749.309767][ C0] sock_hash_delete_elem+0xb1/0x2f0 [ 749.314800][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0xe00 [ 749.320181][ C0] bpf_trace_run4+0x13f/0x270 [ 749.324696][ C0] ? bpf_trace_run3+0x250/0x250 [ 749.329394][ C0] ? __alloc_pages+0x8f0/0x8f0 [ 749.333980][ C0] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 749.339276][ C0] __traceiter_mm_page_alloc+0x3a/0x60 [ 749.344569][ C0] __alloc_pages+0x3cb/0x8f0 [ 749.348999][ C0] ? prep_new_page+0x110/0x110 [ 749.353598][ C0] kmalloc_order+0x4a/0x160 [ 749.357938][ C0] kmalloc_order_trace+0x1a/0xb0 [ 749.362723][ C0] __kmalloc+0x19c/0x270 [ 749.366791][ C0] ? slhc_init+0xb6/0x7a0 [ 749.370955][ C0] slhc_init+0x16c/0x7a0 [ 749.375035][ C0] ppp_ioctl+0x13de/0x19a0 [ 749.379288][ C0] ? ppp_poll+0x250/0x250 [ 749.383454][ C0] ? security_file_ioctl+0x84/0xb0 [ 749.388402][ C0] ? ppp_poll+0x250/0x250 [ 749.392567][ C0] __se_sys_ioctl+0x114/0x190 [ 749.397084][ C0] __x64_sys_ioctl+0x7b/0x90 [ 749.401507][ C0] do_syscall_64+0x3d/0xb0 [ 749.405759][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 749.411489][ C0] RIP: 0033:0x7f1745c61bd9 [ 749.415743][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 749.435182][ C0] RSP: 002b:00007f1744ee3048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 749.443427][ C0] RAX: ffffffffffffffda RBX: 00007f1745deff60 RCX: 00007f1745c61bd9 [ 749.451239][ C0] RDX: 000000002000000c RSI: 0000000040047451 RDI: 0000000000000003 [ 749.459050][ C0] RBP: 00007f1745cd0aa1 R08: 0000000000000000 R09: 0000000000000000 [ 749.466861][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 749.474673][ C0] R13: 000000000000000b R14: 00007f1745deff60 R15: 00007ffd73d6f868 [ 749.482491][ C0] [ 749.485351][ C0] Sending NMI from CPU 0 to CPUs 1: [ 749.490416][ C1] NMI backtrace for cpu 1 [ 749.490425][ C1] CPU: 1 PID: 14346 Comm: syz-executor Not tainted 5.15.150-syzkaller-00330-g9044d25b8ff5 #0 [ 749.490442][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 749.490452][ C1] RIP: 0010:kvm_wait+0x147/0x180 [ 749.490471][ C1] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 4b 02 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 749.490484][ C1] RSP: 0018:ffffc90000a55140 EFLAGS: 00000246 [ 749.490497][ C1] RAX: 0000000000000003 RBX: 1ffff9200014aa2c RCX: ffffffff8154fbbf [ 749.490509][ C1] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff888113165c18 [ 749.490520][ C1] RBP: ffffc90000a551f0 R08: dffffc0000000000 R09: ffffed102262cb84 [ 749.490531][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 749.490543][ C1] R13: ffff888113165c18 R14: 0000000000000003 R15: 1ffff9200014aa30 [ 749.490554][ C1] FS: 0000555555ecf500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 749.490569][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 749.490580][ C1] CR2: 0000000000000000 CR3: 0000000118300000 CR4: 00000000003506a0 [ 749.490594][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 