last executing test programs: 5.090410642s ago: executing program 3 (id=12422): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES8=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="b4050000000095000000000000000000000000000000000073e4c4d615e06badbb0889516b946f10da274b96d7520f293d4d86"], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180), 0x4) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x50) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x1d, &(0x7f00000003c0), 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x23, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) close(r2) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x13, 0x7, 0xfffe, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00'}, 0x10) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x1001) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) 5.088219982s ago: executing program 1 (id=12423): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r3) 5.029321657s ago: executing program 3 (id=12424): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000003c0)='mm_lru_insertion\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x16, 0x9, 0x5, 0x4, 0x0, 0x8000000000000000, 0x4, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0x5}, 0x0, 0xfffffffffffff03c, 0x958, 0x3, 0x2, 0x401, 0xffff, 0x0, 0x7, 0x0, 0xdd3}, 0xffffffffffffffff, 0x8, r2, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB='\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b70400000000000085000000"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x8, 0x8, 0x8, 0x0, 0x1}, 0x48) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) 4.742986781s ago: executing program 1 (id=12427): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000080)='sys_enter\x00', r2}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="2801"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000200)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000000340)=[0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe5, &(0x7f00000003c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000400), &(0x7f00000004c0), 0x8, 0xeb, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.stat\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r6, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000005c0)={0x0, 0x0}, 0x8) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000940)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, [@exit]}, &(0x7f0000000780)='syzkaller\x00', 0x141, 0x7d, &(0x7f00000007c0)=""/125, 0x41100, 0x38, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000840)={0x0, 0x4, 0x100, 0xb136}, 0x10, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000880)=[r0], &(0x7f00000008c0)=[{0x2, 0x4, 0x5, 0xc}, {0x1, 0x3, 0x6, 0x2}, {0x4, 0x101, 0x5, 0xa}, {0x4, 0x1, 0x5, 0x9}, {0x2, 0x2, 0x6, 0x1}], 0x10, 0x25273edc}, 0x90) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000a00)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x3}, 0x48) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r10, 0x0, 0x0}, 0x20) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x48) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x9, 0x1, r11}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r12, &(0x7f0000000300), 0x20000000}, 0x20) close(r10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r12}, &(0x7f0000000180), &(0x7f00000001c0)=r11}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x2, 0x7, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0xfffffffb}, [@map_val={0x18, 0x13, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x9f}, @call={0x85, 0x0, 0x0, 0x44}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}]}, &(0x7f00000001c0)='syzkaller\x00', 0xffff, 0xa7, &(0x7f0000000280)=""/167, 0x41100, 0x44, '\x00', r5, 0x13, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x1, 0x0, 0x4, 0x290}, 0x10, r7, r8, 0x2, &(0x7f0000000a80)=[0x1, r0, r0, r9], &(0x7f0000000ac0)=[{0x0, 0x5, 0x8, 0x3}, {0x2, 0x5, 0x0, 0x4}], 0x10, 0x6}, 0x90) 4.730917342s ago: executing program 3 (id=12428): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd63499ad2}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, 0x0, &(0x7f00000002c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) write$cgroup_subtree(r0, 0x0, 0x7ffffffff000) 4.669126367s ago: executing program 1 (id=12429): recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x60}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033300fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000003c0)={0x6, &(0x7f0000000380)=[{0xf7, 0x6, 0xc, 0x7fff}, {0x1, 0x27, 0x6, 0x3}, {0x58b, 0xe4, 0x4e, 0xaf}, {0x5300, 0x0, 0x9, 0x4}, {0x1, 0xb9, 0x1d, 0x3}, {0x4, 0x5, 0x7, 0x81}]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000040)=ANY=[@ANYRESOCT=r1, @ANYRES32=r3, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xa, 0x4, 0x4, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x1a, &(0x7f0000000000)=ANY=[@ANYRES16=r5, @ANYRES32=r5, @ANYRESHEX=r5], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b7080000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x6, 0x5, 0x42}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x2, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x9, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x672}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, r0, 0x7, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', r7}, 0x18) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x31, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) write$cgroup_subtree(r10, &(0x7f0000000100)=ANY=[@ANYBLOB="8fcacb7907051175f37538e486dd"], 0xfdef) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r11}, 0x10) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000700000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='percpu_alloc_percpu\x00', r12}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x8, 0x8, 0x8}, 0x48) syz_clone(0x8020000, 0x0, 0x0, 0x0, 0x0, 0x0) 4.525110099s ago: executing program 3 (id=12431): bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x8, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r0, r1, 0x0, 0x12, &(0x7f0000000100)='./cgroup.net/syz1\x00'}, 0x30) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x28) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000004340)={0x6, 0x14, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r5}, 0xc) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{}, &(0x7f0000000080), 0x0}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000010b00dfd80d897c184adf87fac1fbf3ff00000000bd55cd9541f4555f509cb71d1ce6bd1a70210a550a7e546f21", @ANYRESDEC=r3], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="180000000000000000000000000000007112390000000000950000001d000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x1000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.io_service_bytes\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000008510000000", @ANYRES32, @ANYBLOB="0000000000000000180000000000000000000000000000009500000000000000a60a000000000000180100002020782500000000002020207b1af8ff00000000bfa10000000000000701000000feffffb702000008000000b703000000000000850000002d0000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000030000010000000100000f010000000000000000000000000000002e000000000000000f030000001f0f830061006bef42662d31004a6dec8abe72593b9f11753c7b9c19afcc5c78079035c3083c9f84ee44975d7da03f45f876e3b73443d77c956f6157f54d7e1d3f550e057a93f9aa76a0af7ca836df4e726d418e5af3f12dcf3f22eeb1585c66cf5a47c789cc605b9f9aa5708845444caf8e4bdcb40a2de1fe8076ca3636685aff982a9f2a"], 0x0, 0x43}, 0x20) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r7, 0x40047438, 0x20000014) ioctl$TUNSETOFFLOAD(r6, 0x40047440, 0x2000000c) 4.039583028s ago: executing program 1 (id=12433): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80), 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{r0}, &(0x7f00000005c0), &(0x7f0000000600)='%-010d \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0), 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0xc4, &(0x7f0000000c80)=[{}, {}, {}, {}, {}], 0xfffffffffffffef9, 0x10, &(0x7f0000000cc0), &(0x7f0000000d00), 0x8, 0xbc, 0x8, 0x8, &(0x7f0000000d40)}}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x7, 0xf6bb, 0x8, 0x4002, r2, 0x2, '\x00', r5, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0x5}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000300)='tlb_flush\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xfffffffd, 0x7fe2, 0x2}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1a, 0x4, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r10, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r11], 0x18}, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0xff32, &(0x7f0000000340)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES8=r7, @ANYRES8=r6], 0x18, 0x4000000}, 0x5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) close(r12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='sctp_probe\x00', r4}, 0x10) r13 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f00000009c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYBLOB="761a45b79f5cacece29551bf0e18388b3cb67321a6cb8779e485df136d1e8ff75638a019fe222f0a3f6ccbf88412715c49fd86995ea776eac84f9675191d38bee88a4b08ebbd5cda767fdf7cdce1010c20ee2f2c5ab1e2322c4368e857119961c419cd986990c7bd2c863c64e6aad9bf13371ed7ab971b42497e159e7f9bc7e47ee373ccb1eff1746ed6e33bf234afb98e66c7eb4521ce47d84891b0c35892484b73057c22387206a74ff19c91670d6da3e75747b1f7a3592f83321a4b4cadcc", @ANYBLOB="0000000000000000b702000000000000b70300002bb91a008500000008000000bc0900000000000045090100002000009500000000000000b7020000010000007b9af8ff00000000b5090000000000007baaf0ff00000000bf2700000000000007080000ffab911b1b56e09fc3c59a28fdffffbf9000000000000007040000f0ffffffc4", @ANYRES32=r13, @ANYBLOB="0000000000000000b7050000080000004608efff76000000bf9800000000000056090000000000008500000000000000b7000000000000009500000000000000", @ANYRES32], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) 3.549459979s ago: executing program 3 (id=12436): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd63499ad2}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, 0x0, &(0x7f00000002c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) write$cgroup_subtree(r0, 0x0, 0x7ffffffff000) 3.29427379s ago: executing program 3 (id=12441): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8d, 0x8d, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3, 0x94b}}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x8}, {0xd, 0x2}, {0x10}, {0x10, 0x5}, {0x3, 0xe06}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0x4e, 0x0, 0x2, 0x6}, @datasec={0x6, 0x3, 0x0, 0xf, 0x1, [{0x4, 0xa2a}, {0x4, 0xfb7, 0x313b}, {0x2, 0x0, 0x4f}], "aa"}]}, {0x0, [0x5f, 0x61, 0x61, 0x2e, 0x5f, 0x30, 0x60]}}, 0x0, 0xb1}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x7, 0xfff, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000180), &(0x7f00000003c0)=r2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000010700000000000000000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r4}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x20000000}, 0x20) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x20000000}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x1a, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x0, 0x0, 0x23b}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}, @jmp={0x5, 0x0, 0x0, 0x4, 0xa, 0x80, 0xfffffffffffffffc}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @ldst={0x3, 0x2, 0x0, 0x1, 0x9, 0x0, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @alu={0x4, 0x0, 0x0, 0x2, 0x2, 0x50, 0x8}, @alu={0x7, 0x0, 0x2, 0x0, 0x6, 0x0, 0x1}, @generic={0xf5, 0x4, 0x7, 0x1}, @ringbuf_query]}, &(0x7f0000000340)='GPL\x00', 0x8, 0xb2, &(0x7f0000000780)=""/178, 0x41100, 0x30, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x8}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.723775068s ago: executing program 0 (id=12449): bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x8, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r0, r1, 0x0, 0x12, &(0x7f0000000100)='./cgroup.net/syz1\x00'}, 0x30) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x28) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000004340)={0x6, 0x14, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r5}, 0xc) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{}, &(0x7f0000000080), 0x0}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000010b00dfd80d897c184adf87fac1fbf3ff00000000bd55cd9541f4555f509cb71d1ce6bd1a70210a550a7e546f21", @ANYRESDEC=r3], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="180000000000000000000000000000007112390000000000950000001d000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x1000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.io_service_bytes\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000008510000000", @ANYRES32, @ANYBLOB="0000000000000000180000000000000000000000000000009500000000000000a60a000000000000180100002020782500000000002020207b1af8ff00000000bfa10000000000000701000000feffffb702000008000000b703000000000000850000002d0000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000030000010000000100000f010000000000000000000000000000002e000000000000000f030000001f0f830061006bef42662d31004a6dec8abe72593b9f11753c7b9c19afcc5c78079035c3083c9f84ee44975d7da03f45f876e3b73443d77c956f6157f54d7e1d3f550e057a93f9aa76a0af7ca836df4e726d418e5af3f12dcf3f22eeb1585c66cf5a47c789cc605b9f9aa5708845444caf8e4bdcb40a2de1fe8076ca3636685aff982a9f2a"], 0x0, 0x43}, 0x20) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r7, 0x40047438, 0x20000014) ioctl$TUNSETOFFLOAD(r6, 0x40047440, 0x2000000c) 1.46144435s ago: executing program 0 (id=12452): recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x60}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033300fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000003c0)={0x6, &(0x7f0000000380)=[{0xf7, 0x6, 0xc, 0x7fff}, {0x1, 0x27, 0x6, 0x3}, {0x58b, 0xe4, 0x4e, 0xaf}, {0x5300, 0x0, 0x9, 0x4}, {0x1, 0xb9, 0x1d, 0x3}, {0x4, 0x5, 0x7, 0x81}]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000040)=ANY=[@ANYRESOCT=r1, @ANYRES32=r3, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xa, 0x4, 0x4, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x1a, &(0x7f0000000000)=ANY=[@ANYRES16=r5, @ANYRES32=r5, @ANYRESHEX=r5], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b7080000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x6, 0x5, 0x42}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x2, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x9, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x672}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, r0, 0x7, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', r7}, 0x18) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x31, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) write$cgroup_subtree(r10, &(0x7f0000000100)=ANY=[@ANYBLOB="8fcacb7907051175f37538e486dd"], 0xfdef) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r11}, 0x10) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000700000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='percpu_alloc_percpu\x00', r12}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x8, 0x8, 0x8}, 0x48) syz_clone(0x8020000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.360261428s ago: executing program 2 (id=12454): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r1, 0x0, 0x0) 1.262358327s ago: executing program 2 (id=12455): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000340)={'vlan0\x00', 0x400}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r2, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) (fail_nth: 4) 836.510642ms ago: executing program 4 (id=12457): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xa, 0x4, 0x4, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x1a, &(0x7f00000005c0)=ANY=[@ANYRES16=r0, @ANYBLOB="1f3919da904db5e3560a586a8124dd83f8978457516974f210dabb6f4d653b7b5c384b506624d7796f8dedc7128036d2d546aaf9ddcfcd4ebd0e030b2742c1bcd26973aabb37d1d914396b74331d7fa7aaf97d36f3740eff72c608000044dfac35fe60e2c4fa5ce93073a171f842f431ce263313e483bbfab2c4ea6d63bafae37ab228816118f2712a32d2abdefdebd1d84486a385076c010333a582ad34bf965c08c3002bcced0969145a0403d2b383ae1380127bac7e455ea0a46cf6c454a5247ca973fefc77d4125d7e565204ddfbd57f333724b60b1229ca4b477d9de3de5ee26138813d014b2b65d07c8531ed7188", @ANYRESHEX=r0], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b7080000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$TUNSETLINK(r2, 0x400454cd, 0x104) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r2, 0x58, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000400)='ext4_sync_file_exit\x00', r6}, 0x10) write$cgroup_int(r5, &(0x7f0000000200), 0x43400) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x1, 0x8001, 0x337d6c8f, 0x2001, 0x1, 0xfffffff7, '\x00', r3, r2, 0x0, 0x3, 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000005"], 0x0, 0x26}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r2, &(0x7f00000013c0)="ef46c45939e046cb98e42ddd48d9aa5b0d71219820bd436453e72227f967cc8104eff5a58f6a3249e41da36b3a9df7dccdcf84822980b3310eaca7a3bd0d99c3600ccee6405d0767df0c6fe7d464c220c8f3b339f35a391c7762c20bcbdc97b7b47470097580d67e75895331f6f110bcb35e13c0", &(0x7f00000014c0)=""/230, 0x4}, 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000002c0)={r8}, 0x69) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$sock(r2, &(0x7f0000001880)={&(0x7f0000001600)=@generic={0x25, "90ac40879ff7099066ebe01cc365d976b25e8442036f497398fc9a7738d5c5b768b00651c49136c520cb07ea28fb857b61ab51ef68093afa2fafc4be3957f29c4d1633f3febdb00a867f9d99e56a974fba2d561c6fbfee6d232fea34c1237489aa294a6ea95bb84fc5d3c29b8e78fd28a893e671a4712d5f6341f6e55023"}, 0x80, &(0x7f00000016c0)=[{&(0x7f0000001680)="77ddcb5594eb7c0f23e875dbdac638f9664f7a618bfde6295f5388c728259a9e85c1fd", 0x23}], 0x1, &(0x7f0000001700)=[@mark={{0x14, 0x1, 0x24, 0x3}}, @timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x680}}, @txtime={{0x18, 0x1, 0x3d, 0x1f}}, @timestamping={{0x14, 0x1, 0x25, 0x8000}}, @mark={{0x14, 0x1, 0x24, 0x9b}}, @mark={{0x14, 0x1, 0x24, 0x80}}, @mark={{0x14, 0x1, 0x24, 0x5}}], 0xc0}, 0x4800) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffeca50000006d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000380)='kmem_cache_free\x00', r9}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0x8, 0x8}, 0x48) 824.667582ms ago: executing program 0 (id=12458): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='syzkaller\x00'}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='task_newtask\x00', r2}, 0x10) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r3}, 0x8) close(r4) 715.934641ms ago: executing program 2 (id=12459): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0xfffffff7, 0x3, 0xfffffffa, 0x264, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x3, 0xe}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000580)=ANY=[@ANYBLOB="b4050000200000006110600000000000c6000000000000009500000000000000f074be037592f760036063fe01cfe55060b9e67544d50207737c0265d6c147e6f2ea7dbd8f53f65deeab103ca918509882ed9ad6ae8c3723a08dabcc399e0a0f02fc76978d4a43f28ee73e5b04111ff9ade53b2670b95937319d20a2b9044f067b56c32b15c843eea982847d2ca68304ea29a94b60cde63631cd687c700ed670795b42a23fd65edcab0c2f3f781abd891b240330c2a82e779fe2e79c5937d094e9d82cf242ca"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x55, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6}, 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, r1}, 0x90) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000340), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xffff}, 