last executing test programs: 26.191626307s ago: executing program 4 (id=6800): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="020000000400000f0100000080489b08", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, 0x0, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r2=>0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x501, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'pim6reg\x00', 0x112}) socketpair(0x1f, 0x800, 0x5c, &(0x7f0000000000)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9b, 0x40000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x7, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000860629c98500000015000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x12, 0x4, 0x8, 0x8002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r6, 0x0, 0x0}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000880)={r5, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0857f9f582f0300000000000000", 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 21.664063075s ago: executing program 4 (id=6800): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="020000000400000f0100000080489b08", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, 0x0, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r2=>0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x501, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'pim6reg\x00', 0x112}) socketpair(0x1f, 0x800, 0x5c, &(0x7f0000000000)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9b, 0x40000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x7, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000860629c98500000015000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x12, 0x4, 0x8, 0x8002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r6, 0x0, 0x0}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000880)={r5, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0857f9f582f0300000000000000", 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 16.768076119s ago: executing program 4 (id=6800): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="020000000400000f0100000080489b08", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, 0x0, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r2=>0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x501, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'pim6reg\x00', 0x112}) socketpair(0x1f, 0x800, 0x5c, &(0x7f0000000000)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9b, 0x40000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x7, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000860629c98500000015000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x12, 0x4, 0x8, 0x8002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r6, 0x0, 0x0}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000880)={r5, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0857f9f582f0300000000000000", 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 9.447904049s ago: executing program 4 (id=6800): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="020000000400000f0100000080489b08", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, 0x0, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r2=>0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x501, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'pim6reg\x00', 0x112}) socketpair(0x1f, 0x800, 0x5c, &(0x7f0000000000)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9b, 0x40000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x7, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000860629c98500000015000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x12, 0x4, 0x8, 0x8002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r6, 0x0, 0x0}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000880)={r5, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0857f9f582f0300000000000000", 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 4.872710447s ago: executing program 4 (id=6800): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="020000000400000f0100000080489b08", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, 0x0, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r2=>0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x501, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'pim6reg\x00', 0x112}) socketpair(0x1f, 0x800, 0x5c, &(0x7f0000000000)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9b, 0x40000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x7, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000860629c98500000015000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x12, 0x4, 0x8, 0x8002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r6, 0x0, 0x0}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000880)={r5, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0857f9f582f0300000000000000", 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.770189718s ago: executing program 0 (id=7242): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x1, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000020007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000dc0)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000500d5547fc6c7"], &(0x7f0000000340)='syzkaller\x00', 0x9, 0x25, &(0x7f00000009c0)=""/37, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000b00)={0x2, 0xa, 0x0, 