749.490604][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 749.490614][ C1] Call Trace: [ 749.490619][ C1] [ 749.490626][ C1] ? show_regs+0x58/0x60 [ 749.490643][ C1] ? nmi_cpu_backtrace+0x29f/0x300 [ 749.490662][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 749.490681][ C1] ? kvm_wait+0x147/0x180 [ 749.490694][ C1] ? kvm_wait+0x147/0x180 [ 749.490708][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 749.490725][ C1] ? nmi_handle+0xa8/0x280 [ 749.490740][ C1] ? kvm_wait+0x147/0x180 [ 749.490754][ C1] ? default_do_nmi+0x69/0x160 [ 749.490771][ C1] ? exc_nmi+0xaf/0x120 [ 749.490785][ C1] ? end_repeat_nmi+0x16/0x31 [ 749.490801][ C1] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 749.490820][ C1] ? kvm_wait+0x147/0x180 [ 749.490834][ C1] ? kvm_wait+0x147/0x180 [ 749.490848][ C1] ? kvm_wait+0x147/0x180 [ 749.490861][ C1] [ 749.490866][ C1] [ 749.490872][ C1] ? asm_common_interrupt+0x27/0x40 [ 749.490886][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 749.490902][ C1] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 749.490920][ C1] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 749.490936][ C1] ? post_alloc_hook+0x1a3/0x1b0 [ 749.490954][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 749.490971][ C1] ? get_page_from_freelist+0x3550/0x35d0 [ 749.490989][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 749.491006][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 749.491023][ C1] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 749.491040][ C1] sock_hash_delete_elem+0xb1/0x2f0 [ 749.491057][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0xe00 [ 749.491070][ C1] bpf_trace_run4+0x13f/0x270 [ 749.491087][ C1] ? bpf_trace_run3+0x250/0x250 [ 749.491105][ C1] ? __alloc_pages+0x8f0/0x8f0 [ 749.491121][ C1] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 749.491137][ C1] __traceiter_mm_page_alloc+0x3a/0x60 [ 749.491152][ C1] __alloc_pages+0x3cb/0x8f0 [ 749.491168][ C1] ? prep_new_page+0x110/0x110 [ 749.491184][ C1] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 749.491200][ C1] ? stack_trace_save+0x113/0x1c0 [ 749.491217][ C1] __stack_depot_save+0x38d/0x470 [ 749.491232][ C1] stack_depot_save+0xe/0x10 [ 749.491245][ C1] save_stack+0x104/0x1e0 [ 749.491260][ C1] ? __reset_page_owner+0x190/0x190 [ 749.491274][ C1] ? post_alloc_hook+0x1a3/0x1b0 [ 749.491288][ C1] ? prep_new_page+0x1b/0x110 [ 749.491303][ C1] ? get_page_from_freelist+0x3550/0x35d0 [ 749.491320][ C1] ? __alloc_pages+0x27e/0x8f0 [ 749.491334][ C1] ? __stack_depot_save+0x38d/0x470 [ 749.491348][ C1] ? kasan_set_track+0x5d/0x70 [ 749.491362][ C1] ? kasan_set_free_info+0x23/0x40 [ 749.491377][ C1] ? ____kasan_slab_free+0x126/0x160 [ 749.491391][ C1] ? __kasan_slab_free+0x11/0x20 [ 749.491409][ C1] ? slab_free_freelist_hook+0xbd/0x190 [ 749.491427][ C1] ? kfree+0xc8/0x220 [ 749.491441][ C1] ? sock_map_unref+0x352/0x4d0 [ 749.491456][ C1] ? sock_hash_delete_elem+0x274/0x2f0 [ 749.491472][ C1] ? bpf_prog_2c29ac5cdc6b1842+0x3a/0xe00 [ 749.491484][ C1] ? bpf_trace_run4+0x13f/0x270 [ 749.491500][ C1] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 749.491514][ C1] ? stack_trace_save+0x1c0/0x1c0 [ 749.491529][ C1] ? __kernel_text_address+0x9b/0x110 [ 749.491546][ C1] __set_page_owner+0x28/0x2e0 [ 749.491560][ C1] ? kernel_init_free_pages+0xda/0xf0 [ 749.491576][ C1] post_alloc_hook+0x1a3/0x1b0 [ 749.491592][ C1] prep_new_page+0x1b/0x110 [ 749.491608][ C1] get_page_from_freelist+0x3550/0x35d0 [ 749.491631][ C1] ? lruvec_init+0x150/0x150 [ 749.491648][ C1] ? __alloc_pages+0x8f0/0x8f0 [ 749.491665][ C1] ? __alloc_pages_bulk+0xe40/0xe40 [ 749.491680][ C1] ? stack_trace_save+0x1c0/0x1c0 [ 749.491697][ C1] __alloc_pages+0x27e/0x8f0 [ 749.491713][ C1] ? prep_new_page+0x110/0x110 [ 749.491730][ C1] ? stack_trace_save+0x113/0x1c0 [ 749.491746][ C1] ? stack_trace_snprint+0xf0/0xf0 [ 749.491762][ C1] __stack_depot_save+0x38d/0x470 [ 749.491776][ C1] ? kfree+0xc8/0x220 [ 749.491791][ C1] kasan_set_track+0x5d/0x70 [ 749.491805][ C1] ? kasan_set_track+0x4b/0x70 [ 749.491818][ C1] ? kasan_set_free_info+0x23/0x40 [ 749.491833][ C1] ? ____kasan_slab_free+0x126/0x160 [ 749.491847][ C1] ? __kasan_slab_free+0x11/0x20 [ 749.491861][ C1] ? slab_free_freelist_hook+0xbd/0x190 [ 749.491878][ C1] ? kfree+0xc8/0x220 [ 749.491892][ C1] ? sock_map_unref+0x352/0x4d0 [ 749.491907][ C1] ? sock_hash_delete_elem+0x274/0x2f0 [ 749.491923][ C1] ? bpf_prog_2c29ac5cdc6b1842+0x3a/0xe00 [ 749.491935][ C1] ? bpf_trace_run4+0x13f/0x270 [ 749.491950][ C1] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 749.491965][ C1] ? __traceiter_mm_page_alloc+0x3a/0x60 [ 749.491980][ C1] ? __alloc_pages+0x3cb/0x8f0 [ 749.491995][ C1] ? new_slab+0x9a/0x4e0 [ 749.492006][ C1] ? ___slab_alloc+0x39e/0x830 [ 749.492021][ C1] ? __slab_alloc+0x4a/0x90 [ 749.492037][ C1] ? kmem_cache_alloc+0x134/0x200 [ 749.492052][ C1] ? __kernfs_new_node+0xdb/0x700 [ 749.492069][ C1] ? kernfs_new_node+0x130/0x230 [ 749.492084][ C1] ? __kernfs_create_file+0x4a/0x270 [ 749.492101][ C1] ? sysfs_add_file_mode_ns+0x273/0x320 [ 749.492115][ C1] ? internal_create_group+0x573/0xf00 [ 749.492129][ C1] ? sysfs_create_groups+0x5b/0x130 [ 749.492143][ C1] ? device_add_attrs+0x8b/0x490 [ 749.492160][ C1] ? device_add+0x5f7/0xf10 [ 749.492175][ C1] ? netdev_register_kobject+0x177/0x320 [ 749.492193][ C1] ? register_netdevice+0xde9/0x1390 [ 749.492207][ C1] ? veth_newlink+0x72e/0xe20 [ 749.492220][ C1] ? rtnl_newlink+0x1495/0x2050 [ 749.492234][ C1] ? rtnetlink_rcv_msg+0x951/0xc40 [ 749.492248][ C1] ? netlink_rcv_skb+0x1cf/0x410 [ 749.492264][ C1] ? rtnetlink_rcv+0x1c/0x20 [ 749.492277][ C1] ? netlink_unicast+0x8df/0xac0 [ 749.492292][ C1] ? netlink_sendmsg+0xa0a/0xd20 [ 749.492308][ C1] ? __sys_sendto+0x564/0x720 [ 749.492322][ C1] ? __x64_sys_sendto+0xe5/0x100 [ 749.492336][ C1] ? do_syscall_64+0x3d/0xb0 [ 749.492350][ C1] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 749.492370][ C1] kasan_set_free_info+0x23/0x40 [ 749.492385][ C1] ____kasan_slab_free+0x126/0x160 [ 749.492400][ C1] __kasan_slab_free+0x11/0x20 [ 749.492419][ C1] slab_free_freelist_hook+0xbd/0x190 [ 749.492437][ C1] ? sock_map_unref+0x352/0x4d0 [ 749.492452][ C1] kfree+0xc8/0x220 [ 749.492468][ C1] sock_map_unref+0x352/0x4d0 [ 749.492485][ C1] sock_hash_delete_elem+0x274/0x2f0 [ 749.492503][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0xe00 [ 749.492515][ C1] bpf_trace_run4+0x13f/0x270 [ 749.492531][ C1] ? bpf_trace_run3+0x250/0x250 [ 749.492548][ C1] ? __alloc_pages+0x8f0/0x8f0 [ 749.492564][ C1] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 749.492580][ C1] __traceiter_mm_page_alloc+0x3a/0x60 [ 749.492595][ C1] __alloc_pages+0x3cb/0x8f0 [ 749.492610][ C1] ? prep_new_page+0x110/0x110 [ 749.492627][ C1] ? __kasan_check_write+0x14/0x20 [ 749.492642][ C1] ? node_tag_clear+0x203/0x330 [ 749.492658][ C1] ? kernfs_xattr_get+0x80/0x90 [ 749.492675][ C1] new_slab+0x9a/0x4e0 [ 749.492688][ C1] ___slab_alloc+0x39e/0x830 [ 749.492703][ C1] ? __kernfs_new_node+0xdb/0x700 [ 749.492720][ C1] ? __kernfs_new_node+0xdb/0x700 [ 749.492736][ C1] __slab_alloc+0x4a/0x90 [ 749.492752][ C1] ? __kernfs_new_node+0xdb/0x700 [ 749.492767][ C1] kmem_cache_alloc+0x134/0x200 [ 749.492784][ C1] __kernfs_new_node+0xdb/0x700 [ 749.492799][ C1] ? rwsem_write_trylock+0x15b/0x290 [ 749.492815][ C1] ? rwsem_mark_wake+0x6b0/0x6b0 [ 749.492831][ C1] ? kernfs_new_node+0x230/0x230 [ 749.492846][ C1] ? rwsem_write_trylock+0x15b/0x290 [ 749.492862][ C1] ? up_write+0x79/0x1f0 [ 749.492877][ C1] ? kernfs_activate+0x359/0x370 [ 749.492894][ C1] kernfs_new_node+0x130/0x230 [ 749.492911][ C1] __kernfs_create_file+0x4a/0x270 [ 749.492928][ C1] sysfs_add_file_mode_ns+0x273/0x320 [ 749.492943][ C1] internal_create_group+0x573/0xf00 [ 749.492958][ C1] ? up_write+0x79/0x1f0 [ 749.492974][ C1] ? sysfs_create_group+0x30/0x30 [ 749.492988][ C1] ? __kasan_check_write+0x14/0x20 [ 749.493003][ C1] ? kernfs_put+0x4e5/0x520 [ 749.493019][ C1] sysfs_create_groups+0x5b/0x130 [ 749.493034][ C1] device_add_attrs+0x8b/0x490 [ 749.493050][ C1] device_add+0x5f7/0xf10 [ 749.493067][ C1] netdev_register_kobject+0x177/0x320 [ 749.493084][ C1] ? raw_notifier_call_chain+0xdf/0xf0 [ 749.493102][ C1] register_netdevice+0xde9/0x1390 [ 749.493116][ C1] ? get_random_bytes+0x30/0x30 [ 749.493135][ C1] ? netif_stacked_transfer_operstate+0x240/0x240 [ 749.493151][ C1] ? rtnl_create_link+0x7ba/0x9d0 [ 749.493166][ C1] veth_newlink+0x72e/0xe20 [ 749.493180][ C1] ? veth_validate+0x200/0x200 [ 749.493202][ C1] ? rtnl_create_link+0x7ba/0x9d0 [ 749.493217][ C1] ? veth_validate+0x200/0x200 [ 749.493230][ C1] rtnl_newlink+0x1495/0x2050 [ 749.493246][ C1] ? rtnl_newlink+0x541/0x2050 [ 749.493261][ C1] ? rtnl_setlink+0x540/0x540 [ 749.493280][ C1] ? __kasan_check_write+0x14/0x20 [ 749.493295][ C1] ? _raw_spin_lock+0xa4/0x1b0 [ 749.493311][ C1] ? _raw_spin_trylock_bh+0x190/0x190 [ 749.493337][ C1] ? 