0x0, 0xa, 0xffffffffffffffff, 0x3) r5 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000001c0)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="6102bf000020727700"], 0x9) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xc}, 0x0, 0xfffffffffffff510}, 0x0, 0x0, r4, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/uts\x00') r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7020000ff000000850000008600000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r10, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a655855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 715.380811ms ago: executing program 0 (id=12460): perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0xfc, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) (async) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x0, r1}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000140), 0x9) (async) write$cgroup_type(r2, &(0x7f0000000140), 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@bloom_filter={0x1e, 0x7, 0xd7, 0x10000, 0x810, 0x1, 0x2, '\x00', 0x0, r2, 0x3, 0x0, 0x1, 0x2}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x3}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000340)={{r4}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r7, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r7, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) close(r6) close(r5) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r9}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00'}, 0x10) 714.113231ms ago: executing program 4 (id=12461): bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0xafffffdfffffffff, 0xffffffffffffffff, 0x5) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000001bc0)=ANY=[@ANYBLOB="18000000000000009500"/32], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r7}, 0x10) write$cgroup_devices(r6, &(0x7f0000000240)=ANY=[], 0xffdd) recvmsg(r4, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x10000, 0x0) 657.891656ms ago: executing program 1 (id=12462): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000340)={'vlan0\x00', 0x400}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x5, 0x2, 0x5, 0x200b, 0xffffffffffffffff, 0xee, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x3, 0xf}, 0x8d) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f0000000980)=ANY=[@ANYBLOB], &(0x7f0000000880)=""/115, 0x2a, 0x73, 0x0, 0xb1}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYRES64=r1], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000005c0)='signal_generate\x00', r5}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0xb, &(0x7f0000000c00)=ANY=[@ANYRESHEX=r2, @ANYRES8, @ANYRES8, @ANYBLOB, @ANYRES32, @ANYBLOB="9e9d79b688197eeab0cff3749cdbe1f434e187028f0247104d0d22b7b5c19d967e934c8d16b5beb366b2d72d8a3754368737dc73e858a67df63011db13399014d613e6408e27603652e159f2da89d6f2a621e91a4442609f5694eb04f42ae20bb1c6431d51bfc59f505a8f22a81bb7bbdb857b3fd372bfd33454b2e7e7957c5034e6970f861f2a1c978415442e892d7867b562a390d921171ec033a43636ace081881e566176fed611949d8049a1db733cbc8cb01298b9f4562582a4e0a6"], &(0x7f0000000940)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x20000190) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x1d, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xa, 0x8, 0x1, 0x8, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r8, &(0x7f00000000c0), 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x5, 0x2, 0x7, 0x0, 0x1}, 0x48) 575.320452ms ago: executing program 0 (id=12463): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000440)='xen_mmu_release_ptpage\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x4}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000}, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe8, 0x0, &(0x7f0000000100)="b9ff03316844268cb89e14f086dd47e0ffff00120600631177fbac141416e000030a44079f03fec0000000000000000000000000002e01050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3ac", 0x0, 0xfe, 0x60000000}, 0x50) perf_event_open(&(0x7f0000000500)={0x0, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1b, 0x0, 0x2000, 0x8000, 0x848, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x3fe, 0x9}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000001180)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000040)=0xffffffffffff241d, 0x12) close(0xffffffffffffffff) r5 = gettid() r6 = gettid() perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x3c, 0x4, 0x7, 0x1, 0x0, 0x0, 0x800, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000380), 0xc}, 0x2000, 0xd1, 0x8, 0x4, 0xffffffffffff8c36, 0x5, 0xcb, 0x0, 0x60000000, 0x0, 0x7}, r6, 0x8, r2, 0x2) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r5, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 544.303745ms ago: executing program 0 (id=12464): bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{}, &(0x7f00000005c0), &(0x7f0000000600)='%-010d \x00'}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{}, &(0x7f00000002c0), &(0x7f0000000300)=r0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x10, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3ff}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@func, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x3}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffffff, 0xe0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0xc4, &(0x7f0000000c80)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000cc0), &(0x7f0000000d00), 0x8, 0x0, 0x8, 0x8, &(0x7f0000000d40)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x7, 0xf6bb, 0x8, 0x4002, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0x5}, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32=r7], 0x18}, 0x0) sendmsg$unix(r4, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r7], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) close(r8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00'}, 0x10) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r9}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r9}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) 445.401913ms ago: executing program 4 (id=12465): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r1, 0x0, 0x0) 349.867711ms ago: executing program 4 (id=12466): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8922, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xcd}, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd63"], 0xfdef) (async) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'pimreg0\x00', 0x1}) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x16, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffa0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43451) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000000)='ext4_request_inode\x00', r8}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x16, 0x17, &(0x7f0000000b00)=ANY=[@ANYBLOB="b7080000160000007b8af8ff007eb15053000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb702000008000000e1c717eba1699f9e44bc9b216507f3b6bca84f0e19240e09f0543ec2269c416e826888aeaedd131f00247d28c96003281c6d29aca927e5b975798069edacd728ac84c0a0b6e4f764c9e4397b8ad3dd8b43d47c87741e14b7c6d542050f7f6efb7cb0e9a8", @ANYRES32=r6, @ANYBLOB="0000000000000000b70500000800000085000000a50000004db72100fdffffff1854000003000000000000000000000018210000", @ANYRES32, @ANYBLOB="000000000000000162163000f0ffffff852000000500000085100000fdffffff18280000", @ANYRES32=r2, @ANYBLOB="00000000c7000000"], &(0x7f0000000580)='GPL\x00', 0x7fff, 0x35, &(0x7f00000005c0)=""/53, 0x41100, 0x21, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x5, 0x1, 0x1, 0x7fff}, 0x10, 0x0, r7, 0x3, 0x0, &(0x7f0000000cc0)=[{0x5, 0x2, 0x8, 0x2}, {0x0, 0x1, 0x2, 0x4}, {0x3, 0x3, 0x4, 0x9}], 0x10, 0x591f}, 0x90) (async) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x9, &(0x7f0000000040)=@generic={0x0, r9}, 0x18) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)=@generic={&(0x7f0000000180)='./file0\x00', r1}, 0x18) 304.628795ms ago: executing program 1 (id=12467): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd63499ad2}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059000000"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, 0x0, &(0x7f00000002c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) write$cgroup_subtree(r0, 0x0, 0x7ffffffff000) 156.785497ms ago: executing program 2 (id=12468): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xd, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000006c0)={{0x1}, &(0x7f0000000640), &(0x7f0000000680)='%-010d \x00'}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={0x0, 0x8, 0x8}, 0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb030018f7ffffffffffff0b0000000d00000002000000000001000000000400000000000017afce4f749e0a1bf21eac6a"], 0x0, 0x26}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x5, 0x1, 0x8, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 129.06021ms ago: executing program 4 (id=12469): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xd, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000006c0)={{0x1}, &(0x7f0000000640), &(0x7f0000000680)='%-010d \x00'}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={0x0, 0x8, 0x8}, 0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb030018f7ffffffffffff0b0000000d00000002000000000001000000000400000000000017afce4f749e0a1bf21eac6a"], 0x0, 0x26}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x5, 0x1, 0x8, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 73.089614ms ago: executing program 2 (id=12470): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='syzkaller\x00'}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='task_newtask\x00', r2}, 0x10) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r3}, 0x8) close(r4) 6.510229ms ago: executing program 2 (id=12471): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000340)={'vlan0\x00', 0x400}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r2, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) (fail_nth: 5) 0s ago: executing program 4 (id=12472): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x23, 0xb, 0x0, 0x10, 0xffffffffffffffff, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0xb}, 0x48) close(0xffffffffffffffff) (async) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="1b23000d"], 0xffdd) (async) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="1b23000d"], 0xffdd) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7280000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7280000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r3}, &(0x7f0000000540), &(0x7f0000000580)=r5}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r3, &(0x7f0000000780)}, 0x20) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/uts\x00') r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r7, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6}]}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\'\x00') ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) kernel console output (not intermixed with test programs): ] RAX: ffffffffffffffda RBX: 00007f6c2b058f80 RCX: 00007f6c2aeca9f9 [ 893.877310][ T599] RDX: 000000000000ffdd RSI: 0000000020001a40 RDI: 0000000000000009 [ 893.885570][ T599] RBP: 00007f6c29b4a0a0 R08: 0000000000000000 R09: 0000000000000000 [ 893.893823][ T599] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 893.903794][ T599] R13: 000000000000000b R14: 00007f6c2b058f80 R15: 00007fff3128df98 [ 894.060877][ T608] device syzkaller0 entered promiscuous mode [ 894.223343][ T598] device syzkaller0 entered promiscuous mode [ 894.276198][ T614] bridge_slave_0: mtu greater than device maximum [ 894.384630][ T628] bridge0: port 3(veth0_to_batadv) entered blocking state [ 894.392719][ T628] bridge0: port 3(veth0_to_batadv) entered disabled state [ 894.405259][ T628] device veth0_to_batadv entered promiscuous mode [ 894.437362][ T628] device veth0_to_batadv left promiscuous mode [ 894.446796][ T628] bridge0: port 3(veth0_to_batadv) entered disabled state [ 894.675179][ T649] device wg2 entered promiscuous mode [ 894.840263][ T655] FAULT_INJECTION: forcing a failure. [ 894.840263][ T655] name failslab, interval 1, probability 0, space 0, times 0 [ 894.924440][ T664] device syzkaller0 entered promiscuous mode [ 894.969183][ T655] CPU: 1 PID: 655 Comm: syz.0.10665 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 894.984867][ T655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 895.002892][ T655] Call Trace: [ 895.007124][ T655] dump_stack_lvl+0x1e2/0x24b [ 895.014135][ T655] ? panic+0x812/0x812 [ 895.019371][ T655] ? bfq_pos_tree_add_move+0x43b/0x43b [ 895.027017][ T655] dump_stack+0x15/0x17 [ 895.032963][ T655] should_fail+0x3c6/0x510 [ 895.038744][ T655] ? alloc_skb_with_frags+0xa1/0x570 [ 895.047799][ T655] __should_failslab+0xa4/0xe0 [ 895.053761][ T655] should_failslab+0x9/0x20 [ 895.060140][ T655] __kmalloc_track_caller+0x5f/0x320 [ 895.068307][ T655] ? kmem_cache_alloc+0x21e/0x2e0 [ 895.078178][ T655] ? __alloc_skb+0x80/0x510 [ 895.083435][ T655] ? alloc_skb_with_frags+0xa1/0x570 [ 895.092499][ T655] __alloc_skb+0xbc/0x510 [ 895.098255][ T655] ? iov_iter_advance+0x258/0xb20 [ 895.104537][ T655] alloc_skb_with_frags+0xa1/0x570 [ 895.110983][ T655] ? _copy_from_iter_full+0xa20/0xa20 [ 895.117769][ T655] sock_alloc_send_pskb+0x915/0xa50 [ 895.124115][ T655] ? sock_kzfree_s+0x60/0x60 [ 895.129953][ T655] ? _copy_from_iter_full+0xa20/0xa20 [ 895.135855][ T655] ? stack_trace_snprint+0xf0/0xf0 [ 895.142575][ T655] tun_get_user+0xe90/0x38f0 [ 895.148913][ T655] ? kmem_cache_free+0xa9/0x1e0 [ 895.154656][ T655] ? do_sys_openat2+0x1fc/0x710 [ 895.160150][ T655] ? _kstrtoull+0x3a0/0x4a0 [ 895.166171][ T655] ? tun_do_read+0x1f60/0x1f60 [ 895.171999][ T655] ? kstrtouint_from_user+0x20a/0x2a0 [ 895.178897][ T655] ? kstrtol_from_user+0x310/0x310 [ 895.184975][ T655] ? avc_policy_seqno+0x1b/0x70 [ 895.190414][ T655] ? selinux_file_permission+0x2bb/0x560 [ 895.196546][ T655] ? fsnotify_perm+0x67/0x4e0 [ 895.201757][ T655] tun_chr_write_iter+0x1a8/0x250 [ 895.207128][ T655] vfs_write+0xb4c/0xe70 [ 895.211707][ T655] ? kernel_write+0x3d0/0x3d0 [ 895.217447][ T655] ? __fdget_pos+0x209/0x3a0 [ 895.222499][ T655] ? ksys_write+0x77/0x2c0 [ 895.226818][ T655] ksys_write+0x199/0x2c0 [ 895.231666][ T655] ? __ia32_sys_read+0x90/0x90 [ 895.237839][ T655] ? debug_smp_processor_id+0x17/0x20 [ 895.246117][ T655] __x64_sys_write+0x7b/0x90 [ 895.252212][ T655] do_syscall_64+0x34/0x70 [ 895.259207][ T655] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 895.267846][ T655] RIP: 0033:0x7fdd5f3999f9 [ 895.272783][ T655] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 895.295843][ T655] RSP: 002b:00007fdd5e019048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 895.305936][ T655] RAX: ffffffffffffffda RBX: 00007fdd5f527f80 RCX: 00007fdd5f3999f9 [ 895.316701][ T655] RDX: 000000000000ffdd RSI: 0000000020001a40 RDI: 0000000000000009 [ 895.327153][ T655] RBP: 00007fdd5e0190a0 R08: 0000000000000000 R09: 0000000000000000 [ 895.337285][ T655] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 895.347877][ T655] R13: 000000000000000b R14: 00007fdd5f527f80 R15: 00007ffe48d8c4b8 [ 895.479699][ T679] device syzkaller0 entered promiscuous mode [ 896.227325][ T757] bridge0: port 3(veth0_to_batadv) entered blocking state [ 896.239340][ T757] bridge0: port 3(veth0_to_batadv) entered disabled state [ 896.296655][ T757] device veth0_to_batadv entered promiscuous mode [ 896.315114][ T769] device veth0_to_batadv left promiscuous mode [ 896.333101][ T769] bridge0: port 3(veth0_to_batadv) entered disabled state [ 898.425989][ T849] FAULT_INJECTION: forcing a failure. [ 898.425989][ T849] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 898.514779][ T849] CPU: 1 PID: 849 Comm: syz.0.10714 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 898.526344][ T849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 898.536241][ T849] Call Trace: [ 898.539956][ T849] dump_stack_lvl+0x1e2/0x24b [ 898.545237][ T849] ? bfq_pos_tree_add_move+0x43b/0x43b [ 898.551012][ T849] dump_stack+0x15/0x17 [ 898.555672][ T849] should_fail+0x3c6/0x510 [ 898.559995][ T849] should_fail_alloc_page+0x52/0x60 [ 898.565290][ T849] __alloc_pages_nodemask+0x1b3/0xaf0 [ 898.570607][ T849] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 898.576402][ T849] ? __kmalloc_track_caller+0x140/0x320 [ 898.581962][ T849] ? __kasan_check_write+0x14/0x20 [ 898.587181][ T849] ? __alloc_skb+0x37c/0x510 [ 898.594166][ T849] alloc_skb_with_frags+0x1b3/0x570 [ 898.599723][ T849] sock_alloc_send_pskb+0x915/0xa50 [ 898.605557][ T849] ? sock_kzfree_s+0x60/0x60 [ 898.611002][ T849] ? _copy_from_iter_full+0xa20/0xa20 [ 898.616712][ T849] ? __bad_area_nosemaphore+0xc4/0x430 [ 898.622174][ T849] tun_get_user+0xe90/0x38f0 [ 898.626884][ T849] ? exc_page_fault+0x33d/0x5b0 [ 898.631895][ T849] ? _kstrtoull+0x3a0/0x4a0 [ 898.636649][ T849] ? tun_do_read+0x1f60/0x1f60 [ 898.641780][ T849] ? kstrtouint_from_user+0x20a/0x2a0 [ 898.647556][ T849] ? copy_from_kernel_nofault_allowed+0x92/0xd0 [ 898.655356][ T849] ? kstrtol_from_user+0x310/0x310 [ 898.661354][ T849] ? strncpy_from_kernel_nofault+0x1c2/0x1e0 [ 898.668495][ T849] ? avc_policy_seqno+0x1b/0x70 [ 898.673969][ T849] ? selinux_file_permission+0x2bb/0x560 [ 898.679638][ T849] ? fsnotify_perm+0x67/0x4e0 [ 898.685415][ T849] tun_chr_write_iter+0x1a8/0x250 [ 898.690534][ T849] vfs_write+0xb4c/0xe70 [ 898.695489][ T849] ? kernel_write+0x3d0/0x3d0 [ 898.701156][ T849] ? __fdget_pos+0x209/0x3a0 [ 898.706973][ T849] ? ksys_write+0x77/0x2c0 [ 898.712139][ T849] ksys_write+0x199/0x2c0 [ 898.717689][ T849] ? __ia32_sys_read+0x90/0x90 [ 898.722842][ T849] ? debug_smp_processor_id+0x17/0x20 [ 898.728452][ T849] __x64_sys_write+0x7b/0x90 [ 898.733307][ T849] do_syscall_64+0x34/0x70 [ 898.737730][ T849] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 898.744323][ T849] RIP: 0033:0x7fdd5f3999f9 [ 898.749319][ T849] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 898.770784][ T849] RSP: 002b:00007fdd5dff8048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 898.781034][ T849] RAX: ffffffffffffffda RBX: 00007fdd5f528058 RCX: 00007fdd5f3999f9 [ 898.791997][ T849] RDX: 000000000000ffdd RSI: 0000000020001a40 RDI: 0000000000000009 [ 898.800695][ T849] RBP: 00007fdd5dff80a0 R08: 0000000000000000 R09: 0000000000000000 [ 898.809011][ T849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 898.817938][ T849] R13: 000000000000006e R14: 00007fdd5f528058 R15: 00007ffe48d8c4b8 [ 899.176194][ T879] device pim6reg1 entered promiscuous mode [ 899.914264][ T918] device syzkaller0 entered promiscuous mode [ 900.480332][ T919] device syzkaller0 entered promiscuous mode [ 901.760548][ T975] : renamed from ipvlan1 [ 902.361846][ T1007] FAULT_INJECTION: forcing a failure. [ 902.361846][ T1007] name failslab, interval 1, probability 0, space 0, times 0 [ 902.377637][ T1007] CPU: 1 PID: 1007 Comm: syz.1.10767 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 902.389001][ T1007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 902.398976][ T1007] Call Trace: [ 902.402118][ T1007] dump_stack_lvl+0x1e2/0x24b [ 902.406621][ T1007] ? bfq_pos_tree_add_move+0x43b/0x43b [ 902.411916][ T1007] ? btf_new_fd+0x142/0x9c0 [ 902.416300][ T1007] dump_stack+0x15/0x17 [ 902.421694][ T1007] should_fail+0x3c6/0x510 [ 902.426296][ T1007] ? btf_new_fd+0x287/0x9c0 [ 902.431148][ T1007] __should_failslab+0xa4/0xe0 [ 902.436218][ T1007] should_failslab+0x9/0x20 [ 902.441174][ T1007] kmem_cache_alloc_trace+0x3a/0x2e0 [ 902.447294][ T1007] ? btf_new_fd+0x112/0x9c0 [ 902.451916][ T1007] btf_new_fd+0x287/0x9c0 [ 902.456498][ T1007] __se_sys_bpf+0x1aed/0x11cb0 [ 902.461685][ T1007] ? perf_event_output_forward+0x14e/0x1b0 [ 902.468806][ T1007] ? perf_prepare_sample+0x1af0/0x1af0 [ 902.474562][ T1007] ? __x64_sys_bpf+0x90/0x90 [ 902.479785][ T1007] ? __this_cpu_preempt_check+0x13/0x20 [ 902.486781][ T1007] ? __perf_event_account_interrupt+0x18f/0x2c0 [ 902.493989][ T1007] ? hrtimer_forward+0x1a6/0x2c0 [ 902.501491][ T1007] ? perf_swevent_hrtimer+0x4b8/0x560 [ 902.509225][ T1007] ? irq_exit_rcu+0x9/0x10 [ 902.516648][ T1007] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 902.525289][ T1007] ? cpu_clock_event_read+0x50/0x50 [ 902.532630][ T1007] ? timerqueue_add+0x24c/0x270 [ 902.537618][ T1007] ? enqueue_hrtimer+0xad/0x200 [ 902.544180][ T1007] ? __hrtimer_run_queues+0x438/0xa50 [ 902.550239][ T1007] ? kvm_sched_clock_read+0x18/0x40 [ 902.556907][ T1007] ? sched_clock+0x3a/0x40 [ 902.561418][ T1007] ? sched_clock_cpu+0x1b/0x3b0 [ 902.566253][ T1007] ? sched_clock+0x3a/0x40 [ 902.570701][ T1007] ? __irq_exit_rcu+0x40/0x150 [ 902.576409][ T1007] __x64_sys_bpf+0x7b/0x90 [ 902.580759][ T1007] do_syscall_64+0x34/0x70 [ 902.585922][ T1007] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 902.592156][ T1007] RIP: 0033:0x7f6c25a4b9f9 [ 902.596514][ T1007] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 902.620785][ T1007] RSP: 002b:00007f6c246cb048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 902.630776][ T1007] RAX: ffffffffffffffda RBX: 00007f6c25bd9f80 RCX: 00007f6c25a4b9f9 [ 902.640877][ T1007] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 902.651693][ T1007] RBP: 00007f6c246cb0a0 R08: 0000000000000000 R09: 0000000000000000 [ 902.659901][ T1007] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 902.668737][ T1007] R13: 000000000000000b R14: 00007f6c25bd9f80 R15: 00007fffa3ed6c78 [ 902.837393][ T1029] syz.2.10775[1029] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 902.837462][ T1029] syz.2.10775[1029] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 903.069693][ T1029] device syzkaller0 entered promiscuous mode [ 905.231153][ T1078] syz.1.10788[1078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 905.238206][ T1078] syz.1.10788[1078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 910.356851][ T1209] bridge0: port 2(bridge_slave_1) entered disabled state [ 910.384956][ T1209] bridge0: port 1(bridge_slave_0) entered disabled state [ 911.207308][ T1245] bridge0: port 1(bridge_slave_0) entered blocking state [ 911.216936][ T1245] bridge0: port 1(bridge_slave_0) entered disabled state [ 911.226899][ T1245] device bridge_slave_0 entered promiscuous mode [ 911.243673][ T1245] bridge0: port 2(bridge_slave_1) entered blocking state [ 911.266096][ T1245] bridge0: port 2(bridge_slave_1) entered disabled state [ 911.306178][ T1245] device bridge_slave_1 entered promiscuous mode [ 911.364978][ T1273] device sit0 left promiscuous mode [ 911.427395][ T1273] device sit0 entered promiscuous mode [ 911.668792][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 911.680682][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 911.701796][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 911.713210][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 911.736154][ T54] bridge0: port 1(bridge_slave_0) entered blocking state [ 911.744478][ T54] bridge0: port 1(bridge_slave_0) entered forwarding state [ 911.757656][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 911.835485][ T1290] syz.1.10850[1290] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 911.835545][ T1290] syz.1.10850[1290] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 911.848061][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 911.871634][ T54] bridge0: port 2(bridge_slave_1) entered blocking state [ 911.879397][ T54] bridge0: port 2(bridge_slave_1) entered forwarding state [ 911.900042][T28130] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 911.913238][T28130] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 911.930341][T28130] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 911.976300][T28122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 912.002485][ T1245] device veth0_vlan entered promiscuous mode [ 912.030571][T28121] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 912.058177][T28121] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 912.095262][T28121] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 912.127397][T28121] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 912.139805][ T1245] device veth1_macvtap entered promiscuous mode [ 912.337679][T28121] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 912.365604][T28121] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 912.501170][T28121] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 912.564107][T28121] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 913.486958][ T1330] bridge0: port 1(bridge_slave_0) entered blocking state [ 913.498981][ T1330] bridge0: port 1(bridge_slave_0) entered disabled state [ 913.510327][ T1330] device bridge_slave_0 entered promiscuous mode [ 913.538562][ T1330] bridge0: port 2(bridge_slave_1) entered blocking state [ 913.557394][ T1330] bridge0: port 2(bridge_slave_1) entered disabled state [ 913.564852][ T1330] device bridge_slave_1 entered promiscuous mode [ 913.637100][ T1349] device vxcan1 entered promiscuous mode [ 913.989363][ T8228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 914.018813][ T8228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 914.064712][ T8228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 914.093995][ T8228] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 914.121114][ T8228] bridge0: port 1(bridge_slave_0) entered blocking state [ 914.132245][ T8228] bridge0: port 1(bridge_slave_0) entered forwarding state [ 914.232597][ T8228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 914.266810][ T8228] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 914.277546][ T8228] bridge0: port 2(bridge_slave_1) entered blocking state [ 914.285770][ T8228] bridge0: port 2(bridge_slave_1) entered forwarding state [ 914.315256][ T1379] bridge0: port 3(veth0_to_batadv) entered blocking state [ 914.333843][ T1379] bridge0: port 3(veth0_to_batadv) entered disabled state [ 914.372163][ T1379] device veth0_to_batadv entered promiscuous mode [ 914.384657][ T8228] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 914.398708][ T8228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 914.411404][ T8228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 914.428558][ T1389] device veth0_to_batadv left promiscuous mode [ 914.440511][ T1389] bridge0: port 3(veth0_to_batadv) entered disabled state [ 914.455183][ T1390] device pim6reg1 entered promiscuous mode [ 914.496319][T28130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 914.562837][ T1330] device veth0_vlan entered promiscuous mode [ 914.606472][T28604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 914.620581][T28604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 914.630731][T28604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 914.657664][ T1409] device veth1_macvtap left promiscuous mode [ 914.670578][T28604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 914.679842][T28604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 914.693278][ T1330] device veth1_macvtap entered promiscuous mode [ 914.751637][T30718] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 914.762455][T30718] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 914.776914][T30718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 914.787465][T30718] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 914.797732][T30718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 915.190869][ T684] device bridge_slave_1 left promiscuous mode [ 915.211677][ T684] bridge0: port 2(bridge_slave_1) entered disabled state [ 915.272496][ T684] bridge0: port 1(bridge_slave_0) entered disabled state [ 915.752732][ T1472] device veth1_macvtap left promiscuous mode [ 916.163649][ T1492] FAULT_INJECTION: forcing a failure. [ 916.163649][ T1492] name failslab, interval 1, probability 0, space 0, times 0 [ 916.194189][ T1492] CPU: 0 PID: 1492 Comm: syz.4.10917 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 916.207278][ T1492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 916.218438][ T1492] Call Trace: [ 916.222852][ T1492] dump_stack_lvl+0x1e2/0x24b [ 916.229038][ T1492] ? bfq_pos_tree_add_move+0x43b/0x43b [ 916.235808][ T1492] ? expand_files+0xd2/0x930 [ 916.240994][ T1492] dump_stack+0x15/0x17 [ 916.245658][ T1492] should_fail+0x3c6/0x510 [ 916.250257][ T1492] ? perf_event_alloc+0xc4/0x1970 [ 916.256430][ T1492] __should_failslab+0xa4/0xe0 [ 916.261223][ T1492] should_failslab+0x9/0x20 [ 916.266280][ T1492] kmem_cache_alloc_trace+0x3a/0x2e0 [ 916.271809][ T1492] perf_event_alloc+0xc4/0x1970 [ 916.276961][ T1492] ? __alloc_fd+0x485/0x540 [ 916.282942][ T1492] __se_sys_perf_event_open+0xb12/0x3c30 [ 916.290024][ T1492] ? kasan_check_range+0x151/0x2a0 [ 916.295498][ T1492] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 916.301935][ T1492] ? __ia32_sys_read+0x90/0x90 [ 916.307809][ T1492] __x64_sys_perf_event_open+0xbf/0xd0 [ 916.313505][ T1492] do_syscall_64+0x34/0x70 [ 916.318374][ T1492] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 916.326016][ T1492] RIP: 0033:0x7fe8c18a59f9 [ 916.332027][ T1492] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 916.356573][ T1492] RSP: 002b:00007fe8c0525048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 916.365362][ T1492] RAX: ffffffffffffffda RBX: 00007fe8c1a33f80 RCX: 00007fe8c18a59f9 [ 916.373524][ T1492] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001080 [ 916.382050][ T1492] RBP: 00007fe8c05250a0 R08: 0000000000000000 R09: 0000000000000000 [ 916.390912][ T1492] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 916.399503][ T1492] R13: 000000000000000b R14: 00007fe8c1a33f80 R15: 00007fff07f0af78 [ 918.888660][ T1574] syz.2.10938[1574] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 918.888717][ T1574] syz.2.10938[1574] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 920.155591][ T1592] device pim6reg1 entered promiscuous mode [ 920.617233][ T1601] syz.1.10950[1601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 920.617320][ T1601] syz.1.10950[1601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 920.776008][ T1608] device veth0_vlan left promiscuous mode [ 920.919305][ T1608] device veth0_vlan entered promiscuous mode [ 921.014596][ T774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 921.043137][ T774] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 921.092178][ T774] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 921.588787][ T1634] device pim6reg1 entered promiscuous mode [ 922.973937][ T1671] device pim6reg1 entered promiscuous mode [ 923.014107][ T1673] bridge0: port 3(veth0_to_batadv) entered blocking state [ 923.025614][ T1673] bridge0: port 3(veth0_to_batadv) entered disabled state [ 923.035159][ T1673] device veth0_to_batadv entered promiscuous mode [ 923.046973][ T1673] bridge0: port 3(veth0_to_batadv) entered blocking state [ 923.057193][ T1673] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 923.070637][ T1674] device veth0_to_batadv left promiscuous mode [ 923.079926][ T1674] bridge0: port 3(veth0_to_batadv) entered disabled state [ 923.451340][ T1707] device pim6reg1 entered promiscuous mode [ 924.608820][ T1750] device pim6reg1 entered promiscuous mode [ 925.289810][ T1770] bridge0: port 1(bridge_slave_0) entered blocking state [ 925.314610][ T1770] bridge0: port 1(bridge_slave_0) entered disabled state [ 925.323618][ T1770] device bridge_slave_0 entered promiscuous mode [ 925.348880][ T1770] bridge0: port 2(bridge_slave_1) entered blocking state [ 925.357408][ T1770] bridge0: port 2(bridge_slave_1) entered disabled state [ 925.367226][ T1770] device bridge_slave_1 entered promiscuous mode [ 925.431136][ T1779] device syzkaller0 entered promiscuous mode [ 925.598281][ T1770] bridge0: port 2(bridge_slave_1) entered blocking state [ 925.605382][ T1770] bridge0: port 2(bridge_slave_1) entered forwarding state [ 925.613165][ T1770] bridge0: port 1(bridge_slave_0) entered blocking state [ 925.620051][ T1770] bridge0: port 1(bridge_slave_0) entered forwarding state [ 925.677994][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 925.690853][ T54] bridge0: port 1(bridge_slave_0) entered disabled state [ 925.700233][ T54] bridge0: port 2(bridge_slave_1) entered disabled state [ 925.746988][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 925.757543][ T54] bridge0: port 1(bridge_slave_0) entered blocking state [ 925.768412][ T54] bridge0: port 1(bridge_slave_0) entered forwarding state [ 925.777459][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 925.786736][ T54] bridge0: port 2(bridge_slave_1) entered blocking state [ 925.793868][ T54] bridge0: port 2(bridge_slave_1) entered forwarding state [ 925.801760][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 925.811278][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 925.822076][ T1794] device veth1_macvtap entered promiscuous mode [ 925.835455][ T1794] device macsec0 entered promiscuous mode [ 925.915709][ T3295] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 925.943146][ T3295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 925.952625][ T3295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 925.968404][ T1770] device veth0_vlan entered promiscuous mode [ 925.983123][ T1770] device veth1_macvtap entered promiscuous mode [ 926.002056][ T8216] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 926.024366][ T8216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 926.036245][ T8216] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 926.046931][ T8216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 926.056506][ T8216] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 926.073983][ T1802] device pim6reg1 entered promiscuous mode [ 926.090062][ T3295] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 926.103380][ T3295] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 926.122769][ T3295] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 926.145025][ T3295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 926.156820][ T3295] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 926.168185][ T3295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 926.287261][ T1812] device syzkaller0 entered promiscuous mode [ 926.375576][ T1826] syz.0.11019[1826] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 926.375711][ T1826] syz.0.11019[1826] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 926.443433][ T1833] FAULT_INJECTION: forcing a failure. [ 926.443433][ T1833] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 926.558184][ T1833] CPU: 0 PID: 1833 Comm: syz.4.11020 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 926.569722][ T1833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 926.580117][ T1833] Call Trace: [ 926.583209][ T1833] dump_stack_lvl+0x1e2/0x24b [ 926.588058][ T1833] ? bfq_pos_tree_add_move+0x43b/0x43b [ 926.594155][ T1833] ? ex_handler_uaccess+0x3e/0xc0 [ 926.599129][ T1833] ? fixup_exception+0x94/0xd0 [ 926.603949][ T1833] dump_stack+0x15/0x17 [ 926.608024][ T1833] should_fail+0x3c6/0x510 [ 926.612275][ T1833] should_fail_usercopy+0x1a/0x20 [ 926.617142][ T1833] _copy_from_user+0x20/0xd0 [ 926.622532][ T1833] __se_sys_bpf+0x232/0x11cb0 [ 926.628396][ T1833] ? stack_trace_save+0x113/0x1c0 [ 926.633741][ T1833] ? __bad_area_nosemaphore+0xc4/0x430 [ 926.639574][ T1833] ? bad_area_nosemaphore+0x2d/0x40 [ 926.644578][ T1833] ? do_kern_addr_fault+0x69/0x80 [ 926.650889][ T1833] ? __x64_sys_bpf+0x90/0x90 [ 926.656040][ T1833] ? exc_page_fault+0x33d/0x5b0 [ 926.660876][ T1833] ? putname+0xe7/0x140 [ 926.665000][ T1833] ? _kstrtoull+0x3a0/0x4a0 [ 926.669388][ T1833] ? kstrtouint_from_user+0x20a/0x2a0 [ 926.674717][ T1833] ? copy_from_kernel_nofault_allowed+0x92/0xd0 [ 926.682919][ T1833] ? kstrtol_from_user+0x310/0x310 [ 926.688641][ T1833] ? strncpy_from_kernel_nofault+0x1c2/0x1e0 [ 926.696126][ T1833] ? memset+0x35/0x40 [ 926.701001][ T1833] ? __fsnotify_parent+0x4b9/0x6c0 [ 926.706450][ T1833] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 926.713463][ T1833] ? proc_fail_nth_write+0x20b/0x290 [ 926.718682][ T1833] ? proc_fail_nth_read+0x210/0x210 [ 926.723995][ T1833] ? security_file_permission+0x86/0xb0 [ 926.729934][ T1833] ? rw_verify_area+0x1c3/0x360 [ 926.735434][ T1833] ? preempt_count_add+0x92/0x1a0 [ 926.740836][ T1833] ? vfs_write+0x852/0xe70 [ 926.746054][ T1833] ? kmem_cache_free+0x1c0/0x1e0 [ 926.751106][ T1833] ? kernel_write+0x3d0/0x3d0 [ 926.755797][ T1833] ? __kasan_check_write+0x14/0x20 [ 926.760746][ T1833] ? mutex_lock+0xa5/0x110 [ 926.764992][ T1833] ? mutex_trylock+0xa0/0xa0 [ 926.769624][ T1833] ? __kasan_check_write+0x14/0x20 [ 926.774846][ T1833] ? fput_many+0x160/0x1b0 [ 926.780795][ T1833] ? debug_smp_processor_id+0x17/0x20 [ 926.786588][ T1833] __x64_sys_bpf+0x7b/0x90 [ 926.791280][ T1833] do_syscall_64+0x34/0x70 [ 926.795643][ T1833] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 926.801658][ T1833] RIP: 0033:0x7fe8c18a59f9 [ 926.805938][ T1833] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 926.827351][ T1833] RSP: 002b:00007fe8c0525048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 926.837356][ T1833] RAX: ffffffffffffffda RBX: 00007fe8c1a33f80 RCX: 00007fe8c18a59f9 [ 926.846095][ T1833] RDX: 0000000000000070 RSI: 0000000020000440 RDI: 0000000000000005 [ 926.854215][ T1833] RBP: 00007fe8c05250a0 R08: 0000000000000000 R09: 0000000000000000 [ 926.863150][ T1833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 926.872008][ T1833] R13: 000000000000000b R14: 00007fe8c1a33f80 R15: 00007fff07f0af78 [ 926.936170][ T1844] device pim6reg1 entered promiscuous mode [ 927.113448][ T1853] device pim6reg1 entered promiscuous mode [ 927.188044][ T1855] device syzkaller0 entered promiscuous mode [ 927.665151][ T1881] device pim6reg1 entered promiscuous mode [ 928.009153][ T1885] device syzkaller0 entered promiscuous mode [ 928.095039][ T1890] syz.4.11044[1890] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 928.095115][ T1890] syz.4.11044[1890] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 928.497793][ T1912] device pim6reg1 entered promiscuous mode [ 928.944491][ T1928] device syzkaller0 entered promiscuous mode [ 929.740318][ T1958] syz.4.11067[1958] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 929.740424][ T1958] syz.4.11067[1958] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 929.944918][ T1960] device pim6reg1 entered promiscuous mode [ 930.167361][ T1971] device syzkaller0 entered promiscuous mode [ 930.340307][ T1997] device pim6reg1 entered promiscuous mode [ 930.448054][ T2007] device veth1_macvtap left promiscuous mode [ 930.454208][ T2007] device macsec0 entered promiscuous mode [ 930.810316][ T2019] device syzkaller0 entered promiscuous mode [ 932.912044][ T2043] device pim6reg1 entered promiscuous mode [ 933.299824][ T2050] syz.4.11096[2050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 933.301091][ T2050] syz.4.11096[2050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 934.085171][ T2088] device pim6reg1 entered promiscuous mode [ 934.433167][ T2106] gretap0: refused to change device tx_queue_len [ 934.492678][ T2107] syz.0.11112[2107] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 934.492744][ T2107] syz.0.11112[2107] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 934.736525][ T2118] device pim6reg1 entered promiscuous mode [ 935.227485][ T2148] syz.4.11127[2148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 