0xb}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000d00)=[0xffffffffffffffff], &(0x7f0000000d40)=[{0x3, 0x3, 0xc}, {0x1, 0x1, 0x3, 0xc}, {0x4, 0x2, 0xc, 0xe}, {0x3, 0x1, 0xc, 0x8}, {0x2, 0x1, 0x2, 0x1}], 0x10, 0x2, @void, @value}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40001) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_ext={0x1c, 0x19, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000001000000e37339000000000200000018360000050000000000000000000000cf960400ffffffff18", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000008200000003d40004000000001834000004000000000000000000000018150000", @ANYRES32, @ANYBLOB="000000000000000018290000", @ANYRES32=r1, @ANYBLOB="00000000ff7f00009784ffff0000000018170000", @ANYRES32=r0, @ANYBLOB="00000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x5, 0x65, &(0x7f00000004c0)=""/101, 0x41000, 0x40, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0x4, 0x9, 0x4}, 0x10, 0xab92, r2, 0x4, 0x0, &(0x7f0000000580)=[{0x4, 0x4, 0xa}, {0x0, 0x1, 0xf, 0x4}, {0x5, 0x5, 0x6, 0x7}, {0x1, 0x3, 0x6, 0x6}], 0x10, 0xff, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x90) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) socketpair(0xa, 0x6, 0xb576, &(0x7f0000000280)) syz_clone(0x6988b500, 0x0, 0x0, 0x0, 0x0, 0x0) 2.767970759s ago: executing program 3 (id=7245): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000711229000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(0x3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r0, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={<r1=>0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x23, 0x0, 0xf000) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x5134, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffff, 0x80000001}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, r3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x16, 0x16, &(0x7f0000000480)=ANY=[@ANYRES8=r1], &(0x7f0000000100)='GPL\x00', 0x20000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector=0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r5, 0x0, 0x0, 0x0, 0x10, 0x5, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0x200000000000009b, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x20, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000090000000000000009000000181b0000", @ANYRES32=r4, @ANYBLOB="d8db2a2e0000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007b8af8ff00000000b7080000010000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000018120000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000009500000000000000"], &(0x7f0000000380)='GPL\x00', 0x9ed3, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x1, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000600)=[r4, r4], &(0x7f0000000640)=[{0x2, 0x4, 0xb, 0xb}, {0x5, 0x3, 0xf, 0x5}, {0x5, 0x2, 0x3}, {0x9, 0x3, 0xc}, {0x0, 0x1, 0xc, 0x4}, {0x1, 0x5, 0x3, 0xc}, {0x3, 0x1, 0x10, 0xc}, {0x4, 0x3, 0x2}], 0x10, 0x7, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x40000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x481, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x14, 0x4, 0x4, 0x10002, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) r6 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0600000004000000060000000006000000000000", @ANYRES32, @ANYBLOB="0000000100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x400, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000440), 0x200df000, r6, 0x0, 0xf2}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) 2.483761262s ago: executing program 3 (id=7249): write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0)=0x9, 0x12) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x6, 0x22a2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x8264, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x2018, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000100000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000008500000005000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000200)='mm_page_alloc\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\b\x00'/28], 0x31) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7050000080000a8c5000000a5000000180100002020640500000000000400007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70400000000000085000000a700000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xb) write$cgroup_int(r0, &(0x7f0000000280)=0x3, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0x0, 0xfffffffffffffdf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.402144144s ago: executing program 0 (id=7250): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x900) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='timer_start\x00', r1}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.401908334s ago: executing program 1 (id=7251): bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x2, 0x8a, 0xe7c9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x9, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x4, 0x7, 0xc, 0x5, 0x0, 0x6, 0x500, 0xc, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_config_ext={0x6, 0x6}, 0x1000, 0x6e0, 0x3, 0x3, 0x6ba, 0x95, 0x7, 0x0, 0x9, 0x0, 0xb83}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x51, 0xd, 0x49, 0xbd, 0x0, 0x7fffffffffffffff, 0x1, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7fb, 0x3}, 0x58, 0x3, 