0xffffffffa0028188 [ 749.493348][ C1] ? __mutex_lock_slowpath+0xe/0x10 [ 749.493363][ C1] ? mutex_lock+0x135/0x1e0 [ 749.493378][ C1] ? security_capable+0x87/0xb0 [ 749.493394][ C1] ? wait_for_completion_killable_timeout+0x10/0x10 [ 749.493416][ C1] ? ns_capable+0x89/0xe0 [ 749.493430][ C1] ? netlink_net_capable+0x125/0x160 [ 749.493445][ C1] ? rtnl_setlink+0x540/0x540 [ 749.493459][ C1] rtnetlink_rcv_msg+0x951/0xc40 [ 749.493475][ C1] ? rtnetlink_bind+0x80/0x80 [ 749.493490][ C1] ? stack_trace_save+0x1c0/0x1c0 [ 749.493505][ C1] ? __kernel_text_address+0x9b/0x110 [ 749.493520][ C1] ? unwind_get_return_address+0x4d/0x90 [ 749.493537][ C1] ? avc_has_perm_noaudit+0x348/0x430 [ 749.493553][ C1] ? memcpy+0x56/0x70 [ 749.493568][ C1] ? avc_has_perm_noaudit+0x2dd/0x430 [ 749.493585][ C1] ? avc_denied+0x1b0/0x1b0 [ 749.493602][ C1] ? avc_has_perm+0x16f/0x260 [ 749.493616][ C1] ? ____kasan_kmalloc+0xed/0x110 [ 749.493632][ C1] ? avc_has_perm_noaudit+0x430/0x430 [ 749.493649][ C1] netlink_rcv_skb+0x1cf/0x410 [ 749.493665][ C1] ? rtnetlink_bind+0x80/0x80 [ 749.493680][ C1] ? netlink_ack+0xb10/0xb10 [ 749.493697][ C1] ? __netlink_lookup+0x37b/0x3a0 [ 749.493714][ C1] rtnetlink_rcv+0x1c/0x20 [ 749.493728][ C1] netlink_unicast+0x8df/0xac0 [ 749.493746][ C1] ? netlink_detachskb+0x90/0x90 [ 749.493762][ C1] ? security_netlink_send+0x7b/0xa0 [ 749.493777][ C1] netlink_sendmsg+0xa0a/0xd20 [ 749.493795][ C1] ? netlink_getsockopt+0x560/0x560 [ 749.493813][ C1] ? security_socket_sendmsg+0x82/0xb0 [ 749.493828][ C1] ? netlink_getsockopt+0x560/0x560 [ 749.493844][ C1] __sys_sendto+0x564/0x720 [ 749.493859][ C1] ? __ia32_sys_getpeername+0x90/0x90 [ 749.493879][ C1] ? debug_smp_processor_id+0x17/0x20 [ 749.493895][ C1] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 749.493913][ C1] __x64_sys_sendto+0xe5/0x100 [ 749.493928][ C1] do_syscall_64+0x3d/0xb0 [ 749.493943][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 749.493957][ C1] RIP: 0033:0x7f7271019913 [ 749.493970][ C1] Code: 64 89 02 48 c7 c0 ff ff ff ff eb b7 66 2e 0f 1f 84 00 00 00 00 00 90 80 3d 31 dc 15 00 00 41 89 ca 74 14 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 75 c3 0f 1f 40 00 55 48 83 ec 30 44 89 4c 24 [ 749.493983][ C1] RSP: 002b:00007fffc544b3c8 EFLAGS: 00000202 ORIG_RAX: 000000000000002c [ 749.493998][ C1] RAX: ffffffffffffffda RBX: 00007f7271cd6620 RCX: 00007f7271019913 [ 749.494009][ C1] RDX: 000000000000006c RSI: 00007f7271cd6670 RDI: 0000000000000003 [ 749.494020][ C1] RBP: 0000000000000001 R08: 00007fffc544b3e4 R09: 000000000000000c [ 749.494029][ C1] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000003 [ 749.494039][ C1] R13: 0000000000000000 R14: 00007f7271cd6670 R15: 0000000000000000 [ 749.494052][ C1]