935.227555][ T2148] syz.4.11127[2148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 935.482266][ T2153] device syzkaller0 entered promiscuous mode [ 935.609735][ T2162] device pim6reg1 entered promiscuous mode [ 935.644665][ T2149] bridge0: port 1(bridge_slave_0) entered blocking state [ 935.675280][ T2149] bridge0: port 1(bridge_slave_0) entered disabled state [ 935.711015][ T2149] device bridge_slave_0 entered promiscuous mode [ 935.747035][ T2149] bridge0: port 2(bridge_slave_1) entered blocking state [ 935.765975][ T2149] bridge0: port 2(bridge_slave_1) entered disabled state [ 935.775997][ T2149] device bridge_slave_1 entered promiscuous mode [ 935.842241][ T2149] bridge0: port 2(bridge_slave_1) entered blocking state [ 935.851530][ T2149] bridge0: port 2(bridge_slave_1) entered forwarding state [ 935.859871][ T2149] bridge0: port 1(bridge_slave_0) entered blocking state [ 935.867602][ T2149] bridge0: port 1(bridge_slave_0) entered forwarding state [ 936.019752][T30718] bridge0: port 1(bridge_slave_0) entered disabled state [ 936.030297][T30718] bridge0: port 2(bridge_slave_1) entered disabled state [ 936.081939][ T774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 936.097432][ T774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 936.117061][ T774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 936.142194][ T774] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 936.161098][ T774] bridge0: port 1(bridge_slave_0) entered blocking state [ 936.168806][ T774] bridge0: port 1(bridge_slave_0) entered forwarding state [ 936.208786][ T774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 936.230071][ T774] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 936.320438][ T774] bridge0: port 2(bridge_slave_1) entered blocking state [ 936.329384][ T774] bridge0: port 2(bridge_slave_1) entered forwarding state [ 936.466333][T30718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 936.482264][T30718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 936.491011][T30718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 936.502936][T30718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 936.520490][ T774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 936.529191][ T774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 936.548131][ T774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 936.560748][ T774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 936.581833][ T2149] device veth0_vlan entered promiscuous mode [ 936.591324][ T5217] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 936.611591][ T5217] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 936.696892][ T3295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 936.723126][ T3295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 936.778107][ T2149] device veth1_macvtap entered promiscuous mode [ 936.880595][T30718] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 936.924835][T30718] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 937.037669][T30718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 937.168508][ T774] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 937.181792][ T774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 937.703171][ T2224] bridge_slave_0: mtu greater than device maximum [ 937.724625][ T2225] bridge_slave_0: mtu greater than device maximum [ 937.752087][ T2229] syz.0.11154[2229] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 937.756641][ T2228] device pim6reg1 entered promiscuous mode [ 938.438162][ T2260] device pim6reg1 entered promiscuous mode [ 938.454097][ T2262] syz.1.11168[2262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 938.454169][ T2262] syz.1.11168[2262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 939.115925][ T2287] device syzkaller0 entered promiscuous mode [ 939.248004][ T2295] device pim6reg1 entered promiscuous mode [ 939.567768][ T2329] device syzkaller0 entered promiscuous mode [ 939.928512][ T2353] device pim6reg1 entered promiscuous mode [ 942.267932][ T2435] device syzkaller0 entered promiscuous mode [ 943.316452][ T2462] device syzkaller0 entered promiscuous mode [ 946.345271][ T2586] device syzkaller0 entered promiscuous mode [ 946.712565][ T2607] device syzkaller0 entered promiscuous mode [ 947.965570][ T2671] syz.4.11302[2671] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 947.966721][ T2671] syz.4.11302[2671] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 948.101022][ T2681] syz.2.11303[2681] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 948.237055][ T2681] syz.2.11303[2681] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 948.946963][ T2726] syz.2.11316[2726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 948.980866][ T2726] syz.2.11316[2726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 949.872910][ T2762] syz.3.11332[2762] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 949.886485][ T2762] syz.3.11332[2762] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 950.730600][ T2800] syz.0.11344[2800] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 950.795537][ T2800] syz.0.11344[2800] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 951.836708][ T2843] device syzkaller0 entered promiscuous mode [ 952.357634][ T2856] device pim6reg1 entered promiscuous mode [ 952.733424][ T2876] bridge0: port 3(veth0_to_batadv) entered blocking state [ 952.741434][ T2876] bridge0: port 3(veth0_to_batadv) entered disabled state [ 952.754237][ T2876] device veth0_to_batadv entered promiscuous mode [ 952.782901][ T2876] device veth0_to_batadv left promiscuous mode [ 952.813371][ T2876] bridge0: port 3(veth0_to_batadv) entered disabled state [ 953.706069][ T2911] bpf_get_probe_write_proto: 4 callbacks suppressed [ 953.706080][ T2911] syz.2.11384[2911] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 953.714016][ T2911] syz.2.11384[2911] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 953.746855][ T2909] device syzkaller0 entered promiscuous mode [ 955.120903][ T2970] syz.2.11404[2970] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 955.121982][ T2970] syz.2.11404[2970] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 956.605350][ T3026] device pim6reg1 entered promiscuous mode [ 958.089353][ T3086] bridge0: port 1(bridge_slave_0) entered blocking state [ 958.114458][ T3086] bridge0: port 1(bridge_slave_0) entered disabled state [ 958.152448][ T3086] device bridge_slave_0 entered promiscuous mode [ 958.186622][ T3086] bridge0: port 2(bridge_slave_1) entered blocking state [ 958.194421][ T3086] bridge0: port 2(bridge_slave_1) entered disabled state [ 958.201916][ T3086] device bridge_slave_1 entered promiscuous mode [ 958.276672][ T1322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 958.284508][ T1322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 958.313774][ T1322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 958.322980][ T1322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 958.332219][ T1322] bridge0: port 1(bridge_slave_0) entered blocking state [ 958.339652][ T1322] bridge0: port 1(bridge_slave_0) entered forwarding state [ 958.347229][ T1322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 958.356719][ T1322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 958.365177][ T1322] bridge0: port 2(bridge_slave_1) entered blocking state [ 958.373282][ T1322] bridge0: port 2(bridge_slave_1) entered forwarding state [ 958.381424][ T1322] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 958.393019][ T1322] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 958.416269][ T1322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 958.436506][ T1322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 958.459321][ T3086] device veth0_vlan entered promiscuous mode [ 958.477302][ T1322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 958.497210][ T1322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 958.509236][ T1322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 958.529786][ T1322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 958.538418][ T3086] device veth1_macvtap entered promiscuous mode [ 958.583281][ T8217] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 958.592775][ T8217] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 958.948230][ T3130] device pim6reg1 entered promiscuous mode [ 959.409766][ T3167] device sit0 entered promiscuous mode [ 960.209406][ T3188] syz.2.11477[3188] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 960.210667][ T3188] syz.2.11477[3188] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 960.496195][ T3190] device veth0_vlan left promiscuous mode [ 960.558685][ T3190] device veth0_vlan entered promiscuous mode [ 960.589423][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 960.605810][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 960.623188][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 960.733394][ T3201] FAULT_INJECTION: forcing a failure. [ 960.733394][ T3201] name failslab, interval 1, probability 0, space 0, times 0 [ 960.746107][ T3201] CPU: 1 PID: 3201 Comm: syz.4.11483 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 960.757546][ T3201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 960.768552][ T3201] Call Trace: [ 960.772667][ T3201] dump_stack_lvl+0x1e2/0x24b [ 960.777416][ T3201] ? bfq_pos_tree_add_move+0x43b/0x43b [ 960.783431][ T3201] dump_stack+0x15/0x17 [ 960.787674][ T3201] should_fail+0x3c6/0x510 [ 960.792857][ T3201] ? __alloc_skb+0x80/0x510 [ 960.798131][ T3201] __should_failslab+0xa4/0xe0 [ 960.804746][ T3201] should_failslab+0x9/0x20 [ 960.809726][ T3201] kmem_cache_alloc+0x3d/0x2e0 [ 960.814928][ T3201] __alloc_skb+0x80/0x510 [ 960.819621][ T3201] ? __kasan_check_write+0x14/0x20 [ 960.827311][ T3201] __napi_alloc_skb+0x15d/0x2e0 [ 960.833064][ T3201] napi_get_frags+0x6a/0x170 [ 960.838266][ T3201] tun_get_user+0xc88/0x38f0 [ 960.843735][ T3201] ? kasan_set_track+0x4b/0x70 [ 960.848452][ T3201] ? kmem_cache_free+0xa9/0x1e0 [ 960.853305][ T3201] ? do_sys_openat2+0x1fc/0x710 [ 960.858845][ T3201] ? _kstrtoull+0x3a0/0x4a0 [ 960.863944][ T3201] ? tun_do_read+0x1f60/0x1f60 [ 960.870399][ T3201] ? kstrtouint_from_user+0x20a/0x2a0 [ 960.876187][ T3201] ? kstrtol_from_user+0x310/0x310 [ 960.881713][ T3201] ? htab_map_hash+0x320/0x7e0 [ 960.887107][ T3201] ? avc_policy_seqno+0x1b/0x70 [ 960.893252][ T3201] ? selinux_file_permission+0x2bb/0x560 [ 960.901228][ T3201] ? fsnotify_perm+0x67/0x4e0 [ 960.907175][ T3201] tun_chr_write_iter+0x1a8/0x250 [ 960.913362][ T3201] vfs_write+0xb4c/0xe70 [ 960.919880][ T3201] ? kernel_write+0x3d0/0x3d0 [ 960.927376][ T3201] ? __fdget_pos+0x209/0x3a0 [ 960.933168][ T3201] ? ksys_write+0x77/0x2c0 [ 960.937582][ T3201] ksys_write+0x199/0x2c0 [ 960.942577][ T3201] ? __ia32_sys_read+0x90/0x90 [ 960.949439][ T3201] ? debug_smp_processor_id+0x17/0x20 [ 960.956599][ T3201] __x64_sys_write+0x7b/0x90 [ 960.962500][ T3201] do_syscall_64+0x34/0x70 [ 960.967990][ T3201] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 960.974091][ T3201] RIP: 0033:0x7fe8c18a59f9 [ 960.979631][ T3201] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 961.003451][ T3201] RSP: 002b:00007fe8c0525048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 961.013112][ T3201] RAX: ffffffffffffffda RBX: 00007fe8c1a33f80 RCX: 00007fe8c18a59f9 [ 961.023128][ T3201] RDX: 000000000000fdef RSI: 0000000020000380 RDI: 0000000000000003 [ 961.033916][ T3201] RBP: 00007fe8c05250a0 R08: 0000000000000000 R09: 0000000000000000 [ 961.043118][ T3201] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 961.053297][ T3201] R13: 000000000000000b R14: 00007fe8c1a33f80 R15: 00007fff07f0af78 [ 961.375092][ T3228] device syzkaller0 entered promiscuous mode [ 961.463424][ T3235] device sit0 left promiscuous mode [ 961.485313][ T3235] device sit0 entered promiscuous mode [ 962.931741][ T3284] syz.2.11512[3284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 962.935318][ T3284] syz.2.11512[3284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 963.201343][ T3288] device veth0_vlan left promiscuous mode [ 963.238667][ T3288] device veth0_vlan entered promiscuous mode [ 963.290726][ T3285] bridge0: port 1(bridge_slave_0) entered blocking state [ 963.299716][ T3285] bridge0: port 1(bridge_slave_0) entered disabled state [ 963.309096][ T3285] device bridge_slave_0 entered promiscuous mode [ 963.319265][ T3285] bridge0: port 2(bridge_slave_1) entered blocking state [ 963.327079][ T3285] bridge0: port 2(bridge_slave_1) entered disabled state [ 963.338173][ T3285] device bridge_slave_1 entered promiscuous mode [ 963.479502][ T3285] bridge0: port 2(bridge_slave_1) entered blocking state [ 963.487663][ T3285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 963.496573][ T3285] bridge0: port 1(bridge_slave_0) entered blocking state [ 963.503678][ T3285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 963.648913][T28608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 963.888277][T28608] bridge0: port 1(bridge_slave_0) entered disabled state [ 963.964332][T28608] bridge0: port 2(bridge_slave_1) entered disabled state [ 964.145639][T30730] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 964.157454][T30730] bridge0: port 1(bridge_slave_0) entered blocking state [ 964.165583][T30730] bridge0: port 1(bridge_slave_0) entered forwarding state [ 964.174610][T30730] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 964.184783][T30730] bridge0: port 2(bridge_slave_1) entered blocking state [ 964.192481][T30730] bridge0: port 2(bridge_slave_1) entered forwarding state [ 964.243624][T28608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 964.269551][T28608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 964.288757][T28608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 964.309694][T28608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 964.359320][T30732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 964.397993][T30732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 964.424062][ T3285] device veth0_vlan entered promiscuous mode [ 964.444705][T30729] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 964.458103][T30729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 964.483561][ T3285] device veth1_macvtap entered promiscuous mode [ 964.491414][ T8213] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 964.499428][ T8213] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 964.509831][ T8213] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 964.519070][ T8213] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 964.527729][ T8213] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 964.573603][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 964.586107][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 964.594881][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 964.604349][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 966.211434][ T3370] syz.2.11537[3370] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 966.212326][ T3370] syz.2.11537[3370] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 966.262472][ T3365] FAULT_INJECTION: forcing a failure. [ 966.262472][ T3365] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 966.321655][ T3365] CPU: 0 PID: 3365 Comm: syz.3.11535 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 966.333605][ T3365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 966.344149][ T3365] Call Trace: [ 966.347285][ T3365] dump_stack_lvl+0x1e2/0x24b [ 966.351944][ T3365] ? bfq_pos_tree_add_move+0x43b/0x43b [ 966.358018][ T3365] dump_stack+0x15/0x17 [ 966.362385][ T3365] should_fail+0x3c6/0x510 [ 966.366634][ T3365] should_fail_usercopy+0x1a/0x20 [ 966.371494][ T3365] _copy_from_iter+0x22c/0xd10 [ 966.376227][ T3365] ? slab_free_freelist_hook+0xc0/0x190 [ 966.382488][ T3365] ? copyout_mc+0x90/0x90 [ 966.387025][ T3365] ? __check_object_size+0x2e6/0x3c0 [ 966.392477][ T3365] skb_copy_datagram_from_iter+0x100/0x6d0 [ 966.398119][ T3365] tun_get_user+0x1904/0x38f0 [ 966.402964][ T3365] ? _kstrtoull+0x3a0/0x4a0 [ 966.407534][ T3365] ? tun_do_read+0x1f60/0x1f60 [ 966.412250][ T3365] ? kstrtouint_from_user+0x20a/0x2a0 [ 966.417467][ T3365] ? kstrtol_from_user+0x310/0x310 [ 966.422691][ T3365] ? htab_map_hash+0x320/0x7e0 [ 966.427398][ T3365] ? avc_policy_seqno+0x1b/0x70 [ 966.432398][ T3365] ? selinux_file_permission+0x2bb/0x560 [ 966.438245][ T3365] ? fsnotify_perm+0x67/0x4e0 [ 966.442877][ T3365] tun_chr_write_iter+0x1a8/0x250 [ 966.448212][ T3365] vfs_write+0xb4c/0xe70 [ 966.452631][ T3365] ? kernel_write+0x3d0/0x3d0 [ 966.457547][ T3365] ? __fdget_pos+0x209/0x3a0 [ 966.462355][ T3365] ? ksys_write+0x77/0x2c0 [ 966.466593][ T3365] ksys_write+0x199/0x2c0 [ 966.470959][ T3365] ? __ia32_sys_read+0x90/0x90 [ 966.475794][ T3365] ? debug_smp_processor_id+0x17/0x20 [ 966.481175][ T3365] __x64_sys_write+0x7b/0x90 [ 966.485713][ T3365] do_syscall_64+0x34/0x70 [ 966.489943][ T3365] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 966.495859][ T3365] RIP: 0033:0x7fb9290169f9 [ 966.500183][ T3365] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 966.521056][ T3365] RSP: 002b:00007fb927c96048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 966.529626][ T3365] RAX: ffffffffffffffda RBX: 00007fb9291a4f80 RCX: 00007fb9290169f9 [ 966.538166][ T3365] RDX: 000000000000fdef RSI: 0000000020000380 RDI: 0000000000000003 [ 966.546005][ T3365] RBP: 00007fb927c960a0 R08: 0000000000000000 R09: 0000000000000000 [ 966.554094][ T3365] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 966.562839][ T3365] R13: 000000000000000b R14: 00007fb9291a4f80 R15: 00007ffdc3939058 [ 967.659013][ T3390] device syzkaller0 entered promiscuous mode [ 967.667607][ T3390] FAULT_INJECTION: forcing a failure. [ 967.667607][ T3390] name failslab, interval 1, probability 0, space 0, times 0 [ 967.680926][ T3390] CPU: 1 PID: 3390 Comm: syz.4.11543 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 967.692238][ T3390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 967.702948][ T3390] Call Trace: [ 967.706233][ T3390] dump_stack_lvl+0x1e2/0x24b [ 967.711022][ T3390] ? bfq_pos_tree_add_move+0x43b/0x43b [ 967.716308][ T3390] dump_stack+0x15/0x17 [ 967.720700][ T3390] should_fail+0x3c6/0x510 [ 967.725465][ T3390] ? __alloc_skb+0x80/0x510 [ 967.730947][ T3390] __should_failslab+0xa4/0xe0 [ 967.735620][ T3390] should_failslab+0x9/0x20 [ 967.740578][ T3390] kmem_cache_alloc+0x3d/0x2e0 [ 967.745879][ T3390] __alloc_skb+0x80/0x510 [ 967.750436][ T3390] ? __kasan_check_write+0x14/0x20 [ 967.755523][ T3390] __napi_alloc_skb+0x15d/0x2e0 [ 967.760461][ T3390] napi_get_frags+0x6a/0x170 [ 967.764870][ T3390] tun_get_user+0xc88/0x38f0 [ 967.769996][ T3390] ? kasan_set_track+0x4b/0x70 [ 967.775195][ T3390] ? kmem_cache_free+0xa9/0x1e0 [ 967.780070][ T3390] ? do_sys_openat2+0x1fc/0x710 [ 967.784935][ T3390] ? _kstrtoull+0x3a0/0x4a0 [ 967.789512][ T3390] ? tun_do_read+0x1f60/0x1f60 [ 967.794195][ T3390] ? kstrtouint_from_user+0x20a/0x2a0 [ 967.799494][ T3390] ? kstrtol_from_user+0x310/0x310 [ 967.804876][ T3390] ? avc_policy_seqno+0x1b/0x70 [ 967.809600][ T3390] ? selinux_file_permission+0x2bb/0x560 [ 967.815134][ T3390] ? fsnotify_perm+0x67/0x4e0 [ 967.820308][ T3390] tun_chr_write_iter+0x1a8/0x250 [ 967.825251][ T3390] vfs_write+0xb4c/0xe70 [ 967.830006][ T3390] ? kernel_write+0x3d0/0x3d0 [ 967.834544][ T3390] ? __fdget_pos+0x209/0x3a0 [ 967.839506][ T3390] ? ksys_write+0x77/0x2c0 [ 967.844263][ T3390] ksys_write+0x199/0x2c0 [ 967.848784][ T3390] ? __ia32_sys_read+0x90/0x90 [ 967.853474][ T3390] ? debug_smp_processor_id+0x17/0x20 [ 967.859302][ T3390] __x64_sys_write+0x7b/0x90 [ 967.865681][ T3390] do_syscall_64+0x34/0x70 [ 967.870109][ T3390] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 967.877002][ T3390] RIP: 0033:0x7fe8c18a59f9 [ 967.881916][ T3390] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 967.902274][ T3390] RSP: 002b:00007fe8c0525048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 967.910713][ T3390] RAX: ffffffffffffffda RBX: 00007fe8c1a33f80 RCX: 00007fe8c18a59f9 [ 967.918632][ T3390] RDX: 000000000000ffbf RSI: 0000000020000240 RDI: 0000000000000004 [ 967.926652][ T3390] RBP: 00007fe8c05250a0 R08: 0000000000000000 R09: 0000000000000000 [ 967.934705][ T3390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 967.942903][ T3390] R13: 000000000000000b R14: 00007fe8c1a33f80 R15: 00007fff07f0af78 [ 974.324546][ T3391] bridge0: port 1(bridge_slave_0) entered blocking state [ 974.334983][ T3391] bridge0: port 1(bridge_slave_0) entered disabled state [ 974.344973][ T3391] device bridge_slave_0 entered promiscuous mode [ 974.353654][ T3391] bridge0: port 2(bridge_slave_1) entered blocking state [ 974.362583][ T3391] bridge0: port 2(bridge_slave_1) entered disabled state [ 974.371463][ T3391] device bridge_slave_1 entered promiscuous mode [ 974.422702][ T3391] bridge0: port 2(bridge_slave_1) entered blocking state [ 974.430027][ T3391] bridge0: port 2(bridge_slave_1) entered forwarding state [ 974.437442][ T3391] bridge0: port 1(bridge_slave_0) entered blocking state [ 974.444572][ T3391] bridge0: port 1(bridge_slave_0) entered forwarding state [ 974.493636][ T3391] device veth0_vlan entered promiscuous mode [ 974.507514][ T3391] device veth1_macvtap entered promiscuous mode [ 974.525012][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 974.532983][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 974.541377][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 974.564320][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 974.572675][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 974.581681][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 974.590846][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 974.600162][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 974.608922][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 974.617205][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 974.625502][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 974.633902][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 974.870246][ T3428] device pim6reg1 entered promiscuous mode [ 974.918054][ T3434] device syzkaller0 entered promiscuous mode [ 974.925397][ T3434] FAULT_INJECTION: forcing a failure. [ 974.925397][ T3434] name failslab, interval 1, probability 0, space 0, times 0 [ 974.939711][ T3434] CPU: 1 PID: 3434 Comm: syz.4.11554 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 974.952213][ T3434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 974.963226][ T3434] Call Trace: [ 974.967541][ T3434] dump_stack_lvl+0x1e2/0x24b [ 974.972974][ T3434] ? panic+0x812/0x812 [ 974.978131][ T3434] ? bfq_pos_tree_add_move+0x43b/0x43b [ 974.986374][ T3434] dump_stack+0x15/0x17 [ 974.990895][ T3434] should_fail+0x3c6/0x510 [ 974.995975][ T3434] ? __napi_alloc_skb+0x15d/0x2e0 [ 975.001327][ T3434] __should_failslab+0xa4/0xe0 [ 975.006441][ T3434] should_failslab+0x9/0x20 [ 975.010944][ T3434] __kmalloc_track_caller+0x5f/0x320 [ 975.016450][ T3434] ? kmem_cache_alloc+0x168/0x2e0 [ 975.021654][ T3434] ? __alloc_skb+0x80/0x510 [ 975.026335][ T3434] ? __napi_alloc_skb+0x15d/0x2e0 [ 975.031372][ T3434] __alloc_skb+0xbc/0x510 [ 975.036012][ T3434] ? __kasan_check_write+0x14/0x20 [ 975.042776][ T3434] __napi_alloc_skb+0x15d/0x2e0 [ 975.048348][ T3434] napi_get_frags+0x6a/0x170 [ 975.054276][ T3434] tun_get_user+0xc88/0x38f0 [ 975.059722][ T3434] ? kasan_set_track+0x4b/0x70 [ 975.064732][ T3434] ? kmem_cache_free+0xa9/0x1e0 [ 975.071105][ T3434] ? do_sys_openat2+0x1fc/0x710 [ 975.077386][ T3434] ? _kstrtoull+0x3a0/0x4a0 [ 975.083312][ T3434] ? tun_do_read+0x1f60/0x1f60 [ 975.089314][ T3434] ? kstrtouint_from_user+0x20a/0x2a0 [ 975.095166][ T3434] ? kstrtol_from_user+0x310/0x310 [ 975.101375][ T3434] ? avc_policy_seqno+0x1b/0x70 [ 975.107618][ T3434] ? selinux_file_permission+0x2bb/0x560 [ 975.113337][ T3434] ? fsnotify_perm+0x67/0x4e0 [ 975.118543][ T3434] tun_chr_write_iter+0x1a8/0x250 [ 975.124043][ T3434] vfs_write+0xb4c/0xe70 [ 975.128676][ T3434] ? kernel_write+0x3d0/0x3d0 [ 975.135498][ T3434] ? __fdget_pos+0x209/0x3a0 [ 975.141865][ T3434] ? ksys_write+0x77/0x2c0 [ 975.147185][ T3434] ksys_write+0x199/0x2c0 [ 975.151864][ T3434] ? __ia32_sys_read+0x90/0x90 [ 975.157050][ T3434] ? debug_smp_processor_id+0x17/0x20 [ 975.162752][ T3434] __x64_sys_write+0x7b/0x90 [ 975.168355][ T3434] do_syscall_64+0x34/0x70 [ 975.174040][ T3434] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 975.181049][ T3434] RIP: 0033:0x7fe8c18a59f9 [ 975.186262][ T3434] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 975.208419][ T3434] RSP: 002b:00007fe8c0525048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 975.218697][ T3434] RAX: ffffffffffffffda RBX: 00007fe8c1a33f80 RCX: 00007fe8c18a59f9 [ 975.228634][ T3434] RDX: 000000000000ffbf RSI: 0000000020000240 RDI: 0000000000000004 [ 975.238846][ T3434] RBP: 00007fe8c05250a0 R08: 0000000000000000 R09: 0000000000000000 [ 975.250974][ T3434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 975.261166][ T3434] R13: 000000000000000b R14: 00007fe8c1a33f80 R15: 00007fff07f0af78 [ 975.417108][ T3444] syz.4.11558[3444] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 975.418407][ T3444] syz.4.11558[3444] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 978.886228][ T3551] bridge0: port 1(bridge_slave_0) entered blocking state [ 978.905051][ T3551] bridge0: port 1(bridge_slave_0) entered disabled state [ 978.914450][ T3551] device bridge_slave_0 entered promiscuous mode [ 978.928501][ T3551] bridge0: port 2(bridge_slave_1) entered blocking state [ 978.936871][ T3551] bridge0: port 2(bridge_slave_1) entered disabled state [ 978.944535][ T3551] device bridge_slave_1 entered promiscuous mode [ 979.025609][ T3551] bridge0: port 2(bridge_slave_1) entered blocking state [ 979.033540][ T3551] bridge0: port 2(bridge_slave_1) entered forwarding state [ 979.042003][ T3551] bridge0: port 1(bridge_slave_0) entered blocking state [ 979.051152][ T3551] bridge0: port 1(bridge_slave_0) entered forwarding state [ 979.146065][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 979.153901][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 979.216616][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 979.250660][ T1226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 979.429356][ T3551] device veth0_vlan entered promiscuous mode [ 979.495613][ T3551] device veth1_macvtap entered promiscuous mode [ 979.512524][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 979.523021][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 979.531434][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 979.540308][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 979.549294][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 979.557885][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 979.846671][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 979.856785][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 980.083367][ T3586] syz.1.11592[3586] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 980.083427][ T3586] syz.1.11592[3586] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 980.724109][ T3606] device pim6reg1 entered promiscuous mode [ 982.170002][ T3687] device pim6reg1 entered promiscuous mode [ 982.744886][ T3713] device syzkaller0 entered promiscuous mode [ 982.980203][ T3732] device pim6reg1 entered promiscuous mode [ 983.325198][ T3755] device syzkaller0 entered promiscuous mode [ 984.897940][ T3813] device pim6reg1 entered promiscuous mode [ 985.223863][ T3832] device syzkaller0 entered promiscuous mode [ 985.867358][ T3862] device pim6reg1 entered promiscuous mode [ 986.442361][ T3898] device syzkaller0 entered promiscuous mode [ 986.744294][ T3919] syz.1.11704[3919] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 986.744358][ T3919] syz.1.11704[3919] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 988.379081][ T4017] device pim6reg1 entered promiscuous mode [ 989.165257][ T4056] device syzkaller0 entered promiscuous mode [ 989.285736][ T4065] device pim6reg1 entered promiscuous mode [ 989.526219][ T4062] device syzkaller0 entered promiscuous mode [ 990.436113][ T4110] device pim6reg1 entered promiscuous mode [ 990.551879][ T4121] device veth1_macvtap left promiscuous mode [ 990.625888][ T4121] device macsec0 entered promiscuous mode [ 991.353304][ T4156] device pim6reg1 entered promiscuous mode [ 991.554934][ T4165] device pim6reg1 entered promiscuous mode [ 992.074880][ T4204] device pim6reg1 entered promiscuous mode [ 992.252995][ T4214] lo: mtu less than device minimum [ 992.594746][ T4237] device pim6reg1 entered promiscuous mode [ 992.662167][ T4241] device pim6reg1 entered promiscuous mode [ 992.786556][ T4261] device syzkaller0 entered promiscuous mode [ 992.813844][ T4255] device syzkaller0 entered promiscuous mode [ 992.941082][ T4267] device syzkaller0 entered promiscuous mode [ 994.661717][ T4375] device pim6reg1 entered promiscuous mode [ 994.893409][ T4398] device pim6reg1 entered promiscuous mode [ 994.911028][ T4399] device pim6reg1 entered promiscuous mode [ 995.002028][ T4403] bridge0: port 3(veth0_to_batadv) entered blocking state [ 995.011113][ T4403] bridge0: port 3(veth0_to_batadv) entered disabled state [ 995.028837][ T4403] device veth0_to_batadv entered promiscuous mode [ 995.060453][ T4403] device veth0_to_batadv left promiscuous mode [ 995.070550][ T4403] bridge0: port 3(veth0_to_batadv) entered disabled state [ 995.314544][ T4443] device pim6reg1 entered promiscuous mode [ 996.054642][ T4469] device sit0 entered promiscuous mode [ 996.227310][ T4499] device pim6reg1 entered promiscuous mode [ 997.721646][ T4561] syz.2.11907[4561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 997.721714][ T4561] syz.2.11907[4561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 998.037764][ T4562] bridge0: port 1(bridge_slave_0) entered blocking state [ 998.057209][ T4562] bridge0: port 1(bridge_slave_0) entered disabled state [ 998.067546][ T4562] device bridge_slave_0 entered promiscuous mode [ 998.151746][ T4562] bridge0: port 2(bridge_slave_1) entered blocking state [ 998.167093][ T4562] bridge0: port 2(bridge_slave_1) entered disabled state [ 998.216596][ T4562] device bridge_slave_1 entered promiscuous mode [ 998.273024][ T4575] device syzkaller0 entered promiscuous mode [ 998.752168][ T4600] bridge0: port 2(bridge_slave_1) entered disabled state [ 998.759554][ T4600] bridge0: port 1(bridge_slave_0) entered disabled state [ 998.862936][T28607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 998.884512][T28607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 998.954036][ T8217] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 998.977861][ T8217] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 999.045672][ T8217] bridge0: port 1(bridge_slave_0) entered blocking state [ 999.053174][ T8217] bridge0: port 1(bridge_slave_0) entered forwarding state [ 999.072081][ T8217] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 999.080851][ T8217] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 999.089788][ T8217] bridge0: port 2(bridge_slave_1) entered blocking state [ 999.096775][ T8217] bridge0: port 2(bridge_slave_1) entered forwarding state [ 999.114647][ T4607] bridge0: port 2(bridge_slave_1) entered blocking state [ 999.122091][ T4607] bridge0: port 2(bridge_slave_1) entered forwarding state [ 999.130371][ T4607] bridge0: port 1(bridge_slave_0) entered blocking state [ 999.137490][ T4607] bridge0: port 1(bridge_slave_0) entered forwarding state [ 999.147818][ T4607] device bridge0 entered promiscuous mode [ 999.162344][ T3655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 999.170668][ T3655] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 999.191446][ T3655] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 999.220676][ T8217] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 999.234720][ T3655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 999.250272][ T3655] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 999.260495][ T3655] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 999.269459][ T4562] device veth0_vlan entered promiscuous mode [ 999.296686][ T8217] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 999.306864][ T8217] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 999.313912][ T4619] syz.3.11928[4619] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 999.314293][ T4619] syz.3.11928[4619] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 999.330274][ T4611] bridge0: port 2(bridge_slave_1) entered disabled state [ 999.349219][ T4611] bridge0: port 1(bridge_slave_0) entered disabled state [ 999.360977][ T4611] device bridge0 left promiscuous mode [ 999.374032][ T4562] device veth1_macvtap entered promiscuous mode [ 999.382975][ T4621] device bridge_slave_1 left promiscuous mode [ 999.394013][ T4621] bridge0: port 2(bridge_slave_1) entered disabled state [ 999.402343][ T4621] device bridge_slave_0 left promiscuous mode [ 999.409027][ T4621] bridge0: port 1(bridge_slave_0) entered disabled state [ 999.456461][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 999.465357][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 999.519053][T28120] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 999.529599][T28120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1000.153955][ T4644] bridge0: port 1(bridge_slave_0) entered blocking state [ 1000.192668][ T4654] syz.1.11939[4654] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1000.195064][ T4654] syz.1.11939[4654] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1000.227644][ T4644] bridge0: port 1(bridge_slave_0) entered disabled state [ 1000.317091][ T4644] device bridge_slave_0 entered promiscuous mode [ 1000.351130][ T4644] bridge0: port 2(bridge_slave_1) entered blocking state [ 1000.360667][ T4644] bridge0: port 2(bridge_slave_1) entered disabled state [ 1000.374076][ T4644] device bridge_slave_1 entered promiscuous mode [ 1000.398136][ T4662] device pim6reg1 entered promiscuous mode [ 1000.782913][ T1315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1000.793274][ T1315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1000.847231][ T3654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1000.899874][ T3654] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1001.006343][ T3654] bridge0: port 1(bridge_slave_0) entered blocking state [ 1001.014692][ T3654] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1001.060518][ T3654] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1001.071327][ T3654] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1001.083671][ T3654] bridge0: port 2(bridge_slave_1) entered blocking state [ 1001.092470][ T3654] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1001.178791][ T4703] device syzkaller0 entered promiscuous mode [ 1001.199596][ T8217] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1001.348015][T28607] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1001.393783][T28607] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1001.461586][ T3654] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1001.473398][ T3654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1001.486578][ T4644] device veth0_vlan entered promiscuous mode [ 1001.495153][T28607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1001.508679][T28607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1001.534199][ T3654] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1001.542841][ T3654] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1001.648133][ T4720] device syzkaller0 entered promiscuous mode [ 1001.726435][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1001.735430][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1001.747061][ T4644] device veth1_macvtap entered promiscuous mode [ 1001.817156][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1001.835513][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1001.859747][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1001.912260][ T4730] device sit0 left promiscuous mode [ 1001.929582][T28118] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1001.938969][T28118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1001.977906][ T4730] device sit0 entered promiscuous mode [ 1002.210266][ T4748] syz.4.11962[4748] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1002.210332][ T4748] syz.4.11962[4748] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1002.349509][ T684] device veth0_vlan left promiscuous mode [ 1003.281909][ T4773] device syzkaller0 entered promiscuous mode [ 1003.948800][ T4810] device pim6reg1 entered promiscuous mode [ 1004.216992][ T4820] : renamed from vlan0 [ 1004.276232][ T4819] device syzkaller0 entered promiscuous mode [ 1004.287259][ T4822] device sit0 entered promiscuous mode [ 1005.692545][ T4858] : renamed from vlan0 [ 1005.978541][ T4869] syz.2.12003[4869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1005.978613][ T4869] syz.2.12003[4869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1007.004006][ T4897] device pim6reg1 entered promiscuous mode [ 1007.043554][ T4899] device veth1_to_bridge entered promiscuous mode [ 1007.068697][ T4901] syz.3.12014[4901] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1007.068763][ T4901] syz.3.12014[4901] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1007.726310][ T4929] device veth0_vlan left promiscuous mode [ 1007.755080][ T4929] device veth0_vlan entered promiscuous mode [ 1007.793143][ T1226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1007.803501][ T1226] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1007.826544][ T1226] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1008.177554][ T4948] FAULT_INJECTION: forcing a failure. [ 1008.177554][ T4948] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1008.217901][ T4948] CPU: 0 PID: 4948 Comm: syz.0.12030 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 1008.233923][ T4948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1008.248781][ T4948] Call Trace: [ 1008.252981][ T4948] dump_stack_lvl+0x1e2/0x24b [ 1008.258565][ T4948] ? panic+0x812/0x812 [ 1008.264076][ T4948] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1008.271153][ T4948] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 1008.278913][ T4948] ? proc_fail_nth_write+0x20b/0x290 [ 1008.285153][ T4948] dump_stack+0x15/0x17 [ 1008.291501][ T4948] should_fail+0x3c6/0x510 [ 1008.296296][ T4948] should_fail_usercopy+0x1a/0x20 [ 1008.302403][ T4948] _copy_from_user+0x20/0xd0 [ 1008.308362][ T4948] perf_copy_attr+0x15e/0x760 [ 1008.314206][ T4948] __se_sys_perf_event_open+0xdd/0x3c30 [ 1008.320461][ T4948] ? __kasan_check_write+0x14/0x20 [ 1008.327121][ T4948] ? mutex_lock+0xa5/0x110 [ 1008.331540][ T4948] ? mutex_trylock+0xa0/0xa0 [ 1008.337022][ T4948] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 1008.342648][ T4948] ? __ia32_sys_read+0x90/0x90 [ 1008.347776][ T4948] __x64_sys_perf_event_open+0xbf/0xd0 [ 1008.353970][ T4948] do_syscall_64+0x34/0x70 [ 1008.358672][ T4948] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1008.364950][ T4948] RIP: 0033:0x7f90b83e39f9 [ 1008.369434][ T4948] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1008.390469][ T4948] RSP: 002b:00007f90b7063048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1008.399107][ T4948] RAX: ffffffffffffffda RBX: 00007f90b8571f80 RCX: 00007f90b83e39f9 [ 1008.407192][ T4948] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 1008.415558][ T4948] RBP: 00007f90b70630a0 R08: 0000000000000000 R09: 0000000000000000 [ 1008.424044][ T4948] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1008.432818][ T4948] R13: 000000000000000b R14: 00007f90b8571f80 R15: 00007ffe06856428 [ 1010.386964][ T4999] FAULT_INJECTION: forcing a failure. [ 1010.386964][ T4999] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1010.446156][ T4999] CPU: 1 PID: 4999 Comm: syz.0.12046 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 1010.459610][ T4999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1010.474287][ T4999] Call Trace: [ 1010.478196][ T4999] dump_stack_lvl+0x1e2/0x24b [ 1010.483558][ T4999] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1010.489893][ T4999] ? __alloc_skb+0x37c/0x510 [ 1010.495054][ T4999] dump_stack+0x15/0x17 [ 1010.499341][ T4999] should_fail+0x3c6/0x510 [ 1010.504119][ T4999] should_fail_usercopy+0x1a/0x20 [ 1010.510077][ T4999] _copy_from_iter+0x22c/0xd10 [ 1010.515023][ T4999] ? sock_alloc_send_pskb+0x936/0xa50 [ 1010.521236][ T4999] ? copyout_mc+0x90/0x90 [ 1010.534022][ T4999] ? __check_object_size+0x2e6/0x3c0 [ 1010.540057][ T4999] skb_copy_datagram_from_iter+0x100/0x6d0 [ 1010.546037][ T4999] tun_get_user+0x1904/0x38f0 [ 1010.550707][ T4999] ? kmem_cache_free+0xa9/0x1e0 [ 1010.556333][ T4999] ? do_sys_openat2+0x1fc/0x710 [ 1010.561787][ T4999] ? _kstrtoull+0x3a0/0x4a0 [ 1010.566649][ T4999] ? tun_do_read+0x1f60/0x1f60 [ 1010.572718][ T4999] ? kstrtouint_from_user+0x20a/0x2a0 [ 1010.578785][ T4999] ? kstrtol_from_user+0x310/0x310 [ 1010.584265][ T4999] ? avc_policy_seqno+0x1b/0x70 [ 1010.589567][ T4999] ? selinux_file_permission+0x2bb/0x560 [ 1010.595791][ T4999] ? fsnotify_perm+0x67/0x4e0 [ 1010.600389][ T4999] tun_chr_write_iter+0x1a8/0x250 [ 1010.605811][ T4999] vfs_write+0xb4c/0xe70 [ 1010.611024][ T4999] ? kernel_write+0x3d0/0x3d0 [ 1010.616039][ T4999] ? __fdget_pos+0x209/0x3a0 [ 1010.621784][ T4999] ? ksys_write+0x77/0x2c0 [ 1010.627183][ T4999] ksys_write+0x199/0x2c0 [ 1010.632284][ T4999] ? __ia32_sys_read+0x90/0x90 [ 1010.637151][ T4999] ? debug_smp_processor_id+0x17/0x20 [ 1010.642531][ T4999] __x64_sys_write+0x7b/0x90 [ 1010.647349][ T4999] do_syscall_64+0x34/0x70 [ 1010.651559][ T4999] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1010.657747][ T4999] RIP: 0033:0x7f90b83e39f9 [ 1010.662335][ T4999] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1010.685613][ T4999] RSP: 002b:00007f90b7063048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1010.695368][ T4999] RAX: ffffffffffffffda RBX: 00007f90b8571f80 RCX: 00007f90b83e39f9 [ 1010.703923][ T4999] RDX: 000000000000fdef RSI: 0000000020000300 RDI: 00000000000000c8 [ 1010.712875][ T4999] RBP: 00007f90b70630a0 R08: 0000000000000000 R09: 0000000000000000 [ 1010.722261][ T4999] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1010.731038][ T4999] R13: 000000000000000b R14: 00007f90b8571f80 R15: 00007ffe06856428 [ 1013.076870][ T5039] FAULT_INJECTION: forcing a failure. [ 1013.076870][ T5039] name failslab, interval 1, probability 0, space 0, times 0 [ 1013.095124][ T5039] CPU: 1 PID: 5039 Comm: syz.2.12058 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 1013.110619][ T5039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1013.123031][ T5039] Call Trace: [ 1013.126443][ T5039] dump_stack_lvl+0x1e2/0x24b [ 1013.132042][ T5039] ? panic+0x812/0x812 [ 1013.136194][ T5039] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1013.142711][ T5039] ? fib6_table_lookup+0x986/0xaf0 [ 1013.148350][ T5039] dump_stack+0x15/0x17 [ 1013.153201][ T5039] should_fail+0x3c6/0x510 [ 1013.158733][ T5039] ? skb_ext_add+0x13a/0x770 [ 1013.164889][ T5039] __should_failslab+0xa4/0xe0 [ 1013.170297][ T5039] should_failslab+0x9/0x20 [ 1013.175481][ T5039] kmem_cache_alloc+0x3d/0x2e0 [ 1013.180520][ T5039] skb_ext_add+0x13a/0x770 [ 1013.184814][ T5039] xfrm_input+0x422/0x6cb0 [ 1013.189864][ T5039] ? fib6_table_lookup+0xaf0/0xaf0 [ 1013.195513][ T5039] ? __ipv6_chk_addr_and_flags+0x38c/0x3d0 [ 1013.201946][ T5039] ? xfrm_parse_spi+0x570/0x570 [ 1013.206766][ T5039] ? ip6_tnl_rcv_ctl+0x2c3/0x410 [ 1013.211573][ T5039] vti6_input_proto+0x37a/0x4c0 [ 1013.216527][ T5039] vti6_rcv+0x9a/0xe0 [ 1013.220627][ T5039] xfrm6_ah_rcv+0x65/0xf0 [ 1013.225057][ T5039] ip6_protocol_deliver_rcu+0xa57/0x12f0 [ 1013.231387][ T5039] ? ip6table_filter_hook+0x69/0x80 [ 1013.237473][ T5039] ip6_input+0xdc/0x260 [ 1013.241609][ T5039] ? ip6_protocol_deliver_rcu+0x12f0/0x12f0 [ 1013.247304][ T5039] ? ip6_input+0x260/0x260 [ 1013.251884][ T5039] ? ip6table_raw_hook+0x69/0x80 [ 1013.257412][ T5039] ip6_rcv_finish+0x185/0x350 [ 1013.262406][ T5039] ipv6_rcv+0xee/0x270 [ 1013.266889][ T5039] ? ip6_rcv_finish+0x350/0x350 [ 1013.272939][ T5039] ? refcount_add+0x80/0x80 [ 1013.277458][ T5039] ? down_read_trylock+0x179/0x1d0 [ 1013.282684][ T5039] ? kasan_poison+0x5d/0x70 [ 1013.287355][ T5039] ? __kasan_kmalloc_large+0xad/0xc0 [ 1013.294121][ T5039] ? __init_rwsem+0x1c0/0x1c0 [ 1013.300470][ T5039] ? ip6_rcv_finish+0x350/0x350 [ 1013.307016][ T5039] __netif_receive_skb+0x1c6/0x530 [ 1013.312309][ T5039] ? __kasan_check_write+0x14/0x20 [ 1013.318003][ T5039] ? exc_page_fault+0x33d/0x5b0 [ 1013.323422][ T5039] ? deliver_ptype_list_skb+0x3c0/0x3c0 [ 1013.330068][ T5039] ? asm_exc_page_fault+0x1e/0x30 [ 1013.335798][ T5039] ? _copy_from_iter+0x261/0xd10 [ 1013.340578][ T5039] netif_receive_skb+0xb0/0x480 [ 1013.345328][ T5039] ? _copy_from_iter+0x3e6/0xd10 [ 1013.350532][ T5039] ? netif_receive_skb_core+0x210/0x210 [ 1013.355930][ T5039] ? sock_alloc_send_pskb+0x936/0xa50 [ 1013.363368][ T5039] tun_rx_batched+0x6d9/0x870 [ 1013.368983][ T5039] ? eth_type_trans+0x2e4/0x620 [ 1013.374727][ T5039] ? local_bh_enable+0x30/0x30 [ 1013.379421][ T5039] tun_get_user+0x2bf3/0x38f0 [ 1013.384594][ T5039] ? kmem_cache_free+0xa9/0x1e0 [ 1013.390169][ T5039] ? do_sys_openat2+0x1fc/0x710 [ 1013.395224][ T5039] ? _kstrtoull+0x3a0/0x4a0 [ 1013.399692][ T5039] ? tun_do_read+0x1f60/0x1f60 [ 1013.404879][ T5039] ? kstrtouint_from_user+0x20a/0x2a0 [ 1013.410219][ T5039] ? kstrtol_from_user+0x310/0x310 [ 1013.415809][ T5039] ? avc_policy_seqno+0x1b/0x70 [ 1013.420988][ T5039] ? selinux_file_permission+0x2bb/0x560 [ 1013.426759][ T5039] ? fsnotify_perm+0x67/0x4e0 [ 1013.431449][ T5039] tun_chr_write_iter+0x1a8/0x250 [ 1013.436425][ T5039] vfs_write+0xb4c/0xe70 [ 1013.441009][ T5039] ? putname+0xe7/0x140 [ 1013.445149][ T5039] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 1013.450957][ T5039] ? kernel_write+0x3d0/0x3d0 [ 1013.457325][ T5039] ? __fdget_pos+0x209/0x3a0 [ 1013.462943][ T5039] ? ksys_write+0x77/0x2c0 [ 1013.467425][ T5039] ksys_write+0x199/0x2c0 [ 1013.473042][ T5039] ? __ia32_sys_read+0x90/0x90 [ 1013.478073][ T5039] ? debug_smp_processor_id+0x17/0x20 [ 1013.483782][ T5039] __x64_sys_write+0x7b/0x90 [ 1013.489248][ T5039] do_syscall_64+0x34/0x70 [ 1013.494083][ T5039] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1013.500069][ T5039] RIP: 0033:0x7f71153fd9f9 [ 1013.504583][ T5039] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1013.528255][ T5039] RSP: 002b:00007f711405c048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1013.537412][ T5039] RAX: ffffffffffffffda RBX: 00007f711558c058 RCX: 00007f71153fd9f9 [ 1013.546197][ T5039] RDX: 000000000000fdef RSI: 0000000020000300 RDI: 00000000000000c8 [ 1013.555067][ T5039] RBP: 00007f711405c0a0 R08: 0000000000000000 R09: 0000000000000000 [ 1013.564449][ T5039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1013.574182][ T5039] R13: 000000000000006e R14: 00007f711558c058 R15: 00007ffe3a526ed8 [ 1015.405065][ T5053] bridge0: port 1(bridge_slave_0) entered blocking state [ 1015.446805][ T5053] bridge0: port 1(bridge_slave_0) entered disabled state [ 1015.456754][ T5053] device bridge_slave_0 entered promiscuous mode [ 1015.491301][ T5053] bridge0: port 2(bridge_slave_1) entered blocking state [ 1015.500270][ T5053] bridge0: port 2(bridge_slave_1) entered disabled state [ 1015.508597][ T5053] device bridge_slave_1 entered promiscuous mode [ 1015.766427][T28118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1015.781872][T28118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1015.822569][ T1226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1015.852104][ T1226] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1015.884977][ T1226] bridge0: port 1(bridge_slave_0) entered blocking state [ 1015.892734][ T1226] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1015.904356][ T1226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1015.913062][ T1226] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1015.921500][ T1226] bridge0: port 2(bridge_slave_1) entered blocking state [ 1015.928594][ T1226] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1016.043885][T28118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1016.074806][T28118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1016.142667][T28118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1016.184278][T28118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1016.255698][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1016.287538][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1016.410653][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1016.419277][ T5053] device veth0_vlan entered promiscuous mode [ 1016.440096][T28120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1016.451262][ T5053] device veth1_macvtap entered promiscuous mode [ 1016.488400][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1016.508580][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1016.606198][ T5099] device pim6reg1 entered promiscuous mode [ 1017.550341][ T5132] Y4`Ҙ: renamed from lo [ 1021.040746][ T5202] bridge0: port 1(bridge_slave_0) entered blocking state [ 1021.051233][ T5202] bridge0: port 1(bridge_slave_0) entered disabled state [ 1021.060453][ T5202] device bridge_slave_0 entered promiscuous mode [ 1021.083454][ T5202] bridge0: port 2(bridge_slave_1) entered blocking state [ 1021.124598][ T5202] bridge0: port 2(bridge_slave_1) entered disabled state [ 1021.144997][ T5202] device bridge_slave_1 entered promiscuous mode [ 1021.190356][ T5231] device pim6reg1 entered promiscuous mode [ 1021.256872][ T5202] bridge0: port 2(bridge_slave_1) entered blocking state [ 1021.264952][ T5202] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1021.274714][ T5202] bridge0: port 1(bridge_slave_0) entered blocking state [ 1021.284203][ T5202] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1021.332217][ T5247] device veth0_vlan left promiscuous mode [ 1021.344134][ T5247] device veth0_vlan entered promiscuous mode [ 1021.387624][ T1226] bridge0: port 1(bridge_slave_0) entered disabled state [ 1021.399175][ T1226] bridge0: port 2(bridge_slave_1) entered disabled state [ 1021.412862][ T1226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1021.424798][ T1226] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1021.433809][ T1226] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1021.469772][T28120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1021.483504][T28120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1021.514134][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1021.555386][ T1225] bridge0: port 1(bridge_slave_0) entered blocking state [ 1021.563121][ T1225] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1021.579936][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1021.589509][ T1225] bridge0: port 2(bridge_slave_1) entered blocking state [ 1021.597492][ T1225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1021.608539][ T5270] device macsec0 entered promiscuous mode [ 1021.633106][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1021.644402][ T5270] device lo entered promiscuous mode [ 1021.653564][ T5270] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1021.666583][ T1226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1021.789820][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1021.830841][ T3654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1021.868860][ T3654] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1021.877624][ T3654] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1021.906597][ T5202] device veth0_vlan entered promiscuous mode [ 1021.999733][ T5202] device veth1_macvtap entered promiscuous mode [ 1022.152889][ T1225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1022.460451][T28608] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1022.482136][T28608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1022.493645][T28608] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1022.505342][T28608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1022.545606][ T5310] device pim6reg1 entered promiscuous mode [ 1022.607394][ T5311] : renamed from pim6reg1 [ 1023.192616][ T5355] device syzkaller0 entered promiscuous mode [ 1023.226914][ T5359] device sit0 left promiscuous mode [ 1023.595162][ T5397] device veth1_macvtap left promiscuous mode [ 1023.629858][ T5397] device macsec0 entered promiscuous mode [ 1023.685499][ T5403] device veth1_macvtap entered promiscuous mode [ 1024.373860][ T5428] device pim6reg1 entered promiscuous mode [ 1024.463418][ T5438] device pim6reg1 entered promiscuous mode [ 1024.995017][ T5448] device syzkaller0 entered promiscuous mode [ 1025.140123][ T5478] device pim6reg1 entered promiscuous mode [ 1025.624626][ T5510] bridge0: port 2(bridge_slave_1) entered disabled state [ 1025.632230][ T5510] bridge0: port 1(bridge_slave_0) entered disabled state [ 1025.952100][ T5519] device veth1_macvtap left promiscuous mode [ 1026.063891][ T5521] device veth1_macvtap entered promiscuous mode [ 1026.075682][ T5521] device macsec0 entered promiscuous mode [ 1026.280068][ T5527] device pim6reg1 entered promiscuous mode [ 1026.537692][ T5543] device sit0 entered promiscuous mode [ 1026.772250][ T5554] device veth0_vlan left promiscuous mode [ 1026.799966][ T5554] device veth0_vlan entered promiscuous mode [ 1026.935226][ T5566] device sit0 left promiscuous mode [ 1026.966823][ T5565] device pim6reg1 entered promiscuous mode [ 1026.985100][ T5566] device sit0 entered promiscuous mode [ 1027.254894][ T5616] device veth0_vlan left promiscuous mode [ 1027.317519][ T5616] device veth0_vlan entered promiscuous mode [ 1027.360439][ T1318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1027.374584][ T1318] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1027.384340][ T1318] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1027.398105][ T5623] device pim6reg1 entered promiscuous mode [ 1027.714819][ T5640] FAULT_INJECTION: forcing a failure. [ 1027.714819][ T5640] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1027.780683][ T5640] CPU: 0 PID: 5640 Comm: syz.3.12242 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 1027.792820][ T5640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1027.805445][ T5640] Call Trace: [ 1027.808763][ T5640] dump_stack_lvl+0x1e2/0x24b [ 1027.813641][ T5640] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1027.820381][ T5640] ? htab_map_update_elem+0x64d/0x880 [ 1027.826562][ T5640] dump_stack+0x15/0x17 [ 1027.830928][ T5640] should_fail+0x3c6/0x510 [ 1027.836129][ T5640] should_fail_usercopy+0x1a/0x20 [ 1027.843044][ T5640] _copy_from_user+0x20/0xd0 [ 1027.848135][ T5640] generic_map_update_batch+0x4e5/0x860 [ 1027.853827][ T5640] ? generic_map_delete_batch+0x630/0x630 [ 1027.859555][ T5640] ? generic_map_delete_batch+0x630/0x630 [ 1027.867204][ T5640] bpf_map_do_batch+0x4c3/0x620 [ 1027.875294][ T5640] __se_sys_bpf+0xc3c/0x11cb0 [ 1027.880625][ T5640] ? stack_trace_save+0x113/0x1c0 [ 1027.886378][ T5640] ? terminate_walk+0x407/0x4f0 [ 1027.892603][ T5640] ? stack_trace_snprint+0xf0/0xf0 [ 1027.898809][ T5640] ? kmem_cache_free+0xa9/0x1e0 [ 1027.904006][ T5640] ? kmem_cache_free+0xa9/0x1e0 [ 1027.909844][ T5640] ? kasan_set_track+0x5d/0x70 [ 1027.914496][ T5640] ? __x64_sys_bpf+0x90/0x90 [ 1027.920033][ T5640] ? __kasan_slab_free+0x11/0x20 [ 1027.925634][ T5640] ? slab_free_freelist_hook+0xc0/0x190 [ 1027.931744][ T5640] ? kmem_cache_free+0xa9/0x1e0 [ 1027.937514][ T5640] ? putname+0xe7/0x140 [ 1027.942258][ T5640] ? do_sys_openat2+0x1fc/0x710 [ 1027.948048][ T5640] ? __x64_sys_openat+0x243/0x290 [ 1027.953304][ T5640] ? do_syscall_64+0x34/0x70 [ 1027.958879][ T5640] ? _kstrtoull+0x3a0/0x4a0 [ 1027.964279][ T5640] ? kstrtouint_from_user+0x20a/0x2a0 [ 1027.969896][ T5640] ? kstrtol_from_user+0x310/0x310 [ 1027.975143][ T5640] ? memset+0x35/0x40 [ 1027.979148][ T5640] ? __fsnotify_parent+0x4b9/0x6c0 [ 1027.984444][ T5640] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 1027.991394][ T5640] ? proc_fail_nth_write+0x20b/0x290 [ 1027.997062][ T5640] ? proc_fail_nth_read+0x210/0x210 [ 1028.002968][ T5640] ? security_file_permission+0x86/0xb0 [ 1028.009434][ T5640] ? rw_verify_area+0x1c3/0x360 [ 1028.014383][ T5640] ? preempt_count_add+0x92/0x1a0 [ 1028.021392][ T5640] ? vfs_write+0x852/0xe70 [ 1028.026980][ T5640] ? kmem_cache_free+0xa9/0x1e0 [ 1028.032287][ T5640] ? kernel_write+0x3d0/0x3d0 [ 1028.037043][ T5640] ? __kasan_check_write+0x14/0x20 [ 1028.042172][ T5640] ? mutex_lock+0xa5/0x110 [ 1028.046679][ T5640] ? mutex_trylock+0xa0/0xa0 [ 1028.051475][ T5640] ? __kasan_check_write+0x14/0x20 [ 1028.056473][ T5640] ? fput_many+0x160/0x1b0 [ 1028.061038][ T5640] ? debug_smp_processor_id+0x17/0x20 [ 1028.067397][ T5640] __x64_sys_bpf+0x7b/0x90 [ 1028.072122][ T5640] do_syscall_64+0x34/0x70 [ 1028.076678][ T5640] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1028.082535][ T5640] RIP: 0033:0x7fa876ae09f9 [ 1028.086807][ T5640] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1028.109822][ T5640] RSP: 002b:00007fa875760048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1028.118239][ T5640] RAX: ffffffffffffffda RBX: 00007fa876c6ef80 RCX: 00007fa876ae09f9 [ 1028.126313][ T5640] RDX: 0000000000000038 RSI: 0000000020001840 RDI: 000000000000001a [ 1028.134291][ T5640] RBP: 00007fa8757600a0 R08: 0000000000000000 R09: 0000000000000000 [ 1028.142304][ T5640] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1028.150164][ T5640] R13: 000000000000000b R14: 00007fa876c6ef80 R15: 00007ffd493134d8 [ 1028.751589][ T5659] device syzkaller0 entered promiscuous mode [ 1028.819258][ T5667] device pim6reg1 entered promiscuous mode [ 1028.899675][ T5682] FAULT_INJECTION: forcing a failure. [ 1028.899675][ T5682] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1028.913215][ T5682] CPU: 1 PID: 5682 Comm: syz.2.12254 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 1028.925825][ T5682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1028.936140][ T5682] Call Trace: [ 1028.940051][ T5682] dump_stack_lvl+0x1e2/0x24b [ 1028.944748][ T5682] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1028.950895][ T5682] dump_stack+0x15/0x17 [ 1028.956124][ T5682] should_fail+0x3c6/0x510 [ 1028.960471][ T5682] should_fail_alloc_page+0x52/0x60 [ 1028.965822][ T5682] __alloc_pages_nodemask+0x1b3/0xaf0 [ 1028.971353][ T5682] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 1028.977235][ T5682] ? can_reuse_spf_vma+0xe0/0xe0 [ 1028.982295][ T5682] kmalloc_order+0x4c/0x170 [ 1028.986890][ T5682] kmalloc_order_trace+0x18/0x90 [ 1028.991960][ T5682] __kmalloc+0x1f1/0x330 [ 1028.997129][ T5682] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 