0xb5, 0xb, 0x1ff, 0x0, 0x5d, 0x0, 0x4, 0x0, 0xfffffffffffff201}, r0, 0xffffffffffffffff, r1, 0x4) 2.229749737s ago: executing program 1 (id=7252): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000020d0039000000000000b4a51811"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (fail_nth: 58) 2.179172347s ago: executing program 1 (id=7253): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000230000000200000022bf000001"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000b00000005"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000480)={{r1}, &(0x7f0000000380), &(0x7f0000000440)}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x4, r0}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000180)='ib_mad_recv_done_handler\x00', r2, 0x0, 0x3}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020852000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000040)={'erspan0\x00', 0x400}) 2.081574409s ago: executing program 3 (id=7254): bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@generic={0x0, 0x0, 0x10}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="160000000000000004"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000015c0)={0xffffffffffffffff, 0xe0, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x1a, &(0x7f0000000780)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x70, 0x10, &(0x7f0000001400), &(0x7f0000001440), 0x8, 0xa, 0x8, 0x8, &(0x7f0000001480)}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) close(0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a0005"], &(0x7f0000000000)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x300, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007f"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeff, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xa7, &(0x7f0000000540)=[{}], 0x8, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x42, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r4}, 0x10) 2.00456464s ago: executing program 1 (id=7255): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) bpf$MAP_LOOKUP_ELEM(0x2, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800e000000000000000000000000000000080"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000000, @void, @value}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r3, &(0x7f0000000980), 0x20000992) 1.908256841s ago: executing program 3 (id=7256): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x900) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='timer_start\x00', r1}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.493826888s ago: executing program 0 (id=7259): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x6, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, 0x0, &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, 0x0, &(0x7f00000001c0)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r2=>0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000080)) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004040000060000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r3}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$ITER_CREATE(0x21, &(0x7f00000002c0), 0x8) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0xc, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='fdb_delete\x00', r6}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, <r7=>0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[], 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1e000000000000007f000000ffffffff00000100", @ANYRES32=r4, @ANYBLOB=':\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0400000003000004000000000f00"/24, @ANYRES32, @ANYBLOB="65507754dcb1c40fa09a48d892fb370f92d9b351765fa45ec6976f6d3c60b88f0eaf9c6e902abbe0afdb864831cfbbd3b6d9554b766aa75774ae54e700a1c735857cd56aec5b4188d4510c8386552b37314b793d77c8f5dd8dee7441840f7c144b87e698efda11f374000000000000be59588ddb3fc28afa807383e82571d4563516"], 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 1.277222501s ago: executing program 2 (id=7260): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (fail_nth: 58) 1.276794921s ago: executing program 0 (id=7261): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x1, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000020007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000dc0)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000500d5547fc6c7"], &(0x7f0000000340)='syzkaller\x00', 0x9, 0x25, &(0x7f00000009c0)=""/37, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000b00)={0x2, 0xa, 0x0, 0xb}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000d00)=[0xffffffffffffffff], &(0x7f0000000d40)=[{0x3, 0x3, 0xc}, {0x1, 0x1, 0x3, 0xc}, {0x4, 0x2, 0xc, 0xe}, {0x3, 0x1, 0xc, 0x8}, {0x2, 0x1, 0x2, 0x1}], 0x10, 0x2, @void, @value}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40001) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_ext={0x1c, 0x19, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000001000000e37339000000000200000018360000050000000000000000000000cf960400ffffffff18", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000008200000003d40004000000001834000004000000000000000000000018150000", @ANYRES32, @ANYBLOB="000000000000000018290000", @ANYRES32=r1, @ANYBLOB="00000000ff7f00009784ffff0000000018170000", @ANYRES32=r0, @ANYBLOB="00000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x5, 0x65, &(0x7f00000004c0)=""/101, 