1029.003161][ T5682] alloc_htab_elem+0x269/0x710 [ 1029.009139][ T5682] ? htab_map_hash+0x356/0x7e0 [ 1029.014499][ T5682] htab_map_update_elem+0x2c6/0x880 [ 1029.022612][ T5682] bpf_map_update_value+0x230/0x420 [ 1029.028803][ T5682] generic_map_update_batch+0x533/0x860 [ 1029.034269][ T5682] ? generic_map_delete_batch+0x630/0x630 [ 1029.040673][ T5682] ? generic_map_delete_batch+0x630/0x630 [ 1029.046626][ T5682] bpf_map_do_batch+0x4c3/0x620 [ 1029.052810][ T5682] __se_sys_bpf+0xc3c/0x11cb0 [ 1029.058033][ T5682] ? stack_trace_save+0x113/0x1c0 [ 1029.063388][ T5682] ? terminate_walk+0x407/0x4f0 [ 1029.068947][ T5682] ? stack_trace_snprint+0xf0/0xf0 [ 1029.074559][ T5682] ? kmem_cache_free+0xa9/0x1e0 [ 1029.079513][ T5682] ? kmem_cache_free+0xa9/0x1e0 [ 1029.084601][ T5682] ? kasan_set_track+0x5d/0x70 [ 1029.089214][ T5682] ? __x64_sys_bpf+0x90/0x90 [ 1029.093949][ T5682] ? __kasan_slab_free+0x11/0x20 [ 1029.099467][ T5682] ? slab_free_freelist_hook+0xc0/0x190 [ 1029.105469][ T5682] ? kmem_cache_free+0xa9/0x1e0 [ 1029.110158][ T5682] ? putname+0xe7/0x140 [ 1029.114232][ T5682] ? do_sys_openat2+0x1fc/0x710 [ 1029.119063][ T5682] ? __x64_sys_openat+0x243/0x290 [ 1029.124347][ T5682] ? do_syscall_64+0x34/0x70 [ 1029.128939][ T5682] ? _kstrtoull+0x3a0/0x4a0 [ 1029.133843][ T5682] ? kstrtouint_from_user+0x20a/0x2a0 [ 1029.139343][ T5682] ? kstrtol_from_user+0x310/0x310 [ 1029.145330][ T5682] ? memset+0x35/0x40 [ 1029.149938][ T5682] ? __fsnotify_parent+0x4b9/0x6c0 [ 1029.155297][ T5682] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 1029.162514][ T5682] ? proc_fail_nth_write+0x20b/0x290 [ 1029.167664][ T5682] ? proc_fail_nth_read+0x210/0x210 [ 1029.172857][ T5682] ? security_file_permission+0x86/0xb0 [ 1029.178977][ T5682] ? rw_verify_area+0x1c3/0x360 [ 1029.183884][ T5682] ? preempt_count_add+0x92/0x1a0 [ 1029.189716][ T5682] ? vfs_write+0x852/0xe70 [ 1029.195700][ T5682] ? kmem_cache_free+0xa9/0x1e0 [ 1029.201167][ T5682] ? kernel_write+0x3d0/0x3d0 [ 1029.206295][ T5682] ? __kasan_check_write+0x14/0x20 [ 1029.212040][ T5682] ? mutex_lock+0xa5/0x110 [ 1029.216650][ T5682] ? mutex_trylock+0xa0/0xa0 [ 1029.221963][ T5682] ? __kasan_check_write+0x14/0x20 [ 1029.228092][ T5682] ? fput_many+0x160/0x1b0 [ 1029.232733][ T5682] ? debug_smp_processor_id+0x17/0x20 [ 1029.238136][ T5682] __x64_sys_bpf+0x7b/0x90 [ 1029.243418][ T5682] do_syscall_64+0x34/0x70 [ 1029.248580][ T5682] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1029.254668][ T5682] RIP: 0033:0x7f71153fd9f9 [ 1029.259359][ T5682] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1029.280909][ T5682] RSP: 002b:00007f711407d048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1029.289388][ T5682] RAX: ffffffffffffffda RBX: 00007f711558bf80 RCX: 00007f71153fd9f9 [ 1029.298160][ T5682] RDX: 0000000000000038 RSI: 0000000020001840 RDI: 000000000000001a [ 1029.306935][ T5682] RBP: 00007f711407d0a0 R08: 0000000000000000 R09: 0000000000000000 [ 1029.315465][ T5682] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1029.323976][ T5682] R13: 000000000000000b R14: 00007f711558bf80 R15: 00007ffe3a526ed8 [ 1029.378887][ T5688] bridge0: port 2(bridge_slave_1) entered disabled state [ 1029.393157][ T5688] bridge0: port 1(bridge_slave_0) entered disabled state [ 1029.665082][ T5695] device pim6reg1 entered promiscuous mode [ 1030.043844][ T5709] device pim6reg1 entered promiscuous mode [ 1030.099502][ T5713] FAULT_INJECTION: forcing a failure. [ 1030.099502][ T5713] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1030.114138][ T5713] CPU: 0 PID: 5713 Comm: syz.3.12267 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 1030.127073][ T5713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1030.138233][ T5713] Call Trace: [ 1030.141870][ T5713] dump_stack_lvl+0x1e2/0x24b [ 1030.147335][ T5713] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1030.154061][ T5713] ? htab_map_update_elem+0x64d/0x880 [ 1030.159635][ T5713] dump_stack+0x15/0x17 [ 1030.164391][ T5713] should_fail+0x3c6/0x510 [ 1030.170025][ T5713] should_fail_usercopy+0x1a/0x20 [ 1030.175499][ T5713] _copy_from_user+0x20/0xd0 [ 1030.180949][ T5713] generic_map_update_batch+0x474/0x860 [ 1030.188680][ T5713] ? generic_map_delete_batch+0x630/0x630 [ 1030.195508][ T5713] ? generic_map_delete_batch+0x630/0x630 [ 1030.202862][ T5713] bpf_map_do_batch+0x4c3/0x620 [ 1030.210551][ T5713] __se_sys_bpf+0xc3c/0x11cb0 [ 1030.217403][ T5713] ? stack_trace_save+0x113/0x1c0 [ 1030.224336][ T5713] ? terminate_walk+0x407/0x4f0 [ 1030.230513][ T5713] ? stack_trace_snprint+0xf0/0xf0 [ 1030.236201][ T5713] ? kmem_cache_free+0xa9/0x1e0 [ 1030.242250][ T5713] ? kmem_cache_free+0xa9/0x1e0 [ 1030.247158][ T5713] ? kasan_set_track+0x5d/0x70 [ 1030.252384][ T5713] ? __x64_sys_bpf+0x90/0x90 [ 1030.257212][ T5713] ? __kasan_slab_free+0x11/0x20 [ 1030.262793][ T5713] ? slab_free_freelist_hook+0xc0/0x190 [ 1030.269841][ T5713] ? kmem_cache_free+0xa9/0x1e0 [ 1030.275453][ T5713] ? putname+0xe7/0x140 [ 1030.280237][ T5713] ? do_sys_openat2+0x1fc/0x710 [ 1030.287774][ T5713] ? __x64_sys_openat+0x243/0x290 [ 1030.295545][ T5713] ? do_syscall_64+0x34/0x70 [ 1030.303614][ T5713] ? _kstrtoull+0x3a0/0x4a0 [ 1030.312053][ T5713] ? kstrtouint_from_user+0x20a/0x2a0 [ 1030.322336][ T5713] ? kstrtol_from_user+0x310/0x310 [ 1030.332261][ T5713] ? memset+0x35/0x40 [ 1030.339151][ T5713] ? __fsnotify_parent+0x4b9/0x6c0 [ 1030.346603][ T5713] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 1030.356651][ T5713] ? proc_fail_nth_write+0x20b/0x290 [ 1030.364755][ T5713] ? proc_fail_nth_read+0x210/0x210 [ 1030.372106][ T5713] ? security_file_permission+0x86/0xb0 [ 1030.379811][ T5713] ? rw_verify_area+0x1c3/0x360 [ 1030.388071][ T5713] ? preempt_count_add+0x92/0x1a0 [ 1030.394192][ T5713] ? vfs_write+0x852/0xe70 [ 1030.398405][ T5713] ? kmem_cache_free+0xa9/0x1e0 [ 1030.403704][ T5713] ? kernel_write+0x3d0/0x3d0 [ 1030.408802][ T5713] ? __kasan_check_write+0x14/0x20 [ 1030.414299][ T5713] ? mutex_lock+0xa5/0x110 [ 1030.420417][ T5713] ? mutex_trylock+0xa0/0xa0 [ 1030.426154][ T5713] ? __kasan_check_write+0x14/0x20 [ 1030.431419][ T5713] ? fput_many+0x160/0x1b0 [ 1030.436234][ T5713] ? debug_smp_processor_id+0x17/0x20 [ 1030.441761][ T5713] __x64_sys_bpf+0x7b/0x90 [ 1030.447040][ T5713] do_syscall_64+0x34/0x70 [ 1030.452673][ T5713] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1030.461523][ T5713] RIP: 0033:0x7fa876ae09f9 [ 1030.467768][ T5713] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1030.494285][ T5713] RSP: 002b:00007fa875760048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1030.506299][ T5713] RAX: ffffffffffffffda RBX: 00007fa876c6ef80 RCX: 00007fa876ae09f9 [ 1030.517151][ T5713] RDX: 0000000000000038 RSI: 0000000020001840 RDI: 000000000000001a [ 1030.527107][ T5713] RBP: 00007fa8757600a0 R08: 0000000000000000 R09: 0000000000000000 [ 1030.536081][ T5713] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1030.544999][ T5713] R13: 000000000000000b R14: 00007fa876c6ef80 R15: 00007ffd493134d8 [ 1030.879779][ T5726] syz.3.12272[5726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1030.879851][ T5726] syz.3.12272[5726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1030.894957][ T5727] syz.3.12272[5727] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1030.915804][ T5726] syz.3.12272[5726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1030.934883][ T5727] syz.3.12272[5727] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1031.825784][ T5752] FAULT_INJECTION: forcing a failure. [ 1031.825784][ T5752] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1031.913576][ T5752] CPU: 1 PID: 5752 Comm: syz.2.12280 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 1031.928432][ T5752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1031.941250][ T5752] Call Trace: [ 1031.944680][ T5752] dump_stack_lvl+0x1e2/0x24b [ 1031.949430][ T5752] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1031.955022][ T5752] ? htab_map_update_elem+0x64d/0x880 [ 1031.960764][ T5752] dump_stack+0x15/0x17 [ 1031.964722][ T5752] should_fail+0x3c6/0x510 [ 1031.968979][ T5752] should_fail_usercopy+0x1a/0x20 [ 1031.974343][ T5752] _copy_from_user+0x20/0xd0 [ 1031.978768][ T5752] generic_map_update_batch+0x4e5/0x860 [ 1031.984481][ T5752] ? generic_map_delete_batch+0x630/0x630 [ 1031.992671][ T5752] ? generic_map_delete_batch+0x630/0x630 [ 1032.000186][ T5752] bpf_map_do_batch+0x4c3/0x620 [ 1032.006380][ T5752] __se_sys_bpf+0xc3c/0x11cb0 [ 1032.013069][ T5752] ? stack_trace_save+0x113/0x1c0 [ 1032.020891][ T5752] ? terminate_walk+0x407/0x4f0 [ 1032.027539][ T5752] ? stack_trace_snprint+0xf0/0xf0 [ 1032.034753][ T5752] ? kmem_cache_free+0xa9/0x1e0 [ 1032.041618][ T5752] ? kmem_cache_free+0xa9/0x1e0 [ 1032.047973][ T5752] ? kasan_set_track+0x5d/0x70 [ 1032.054902][ T5752] ? __x64_sys_bpf+0x90/0x90 [ 1032.061106][ T5752] ? __kasan_slab_free+0x11/0x20 [ 1032.066988][ T5752] ? slab_free_freelist_hook+0xc0/0x190 [ 1032.073165][ T5752] ? kmem_cache_free+0xa9/0x1e0 [ 1032.078909][ T5752] ? putname+0xe7/0x140 [ 1032.083317][ T5752] ? do_sys_openat2+0x1fc/0x710 [ 1032.089279][ T5752] ? __x64_sys_openat+0x243/0x290 [ 1032.095150][ T5752] ? do_syscall_64+0x34/0x70 [ 1032.100847][ T5752] ? _kstrtoull+0x3a0/0x4a0 [ 1032.106179][ T5752] ? kstrtouint_from_user+0x20a/0x2a0 [ 1032.112649][ T5752] ? kstrtol_from_user+0x310/0x310 [ 1032.117841][ T5752] ? memset+0x35/0x40 [ 1032.121654][ T5752] ? __fsnotify_parent+0x4b9/0x6c0 [ 1032.126974][ T5752] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 1032.133939][ T5752] ? proc_fail_nth_write+0x20b/0x290 [ 1032.139315][ T5752] ? proc_fail_nth_read+0x210/0x210 [ 1032.145668][ T5752] ? security_file_permission+0x86/0xb0 [ 1032.152664][ T5752] ? rw_verify_area+0x1c3/0x360 [ 1032.157709][ T5752] ? preempt_count_add+0x92/0x1a0 [ 1032.162567][ T5752] ? vfs_write+0x852/0xe70 [ 1032.169472][ T5752] ? kmem_cache_free+0x1c0/0x1e0 [ 1032.176491][ T5752] ? kernel_write+0x3d0/0x3d0 [ 1032.183114][ T5752] ? __kasan_check_write+0x14/0x20 [ 1032.188603][ T5752] ? mutex_lock+0xa5/0x110 [ 1032.194283][ T5752] ? mutex_trylock+0xa0/0xa0 [ 1032.201163][ T5752] ? __kasan_check_write+0x14/0x20 [ 1032.207745][ T5752] ? fput_many+0x160/0x1b0 [ 1032.212720][ T5752] ? debug_smp_processor_id+0x17/0x20 [ 1032.218992][ T5752] __x64_sys_bpf+0x7b/0x90 [ 1032.224019][ T5752] do_syscall_64+0x34/0x70 [ 1032.229210][ T5752] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1032.236897][ T5752] RIP: 0033:0x7f71153fd9f9 [ 1032.243290][ T5752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1032.265380][ T5752] RSP: 002b:00007f711405c048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1032.274801][ T5752] RAX: ffffffffffffffda RBX: 00007f711558c058 RCX: 00007f71153fd9f9 [ 1032.284264][ T5752] RDX: 0000000000000038 RSI: 0000000020001840 RDI: 000000000000001a [ 1032.292457][ T5752] RBP: 00007f711405c0a0 R08: 0000000000000000 R09: 0000000000000000 [ 1032.300777][ T5752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1032.309045][ T5752] R13: 000000000000006e R14: 00007f711558c058 R15: 00007ffe3a526ed8 [ 1032.769544][ T5785] device sit0 left promiscuous mode [ 1032.874989][ T5785] device sit0 entered promiscuous mode [ 1033.630871][ T5828] device wg2 left promiscuous mode [ 1033.802374][ T5828] device pim6reg1 entered promiscuous mode [ 1033.843586][ T5839] syz.3.12309[5839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1033.843657][ T5839] syz.3.12309[5839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1033.916831][ T5839] syz.3.12309[5839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1036.347954][ T5894] bridge0: port 1(bridge_slave_0) entered blocking state [ 1036.370483][ T5894] bridge0: port 1(bridge_slave_0) entered disabled state [ 1036.380876][ T5894] device bridge_slave_0 entered promiscuous mode [ 1036.390579][ T5894] bridge0: port 2(bridge_slave_1) entered blocking state [ 1036.400170][ T5894] bridge0: port 2(bridge_slave_1) entered disabled state [ 1036.408840][ T5894] device bridge_slave_1 entered promiscuous mode [ 1036.458242][ T5925] device veth0_vlan left promiscuous mode [ 1036.478700][ T5925] device veth0_vlan entered promiscuous mode [ 1036.602493][T28607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1036.612012][T28607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1036.645217][ T8213] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1036.656999][ T8213] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1036.668170][ T8213] bridge0: port 1(bridge_slave_0) entered blocking state [ 1036.675365][ T8213] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1036.684713][ T8213] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1036.695066][ T8213] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1036.704643][ T8213] bridge0: port 2(bridge_slave_1) entered blocking state [ 1036.712235][ T8213] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1036.729657][ T8213] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1036.761733][ T7] device bridge_slave_1 left promiscuous mode [ 1036.769952][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1036.816110][ T7] device bridge_slave_0 left promiscuous mode [ 1036.823859][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1036.865486][ T7] device bridge_slave_1 left promiscuous mode [ 1036.883003][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1036.936654][ T7] device bridge_slave_0 left promiscuous mode [ 1036.988118][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1037.014705][ T7] device bridge_slave_1 left promiscuous mode [ 1037.033247][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1037.053351][ T7] device bridge_slave_0 left promiscuous mode [ 1037.070298][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1037.094306][ T7] device bridge_slave_1 left promiscuous mode [ 1037.111351][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1037.129741][ T7] device bridge_slave_0 left promiscuous mode [ 1037.143053][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1037.164640][ T7] device veth0_vlan left promiscuous mode [ 1037.180482][ T7] device veth0_vlan left promiscuous mode [ 1037.196296][ T7] device veth0_vlan left promiscuous mode [ 1037.860555][T28610] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1037.880161][T28120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1037.893112][T28120] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1038.123875][T28120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1038.165355][T28120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1038.241650][ T5894] device veth0_vlan entered promiscuous mode [ 1038.284977][T28117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1038.344286][T28117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1038.370765][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1038.394415][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1038.404822][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1038.416888][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1038.429417][ T5894] device veth1_macvtap entered promiscuous mode [ 1038.473563][T28117] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1038.484027][T28117] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1038.509382][T28117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1039.484308][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1039.494853][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1047.051385][ T6009] bridge0: port 1(bridge_slave_0) entered blocking state [ 1047.059288][ T6009] bridge0: port 1(bridge_slave_0) entered disabled state [ 1047.067552][ T6009] device bridge_slave_0 entered promiscuous mode [ 1047.076640][ T6009] bridge0: port 2(bridge_slave_1) entered blocking state [ 1047.084214][ T6009] bridge0: port 2(bridge_slave_1) entered disabled state [ 1047.093507][ T6009] device bridge_slave_1 entered promiscuous mode [ 1047.144307][ T6009] bridge0: port 2(bridge_slave_1) entered blocking state [ 1047.152158][ T6009] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1047.159328][ T6009] bridge0: port 1(bridge_slave_0) entered blocking state [ 1047.166580][ T6009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1047.253857][ T6009] device veth0_vlan entered promiscuous mode [ 1047.269758][ T6009] device veth1_macvtap entered promiscuous mode [ 1047.293030][ T8213] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1047.301373][ T8213] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1047.309875][ T8213] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1047.325291][ T8213] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1047.333797][ T8213] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1047.342367][ T8213] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1047.350945][ T8213] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1047.359214][ T8213] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1047.367885][ T8213] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1047.375978][ T8213] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1047.383438][ T8213] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1047.391903][ T8213] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1054.100740][ T6007] bridge0: port 1(bridge_slave_0) entered blocking state [ 1054.792047][ T6007] bridge0: port 1(bridge_slave_0) entered disabled state [ 1054.873688][ T6007] device bridge_slave_0 entered promiscuous mode [ 1055.695906][ T6007] bridge0: port 2(bridge_slave_1) entered blocking state [ 1055.702952][ T6007] bridge0: port 2(bridge_slave_1) entered disabled state [ 1055.758973][ T6007] device bridge_slave_1 entered promiscuous mode [ 1057.437270][ T6035] bridge0: port 1(bridge_slave_0) entered blocking state [ 1057.539375][ T6035] bridge0: port 1(bridge_slave_0) entered disabled state [ 1057.689416][ T6035] device bridge_slave_0 entered promiscuous mode [ 1058.674602][ T6035] bridge0: port 2(bridge_slave_1) entered blocking state [ 1058.683847][ T6035] bridge0: port 2(bridge_slave_1) entered disabled state [ 1059.825239][ T6035] device bridge_slave_1 entered promiscuous mode [ 1060.655911][T28607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1060.664027][T28607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1061.402517][T28607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1061.556750][T28607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1061.762845][T28607] bridge0: port 1(bridge_slave_0) entered blocking state [ 1061.769869][T28607] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1061.896508][T28607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1061.904807][T28607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1062.004050][T28607] bridge0: port 2(bridge_slave_1) entered blocking state [ 1062.011127][T28607] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1062.021923][T28610] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1062.322040][T28610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1062.330151][T28610] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1062.338292][T28610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1062.347483][T28610] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1062.356971][T28610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1062.365023][T28610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1062.376738][ T6007] device veth0_vlan entered promiscuous mode [ 1062.618363][ T3655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1062.779336][ T3655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1062.902304][ T6007] device veth1_macvtap entered promiscuous mode [ 1064.582149][T28610] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1064.693395][T28610] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1064.724559][T28610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1064.733999][T28610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1064.742779][T28610] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1064.750512][T28610] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1064.760172][T28610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1064.769725][T28610] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1064.779169][T28610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1064.838430][ T6110] device pim6reg1 entered promiscuous mode [ 1064.907473][ T6116] syz.1.12359[6116] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1064.907531][ T6116] syz.1.12359[6116] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1065.024084][T28607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1065.049775][T28607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1065.109988][T28610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1065.128981][T28610] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1065.177229][T28610] bridge0: port 1(bridge_slave_0) entered blocking state [ 1065.184674][T28610] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1065.264823][T28610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1065.309300][T28610] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1065.357451][T28610] bridge0: port 2(bridge_slave_1) entered blocking state [ 1065.364486][T28610] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1065.450025][ T3655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1065.490507][ T3655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1065.539416][ T3655] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1065.584405][ T3655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1065.634859][ T3655] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1065.875373][T28607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1065.901967][T28607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1065.997012][ T6035] device veth0_vlan entered promiscuous mode [ 1066.095293][ T5222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1066.124810][ T5222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1066.181825][ T6035] device veth1_macvtap entered promiscuous mode [ 1066.207205][T28607] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1066.216328][T28607] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1066.225011][T28607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1066.235160][T28607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1066.244926][T28607] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1066.292422][ T5222] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1066.302120][ T5222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1066.311543][ T5222] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1066.320925][ T5222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1068.328042][ T7] device bridge_slave_1 left promiscuous mode [ 1068.334484][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1068.406957][ T7] device bridge_slave_0 left promiscuous mode [ 1068.428895][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1068.437624][ T7] device bridge_slave_1 left promiscuous mode [ 1068.443972][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1068.451960][ T7] device bridge_slave_0 left promiscuous mode [ 1068.461318][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1068.487038][ T7] device veth1_macvtap left promiscuous mode [ 1068.505549][ T7] device veth0_vlan left promiscuous mode [ 1068.518526][ T7] device veth1_macvtap left promiscuous mode [ 1068.533104][ T7] device veth0_vlan left promiscuous mode [ 1070.205671][ T6190] device syzkaller0 entered promiscuous mode [ 1071.715522][ T6233] device pim6reg1 entered promiscuous mode [ 1071.744439][ T6232] device veth0_vlan left promiscuous mode [ 1071.797009][ T6232] device veth0_vlan entered promiscuous mode [ 1071.932083][ T6247] device pim6reg1 entered promiscuous mode [ 1072.074499][ T6251] bridge0: port 2(bridge_slave_1) entered disabled state [ 1072.082408][ T6251] bridge0: port 1(bridge_slave_0) entered disabled state [ 1072.454021][ T7] device bridge_slave_1 left promiscuous mode [ 1072.492785][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1072.521072][ T7] device bridge_slave_0 left promiscuous mode [ 1072.551801][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1072.586742][ T7] device veth1_macvtap left promiscuous mode [ 1072.612547][ T7] device veth0_vlan left promiscuous mode [ 1073.304669][ T6275] device syzkaller0 entered promiscuous mode [ 1073.602319][ T6291] device pim6reg1 entered promiscuous mode [ 1073.646509][ T6290] FAULT_INJECTION: forcing a failure. [ 1073.646509][ T6290] name failslab, interval 1, probability 0, space 0, times 0 [ 1073.659983][ T6290] CPU: 1 PID: 6290 Comm: syz.4.12438 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 1073.672361][ T6290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1073.682573][ T6290] Call Trace: [ 1073.685717][ T6290] dump_stack_lvl+0x1e2/0x24b [ 1073.690193][ T6290] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1073.695742][ T6290] dump_stack+0x15/0x17 [ 1073.700090][ T6290] should_fail+0x3c6/0x510 [ 1073.704359][ T6290] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 1073.709811][ T6290] __should_failslab+0xa4/0xe0 [ 1073.714599][ T6290] should_failslab+0x9/0x20 [ 1073.719056][ T6290] __kmalloc_track_caller+0x5f/0x320 [ 1073.724268][ T6290] ? kmem_cache_alloc+0x168/0x2e0 [ 1073.729415][ T6290] ? __alloc_skb+0x80/0x510 [ 1073.733893][ T6290] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 1073.739203][ T6290] __alloc_skb+0xbc/0x510 [ 1073.743447][ T6290] ? if_nlmsg_size+0x59c/0x5f0 [ 1073.748138][ T6290] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 1073.753522][ T6290] rtnetlink_event+0xf3/0x1b0 [ 1073.758488][ T6290] raw_notifier_call_chain+0x8c/0xf0 [ 1073.764215][ T6290] dev_change_tx_queue_len+0x1d9/0x350 [ 1073.770343][ T6290] ? dev_set_mtu+0x180/0x180 [ 1073.775287][ T6290] dev_ifsioc+0x60b/0xae0 [ 1073.779711][ T6290] ? dev_ioctl+0xb40/0xb40 [ 1073.784440][ T6290] ? dev_get_by_name_rcu+0xc5/0xf0 [ 1073.789449][ T6290] dev_ioctl+0x526/0xb40 [ 1073.793548][ T6290] sock_do_ioctl+0x295/0x3a0 [ 1073.798062][ T6290] ? sock_show_fdinfo+0xa0/0xa0 [ 1073.802805][ T6290] ? kernel_write+0x3d0/0x3d0 [ 1073.807463][ T6290] ? selinux_file_ioctl+0x3cc/0x540 [ 1073.812568][ T6290] sock_ioctl+0x4a6/0x760 [ 1073.816958][ T6290] ? sock_poll+0x340/0x340 [ 1073.821874][ T6290] ? security_file_ioctl+0x84/0xb0 [ 1073.827921][ T6290] ? sock_poll+0x340/0x340 [ 1073.832796][ T6290] __se_sys_ioctl+0x114/0x190 [ 1073.838148][ T6290] __x64_sys_ioctl+0x7b/0x90 [ 1073.843044][ T6290] do_syscall_64+0x34/0x70 [ 1073.847370][ T6290] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1073.853535][ T6290] RIP: 0033:0x7fe8c18a59f9 [ 1073.857925][ T6290] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1073.879123][ T6290] RSP: 002b:00007fe8c0525048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1073.887479][ T6290] RAX: ffffffffffffffda RBX: 00007fe8c1a33f80 RCX: 00007fe8c18a59f9 [ 1073.895785][ T6290] RDX: 0000000020002280 RSI: 0000000000008943 RDI: 0000000000000005 [ 1073.903530][ T6290] RBP: 00007fe8c05250a0 R08: 0000000000000000 R09: 0000000000000000 [ 1073.911874][ T6290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1073.920256][ T6290] R13: 000000000000000b R14: 00007fe8c1a33f80 R15: 00007fff07f0af78 [ 1073.949293][ T6295] device pim6reg1 entered promiscuous mode [ 1075.764169][ T6338] device pim6reg1 entered promiscuous mode [ 1075.826293][ T6339] FAULT_INJECTION: forcing a failure. [ 1075.826293][ T6339] name failslab, interval 1, probability 0, space 0, times 0 [ 1075.841726][ T6339] CPU: 1 PID: 6339 Comm: syz.2.12455 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 1075.853402][ T6339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1075.863943][ T6339] Call Trace: [ 1075.867452][ T6339] dump_stack_lvl+0x1e2/0x24b [ 1075.872123][ T6339] ? panic+0x812/0x812 [ 1075.876158][ T6339] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1075.881737][ T6339] ? memcpy+0x56/0x70 [ 1075.885795][ T6339] dump_stack+0x15/0x17 [ 1075.890067][ T6339] should_fail+0x3c6/0x510 [ 1075.894836][ T6339] ? netlink_trim+0x19b/0x230 [ 1075.899699][ T6339] __should_failslab+0xa4/0xe0 [ 1075.904688][ T6339] should_failslab+0x9/0x20 [ 1075.909526][ T6339] __kmalloc_track_caller+0x5f/0x320 [ 1075.915042][ T6339] ? netlink_trim+0x19b/0x230 [ 1075.920002][ T6339] pskb_expand_head+0x12b/0x1180 [ 1075.925144][ T6339] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 1075.931539][ T6339] netlink_trim+0x19b/0x230 [ 1075.935927][ T6339] netlink_broadcast_filtered+0x66/0x1270 [ 1075.941853][ T6339] ? __kmalloc_track_caller+0x184/0x320 [ 1075.947565][ T6339] ? __kasan_check_write+0x14/0x20 [ 1075.952733][ T6339] ? rtmsg_ifinfo_build_skb+0xd4/0x180 [ 1075.959276][ T6339] nlmsg_notify+0x101/0x1c0 [ 1075.963852][ T6339] rtnetlink_event+0x15a/0x1b0 [ 1075.968538][ T6339] raw_notifier_call_chain+0x8c/0xf0 [ 1075.974910][ T6339] dev_change_tx_queue_len+0x1d9/0x350 [ 1075.980717][ T6339] ? dev_set_mtu+0x180/0x180 [ 1075.985339][ T6339] dev_ifsioc+0x60b/0xae0 [ 1075.991697][ T6339] ? dev_ioctl+0xb40/0xb40 [ 1075.996300][ T6339] ? dev_get_by_name_rcu+0xc5/0xf0 [ 1076.001935][ T6339] dev_ioctl+0x526/0xb40 [ 1076.006421][ T6339] sock_do_ioctl+0x295/0x3a0 [ 1076.010880][ T6339] ? sock_show_fdinfo+0xa0/0xa0 [ 1076.015853][ T6339] ? kernel_write+0x3d0/0x3d0 [ 1076.020455][ T6339] ? selinux_file_ioctl+0x3cc/0x540 [ 1076.025750][ T6339] sock_ioctl+0x4a6/0x760 [ 1076.029997][ T6339] ? sock_poll+0x340/0x340 [ 1076.035149][ T6339] ? security_file_ioctl+0x84/0xb0 [ 1076.040315][ T6339] ? sock_poll+0x340/0x340 [ 1076.045121][ T6339] __se_sys_ioctl+0x114/0x190 [ 1076.050145][ T6339] __x64_sys_ioctl+0x7b/0x90 [ 1076.054643][ T6339] do_syscall_64+0x34/0x70 [ 1076.058999][ T6339] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1076.065396][ T6339] RIP: 0033:0x7f91204b49f9 [ 1076.069718][ T6339] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1076.090065][ T6339] RSP: 002b:00007f911f134048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1076.098496][ T6339] RAX: ffffffffffffffda RBX: 00007f9120642f80 RCX: 00007f91204b49f9 [ 1076.106308][ T6339] RDX: 0000000020002280 RSI: 0000000000008943 RDI: 0000000000000005 [ 1076.114613][ T6339] RBP: 00007f911f1340a0 R08: 0000000000000000 R09: 0000000000000000 [ 1076.122875][ T6339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1076.130743][ T6339] R13: 000000000000000b R14: 00007f9120642f80 R15: 00007ffcdf7ebe28 [ 1076.520104][ T6347] device syzkaller0 entered promiscuous mode [ 1076.728202][ T6365] bridge_slave_0: mtu greater than device maximum [ 1077.025546][ T6388] ------------[ cut here ]------------ [ 1077.032635][ T6388] kernel BUG at kernel/bpf/arraymap.c:990! [ 1077.039025][ T6388] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1077.045290][ T6388] CPU: 0 PID: 6388 Comm: syz.4.12472 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 1077.057845][ T6388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1077.069251][ T6388] RIP: 0010:prog_array_map_poke_run+0x696/0x6b0 [ 1077.077244][ T6388] Code: 93 e8 ff 48 83 c4 70 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 ed 92 e8 ff 0f 0b e9 de f9 ff ff e8 e1 92 e8 ff 0f 0b e8 da 92 e8 ff <0f> 0b e8 d3 92 e8 ff 0f 0b e8 cc 92 e8 ff 0f 0b 66 2e 0f 1f 84 00 [ 1077.098262][ T6388] RSP: 0018:ffffc90000d17790 EFLAGS: 00010293 [ 1077.104209][ T6388] RAX: ffffffff81821626 RBX: ffff8881229c1690 RCX: ffff88810cd562c0 [ 1077.112375][ T6388] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 1077.121017][ T6388] RBP: ffffc90000d17828 R08: ffffffff818213b1 R09: fffffbfff0cdd669 [ 1077.129215][ T6388] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881129e8100 [ 1077.137596][ T6388] R13: dffffc0000000000 R14: ffff88811622ac00 R15: 00000000fffffff0 [ 1077.146377][ T6388] FS: 00007fe8c05046c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 1077.157296][ T6388] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1077.164199][ T6388] CR2: 0000000100000000 CR3: 000000012d203000 CR4: 00000000003506b0 [ 1077.172520][ T6388] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1077.180600][ T6388] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1077.188973][ T6388] Call Trace: [ 1077.192505][ T6388] ? __die_body+0x62/0xb0 [ 1077.196975][ T6388] ? die+0x88/0xb0 [ 1077.200690][ T6388] ? do_trap+0x1a4/0x310 [ 1077.205108][ T6388] ? prog_array_map_poke_run+0x696/0x6b0 [ 1077.211666][ T6388] ? handle_invalid_op+0x95/0xc0 [ 1077.216536][ T6388] ? prog_array_map_poke_run+0x696/0x6b0 [ 1077.222414][ T6388] ? exc_invalid_op+0x32/0x50 [ 1077.227190][ T6388] ? asm_exc_invalid_op+0x12/0x20 [ 1077.232393][ T6388] ? prog_array_map_poke_run+0x421/0x6b0 [ 1077.237866][ T6388] ? prog_array_map_poke_run+0x696/0x6b0 [ 1077.243748][ T6388] ? prog_array_map_poke_run+0x696/0x6b0 [ 1077.249361][ T6388] ? bpf_prog_bf0f031b30feb8f6+0xb/0x9b8 [ 1077.255291][ T6388] fd_array_map_delete_elem+0x154/0x250 [ 1077.261016][ T6388] __se_sys_bpf+0x6ef6/0x11cb0 [ 1077.265752][ T6388] ? try_invoke_on_locked_down_task+0x280/0x280 [ 1077.272442][ T6388] ? get_futex_key+0x8b7/0xe70 [ 1077.277325][ T6388] ? __kasan_check_write+0x14/0x20 [ 1077.282834][ T6388] ? __x64_sys_bpf+0x90/0x90 [ 1077.287564][ T6388] ? futex_wake+0x630/0x790 [ 1077.292353][ T6388] ? futex_wait+0x7c0/0x7c0 [ 1077.296774][ T6388] ? bpf_trace_printk+0xcca/0xd50 [ 1077.301824][ T6388] ? do_futex+0x13c5/0x17b0 [ 1077.306842][ T6388] ? update_load_avg+0x541/0x1690 [ 1077.312142][ T6388] ? __kasan_check_write+0x14/0x20 [ 1077.317772][ T6388] ? __switch_to+0x5f6/0x1240 [ 1077.322369][ T6388] ? futex_exit_release+0x1e0/0x1e0 [ 1077.328039][ T6388] ? __perf_event_task_sched_in+0x219/0x2a0 [ 1077.334054][ T6388] ? __se_sys_futex+0x355/0x470 [ 1077.338793][ T6388] ? fpu__clear_all+0x20/0x20 [ 1077.343381][ T6388] ? __kasan_check_read+0x11/0x20 [ 1077.349044][ T6388] __x64_sys_bpf+0x7b/0x90 [ 1077.353961][ T6388] do_syscall_64+0x34/0x70 [ 1077.358500][ T6388] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1077.364722][ T6388] RIP: 0033:0x7fe8c18a59f9 [ 1077.369497][ T6388] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1077.391518][ T6388] RSP: 002b:00007fe8c0504048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1077.400372][ T6388] RAX: ffffffffffffffda RBX: 00007fe8c1a34058 RCX: 00007fe8c18a59f9 [ 1077.408474][ T6388] RDX: 0000000000000020 RSI: 00000000200007c0 RDI: 0000000000000003 [ 1077.416343][ T6388] RBP: 00007fe8c19138ee R08: 0000000000000000 R09: 0000000000000000 [ 1077.424148][ T6388] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1077.432053][ T6388] R13: 000000000000000b R14: 00007fe8c1a34058 R15: 00007fff07f0af78 [ 1077.439960][ T6388] Modules linked in: [ 1077.471140][ T6384] FAULT_INJECTION: forcing a failure. [ 1077.471140][ T6384] name failslab, interval 1, probability 0, space 0, times 0 [ 1077.476390][ T6388] ---[ end trace 14e613872fb77af4 ]--- [ 1077.486601][ T6384] CPU: 0 PID: 6384 Comm: syz.2.12471 Tainted: G D W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 1077.501986][ T6384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1077.512678][ T6384] Call Trace: [ 1077.515894][ T6384] dump_stack_lvl+0x1e2/0x24b [ 1077.520399][ T6384] ? panic+0x812/0x812 [ 1077.524484][ T6384] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1077.530157][ T6384] ? __wake_up+0x120/0x1c0 [ 1077.534390][ T6384] ? remove_wait_queue+0x140/0x140 [ 1077.539702][ T6384] ? kfree_skbmem+0x104/0x170 [ 1077.544242][ T6384] dump_stack+0x15/0x17 [ 1077.549010][ T6384] should_fail+0x3c6/0x510 [ 1077.551931][ T6388] RIP: 0010:prog_array_map_poke_run+0x696/0x6b0 [ 1077.553242][ T6384] ? tun_device_event+0x172/0xf80 [ 1077.564286][ T6384] __should_failslab+0xa4/0xe0 [ 1077.569953][ T6384] should_failslab+0x9/0x20 [ 1077.574799][ T6384] __kmalloc+0x60/0x330 [ 1077.579445][ T6384] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 1077.585319][ T6384] tun_device_event+0x172/0xf80 [ 1077.586556][ T6388] Code: 93 e8 ff 48 83 c4 70 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 ed 92 e8 ff 0f 0b e9 de f9 ff ff e8 e1 92 e8 ff 0f 0b e8 da 92 e8 ff <0f> 0b e8 d3 92 e8 ff 0f 0b e8 cc 92 e8 ff 0f 0b 66 2e 0f 1f 84 00 [ 1077.589982][ T6384] ? __kasan_check_read+0x11/0x20 [ 1077.616173][ T6384] ? macsec_notify+0x101/0x4c0 [ 1077.620954][ T6384] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 1077.627474][ T6384] ? macsec_common_dellink+0x4d0/0x4d0 [ 1077.632758][ T6384] ? xsk_notifier+0x382/0x3b0 [ 1077.637363][ T6384] ? sel_netif_netdev_notifier_handler+0x18e/0x2c0 [ 1077.643778][ T6384] raw_notifier_call_chain+0x8c/0xf0 [ 1077.649219][ T6384] dev_change_tx_queue_len+0x1d9/0x350 [ 1077.650439][ T6388] RSP: 0018:ffffc90000d17790 EFLAGS: 00010293 [ 1077.655377][ T6384] ? dev_set_mtu+0x180/0x180 [ 1077.655395][ T6384] dev_ifsioc+0x60b/0xae0 [ 1077.655405][ T6384] ? dev_ioctl+0xb40/0xb40 [ 1077.655434][ T6384] ? dev_get_by_name_rcu+0xc5/0xf0 [ 1077.661448][ T6388] [ 1077.666514][ T6384] dev_ioctl+0x526/0xb40 [ 1077.666530][ T6384] sock_do_ioctl+0x295/0x3a0 [ 1077.666542][ T6384] ? sock_show_fdinfo+0xa0/0xa0 [ 1077.666555][ T6384] ? kernel_write+0x3d0/0x3d0 [ 1077.666572][ T6384] ? selinux_file_ioctl+0x3cc/0x540 [ 1077.666584][ T6384] sock_ioctl+0x4a6/0x760 [ 1077.666611][ T6384] ? sock_poll+0x340/0x340 [ 1077.666629][ T6384] ? security_file_ioctl+0x84/0xb0 [ 1077.666638][ T6384] ? sock_poll+0x340/0x340 [ 1077.666650][ T6384] __se_sys_ioctl+0x114/0x190 [ 1077.666661][ T6384] __x64_sys_ioctl+0x7b/0x90 [ 1077.666674][ T6384] do_syscall_64+0x34/0x70 [ 1077.666690][ T6384] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1077.666702][ T6384] RIP: 0033:0x7f91204b49f9 [ 1077.666717][ T6384] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1077.666726][ T6384] RSP: 002b:00007f911f134048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1077.666742][ T6384] RAX: ffffffffffffffda RBX: 00007f9120642f80 RCX: 00007f91204b49f9 [ 1077.666749][ T6384] RDX: 0000000020002280 RSI: 0000000000008943 RDI: 0000000000000005 [ 1077.666757][ T6384] RBP: 00007f911f1340a0 R08: 0000000000000000 R09: 0000000000000000 [ 1077.666765][ T6384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1077.666772][ T6384] R13: 000000000000000b R14: 00007f9120642f80 R15: 00007ffcdf7ebe28 [ 1077.667973][ T6384] syzkaller0: refused to change device tx_queue_len [ 1077.672364][ T6388] RAX: ffffffff81821626 RBX: ffff8881229c1690 RCX: ffff88810cd562c0 [ 1077.845312][ T6388] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 1077.854842][ T6388] RBP: ffffc90000d17828 R08: ffffffff818213b1 R09: fffffbfff0cdd669 [ 1077.863939][ T6388] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881129e8100 [ 1077.872041][ T6388] R13: dffffc0000000000 R14: ffff88811622ac00 R15: 00000000fffffff0 [ 1077.879887][ T6388] FS: 00007fe8c05046c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 1077.890390][ T6388] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1077.897555][ T6388] CR2: 00007fed8de99178 CR3: 000000012d203000 CR4: 00000000003506a0 [ 1077.905902][ T6388] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1077.914129][ T6388] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1077.922568][ T6388] Kernel panic - not syncing: Fatal exception [ 1077.929118][ T6388] Kernel Offset: disabled [ 1077.933451][ T6388] Rebooting in 86400 seconds..