0x41000, 0x40, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0x4, 0x9, 0x4}, 0x10, 0xab92, r2, 0x4, 0x0, &(0x7f0000000580)=[{0x4, 0x4, 0xa}, {0x0, 0x1, 0xf, 0x4}, {0x5, 0x5, 0x6, 0x7}, {0x1, 0x3, 0x6, 0x6}], 0x10, 0xff, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x90) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) socketpair(0xa, 0x6, 0xb576, &(0x7f0000000280)) syz_clone(0x6988b500, 0x0, 0x0, 0x0, 0x0, 0x0) 1.274477741s ago: executing program 3 (id=7262): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$MAP_CREATE(0x1400000000000000, &(0x7f0000000000)=@base={0xf, 0x4, 0x4, 0x10004, 0x86, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100480, 0x9, 0x0, 0x0, 0x0, 0x40000009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYRES32], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{}, &(0x7f00000000c0), &(0x7f00000002c0)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001540)={{}, &(0x7f00000014c0), &(0x7f0000001500)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 1.167315273s ago: executing program 2 (id=7263): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) perf_event_open(&(0x7f0000000400)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0xd00, 0x0, 0x440, 0xf6ffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1.101339433s ago: executing program 1 (id=7264): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)={0x1b, 0x0, 0x0, 0x1000000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (fail_nth: 51) 1.083092034s ago: executing program 3 (id=7265): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000ee0000000a0000000000000a02000000090000000000000900000000003000"], &(0x7f0000000b80)=""/4096, 0x33, 0x1000, 0x1, 0x7, 0x10000, @value}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, <r0=>0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000340)=[0x0], &(0x7f00000004c0)=[0x0], 0x0, 0x51, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000580), &(0x7f0000000680), 0x8, 0xf9, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x5, 0x7, 0x800, 0x7802, 0xffffffffffffffff, 0xb, '\x00', r0, 0xffffffffffffffff, 0x5, 0x0, 0x3, 0xd, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r1}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000604000000002e"], 0x0, 0x37, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000b40)='ns/net\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff}) close(r5) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [<r6=>0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce81"], 0xfdef) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.036453684s ago: executing program 2 (id=7266): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.kill\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='memory.low\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) openat$cgroup_netprio_ifpriomap(r1, 0x0, 0x2, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x13, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffd0c, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x64) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000008040000cd00000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRESOCT=r2, @ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = syz_clone(0x80200000, &(0x7f0000000780)="2649804b28fc370388a55107e6b009e3af2f05c94a1d1cf1b792d0b31989b968e8e578caaf3f7081f48fa940e3685a72347f82c4cca3be3d5eaa2c64b2e64e015da1d19e5662c759b611887fac85636b46334540b101d5372bf023bd6df2c645fb6ccbe2d8f6dd717d084bd6b7b2e43de5f37babaad6547618fc8aaaefc65cf43ddf", 0x82, &(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000680)="c06076fc054dbd7c2b096d7cefdc44ffa129ac5c64037478348103a740e631e8c6251b540d2c00bf8070bf4c3b1ca16c2132a06f21b21cb3764912d9ed8dbed2981b5b1d43be8076270276ea86c2e659f239e7") perf_event_open$cgroup(&(0x7f0000000840)={0x0, 0x80, 0x3, 0x9, 0x8, 0x0, 0x0, 0xffffffff, 0x0, 0xe, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x4, @perf_config_ext={0x3, 0x4}, 0x18008, 0x5, 0xffffffff, 0x4, 0x9, 0x4, 0x5, 0x0, 0x2, 0x0, 0x4}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f00000008c0)={0x7, 0x80, 0x8, 0x1, 0x83, 0x9, 0x0, 0x8000000000000001, 0x84, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0x1800, 0x4, 0xea, 0x7, 0x5, 0xc48, 0x1, 0x0, 0x8, 0x0, 0x7}, r4, 0xa, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000004c0)='sched_switch\x00', r5, 0x0, 0x5a}, 0x18) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x110000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63be}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x11, 0xa, 0x9, &(0x7f00000001c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r6=>0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000580)=ANY=[@ANYBLOB="180000008000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000c44185000000040000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200000a000000b703000000000000850000007500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 939.903716ms ago: executing program 0 (id=7267): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socketpair(0x1a, 0xa, 0x0, &(0x7f00000012c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'ipvlan1\x00', 0x600}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a0000000400000004000000120000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1}, 0x18) bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xd, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 919.060436ms ago: executing program 1 (id=7268): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x200a00, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xa03cd864fd000cb8, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3d42ab087899915b, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @value}, 0x94) 730.429589ms ago: executing program 2 (id=7269): close(0xffffffffffffffff) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0x3) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014fa0000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) 700.24922ms ago: executing program 0 (id=7270): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a90f16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private=0x803e0000, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r2, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) 514.286472ms ago: executing program 2 (id=7271): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffc0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0, r0, 0x0, 0x2}, 0x18) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x2, 0x4, 0x6, 0xbaa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)=""/251, &(0x7f0000000940), &(0x7f0000000200), 0xa7c, r1, 0x0, 0x300}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a0000000400"], 0x48) 238.346237ms ago: executing program 2 (id=7272): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8008a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x8, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0, <r1=>0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$TOKEN_CREATE(0x24, &(0x7f0000000280)={0x0, r1}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x7, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000006000000852000000500000085000000bd00000018550000020000000000000000000000950000000000000052ab021f4e8dec8a7c9ba1f96aae999328783eee508a2a8e0705585ac8a4c6ec3f6856b4475c7f2bd050f0a78d77abeafc020b3da76a60ae150441571a277ce8f704d954a144750a76e88fb12cd19e4eea7457f4e23baf3be6a3963819b8aa18a61a3515678b72de31"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sys_enter\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xb, 0x6, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000440)=@framed={{}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000003c0)={'gre0\x00', 0x4000}) close(r5) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) ioctl$SIOCSIFHWADDR(r5, 0x8922, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@ifindex, r3, 0x1, 0x0, 0x0, @void, @value=r4}, 0x20) 0s ago: executing program 4 (id=6800): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="020000000400000f0100000080489b08", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, 0x0, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r2=>0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x501, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'pim6reg\x00', 0x112}) socketpair(0x1f, 0x800, 0x5c, &(0x7f0000000000)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9b, 0x40000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x7, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000860629c98500000015000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x12, 0x4, 0x8, 0x8002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r6, 0x0, 0x0}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000880)={r5, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0857f9f582f0300000000000000", 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) kernel console output (not intermixed with test programs): e pim6reg1 entered promiscuous mode [ 649.106312][T18833] FAULT_INJECTION: forcing a failure. [ 649.106312][T18833] name failslab, interval 1, probability 0, space 0, times 0 [ 649.176106][T18833] CPU: 0 PID: 18833 Comm: syz.3.6343 Not tainted 6.1.128-syzkaller-00029-g5145d157731f #0 [ 649.185860][T18833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 649.195756][T18833] Call Trace: [ 649.198876][T18833] <TASK> [ 649.201654][T18833] dump_stack_lvl+0x151/0x1b7 [ 649.206171][T18833] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 649.211465][T18833] dump_stack+0x15/0x18 [ 649.215456][T18833] should_fail_ex+0x3d0/0x520 [ 649.219980][T18833] __should_failslab+0xaf/0xf0 [ 649.224571][T18833] ? ____ip_mc_inc_group+0x215/0x8d0 [ 649.229689][T18833] should_failslab+0x9/0x20 [ 649.234029][T18833] __kmem_cache_alloc_node+0x3d/0x2a0 [ 649.239242][T18833] ? ____ip_mc_inc_group+0x215/0x8d0 [ 649.244365][T18833] kmalloc_trace+0x2a/0xa0 [ 649.248614][T18833] ____ip_mc_inc_group+0x215/0x8d0 [ 649.253565][T18833] ? __ip_mc_inc_group+0x30/0x30 [ 649.258337][T18833] ? __kasan_check_read+0x11/0x20 [ 649.263194][T18833] ip_mc_up+0x10f/0x1e0 [ 649.267192][T18833] inetdev_event+0xc80/0x1110 [ 649.271700][T18833] ? devinet_exit_net+0x230/0x230 [ 649.276560][T18833] ? arp_netdev_event+0xd4/0x2a0 [ 649.281332][T18833] raw_notifier_call_chain+0x8c/0xf0 [ 649.286454][T18833] __dev_notify_flags+0x304/0x610 [ 649.291313][T18833] ? __dev_change_flags+0x6e0/0x6e0 [ 649.296355][T18833] ? __dev_change_flags+0x569/0x6e0 [ 649.301380][T18833] ? dev_get_flags+0x1e0/0x1e0 [ 649.305982][T18833] ? kstrtouint+0xf6/0x180 [ 649.310269][T18833] dev_change_flags+0xf0/0x1a0 [ 649.314834][T18833] dev_ifsioc+0x177/0x1150 [ 649.319108][T18833] ? dev_ioctl+0xe60/0xe60 [ 649.323356][T18833] ? __kasan_check_write+0x14/0x20 [ 649.328288][T18833] ? mutex_lock+0xb1/0x1e0 [ 649.332540][T18833] ? bit_wait_io_timeout+0x120/0x120 [ 649.337663][T18833] dev_ioctl+0x543/0xe60 [ 649.341741][T18833] sock_do_ioctl+0x26b/0x450 [ 649.346171][T18833] ? has_cap_mac_admin+0x3c0/0x3c0 [ 649.351125][T18833] ? sock_show_fdinfo+0xa0/0xa0 [ 649.355807][T18833] ? selinux_file_ioctl+0x3cc/0x540 [ 649.360837][T18833] sock_ioctl+0x455/0x740 [ 649.364999][T18833] ? sock_poll+0x400/0x400 [ 649.369269][T18833] ? __fget_files+0x2cb/0x330 [ 649.373770][T18833] ? security_file_ioctl+0x84/0xb0 [ 649.378711][T18833] ? sock_poll+0x400/0x400 [ 649.382963][T18833] __se_sys_ioctl+0x114/0x190 [ 649.387480][T18833] __x64_sys_ioctl+0x7b/0x90 [ 649.391907][T18833] x64_sys_call+0x98/0x9a0 [ 649.396158][T18833] do_syscall_64+0x3b/0xb0 [ 649.400409][T18833] ? clear_bhb_loop+0x55/0xb0 [ 649.404921][T18833] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 649.410657][T18833] RIP: 0033:0x7f0ef338d169 [ 649.414902][T18833] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 649.434345][T18833] RSP: 002b:00007f0ef41c6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 649.442690][T18833] RAX: ffffffffffffffda RBX: 00007f0ef35a5fa0 RCX: 00007f0ef338d169 [ 649.450502][T18833] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 000000000000000a [ 649.458314][T18833] RBP: 00007f0ef41c6090 R08: 0000000000000000 R09: 0000000000000000 [ 649.466121][T18833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 649.473933][T18833] R13: 0000000000000000 R14: 00007f0ef35a5fa0 R15: 00007ffd7614dd68 [ 649.481746][T18833] </TASK> [ 655.439246][T18983] device bridge0 entered promiscuous mode [ 658.283807][T19086] FAULT_INJECTION: forcing a failure. [ 658.283807][T19086] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 658.355331][T19086] CPU: 0 PID: 19086 Comm: syz.0.6425 Not tainted 6.1.128-syzkaller-00029-g5145d157731f #0 [ 658.365059][T19086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 658.374953][T19086] Call Trace: [ 658.378075][T19086] <TASK> [ 658.380853][T19086] dump_stack_lvl+0x151/0x1b7 [ 658.385452][T19086] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 658.390747][T19086] ? x2apic_send_IPI_self+0x5f/0x70 [ 658.395783][T19086] ? arch_irq_work_raise+0xc7/0xd0 [ 658.400739][T19086] dump_stack+0x15/0x18 [ 658.404720][T19086] should_fail_ex+0x3d0/0x520 [ 658.409235][T19086] should_fail_alloc_page+0x68/0x90 [ 658.414279][T19086] prepare_alloc_pages+0x13b/0x6d0 [ 658.419217][T19086] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 658.424254][T19086] __alloc_pages+0x162/0x610 [ 658.428676][T19086] ? prep_new_page+0x110/0x110 [ 658.433276][T19086] ? __schedule+0xcbd/0x1560 [ 658.437709][T19086] pte_alloc_one+0x73/0x1b0 [ 658.442043][T19086] ? pfn_modify_allowed+0x2f0/0x2f0 [ 658.447079][T19086] ? preempt_schedule+0xd9/0xe0 [ 658.451782][T19086] ? preempt_schedule_common+0xbe/0xf0 [ 658.457057][T19086] __pte_alloc+0x86/0x350 [ 658.461227][T19086] ? pmd_install+0x260/0x260 [ 658.465775][T19086] ? _raw_spin_lock+0xa4/0x1b0 [ 658.470374][T19086] ? __kasan_check_write+0x14/0x20 [ 658.475331][T19086] copy_page_range+0x2748/0x2ed0 [ 658.480105][T19086] ? pfn_valid+0x1e0/0x1e0 [ 658.484342][T19086] ? mas_wr_store_entry+0x492/0x730 [ 658.489380][T19086] ? mas_store+0x258/0x400 [ 658.493633][T19086] ? mas_empty_area_rev+0x17f0/0x17f0 [ 658.498842][T19086] copy_mm+0x10ee/0x1bc0 [ 658.502922][T19086] ? copy_signal+0x650/0x650 [ 658.507342][T19086] ? _raw_spin_lock+0xa4/0x1b0 [ 658.511946][T19086] ? __init_rwsem+0x130/0x240 [ 658.516459][T19086] ? copy_signal+0x503/0x650 [ 658.520887][T19086] copy_process+0x12b6/0x3530 [ 658.525402][T19086] ? __kasan_check_write+0x14/0x20 [ 658.530343][T19086] ? proc_fail_nth_write+0x20b/0x290 [ 658.535466][T19086] ? idle_dummy+0x10/0x10 [ 658.539632][T19086] ? vfs_write+0x952/0xed0 [ 658.543885][T19086] ? __kasan_slab_free+0x11/0x20 [ 658.548661][T19086] kernel_clone+0x229/0x890 [ 658.553002][T19086] ? __kasan_check_write+0x14/0x20 [ 658.557945][T19086] ? mutex_unlock+0xb2/0x260 [ 658.562371][T19086] ? create_io_thread+0x180/0x180 [ 658.567240][T19086] __x64_sys_clone+0x231/0x280 [ 658.571922][T19086] ? __do_sys_vfork+0x110/0x110 [ 658.576616][T19086] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 658.582509][T19086] ? exit_to_user_mode_prepare+0x39/0xa0 [ 658.587976][T19086] x64_sys_call+0x1b0/0x9a0 [ 658.592320][T19086] do_syscall_64+0x3b/0xb0 [ 658.596568][T19086] ? clear_bhb_loop+0x55/0xb0 [ 658.601092][T19086] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 658.606810][T19086] RIP: 0033:0x7fc62d98d169 [ 658.611061][T19086] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 658.630500][T19086] RSP: 002b:00007fc62e849fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 658.638855][T19086] RAX: ffffffffffffffda RBX: 00007fc62dba5fa0 RCX: 00007fc62d98d169 [ 658.646667][T19086] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000042000000 [ 658.654479][T19086] RBP: 00007fc62e84a090 R08: 0000000000000000 R09: 0000000000000000 [ 658.662286][T19086] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 658.670100][T19086] R13: 0000000000000000 R14: 00007fc62dba5fa0 R15: 00007fff58542d78 [ 658.677917][T19086] </TASK> [ 662.056702][T19154] device veth0_vlan left promiscuous mode [ 662.143951][T19154] device veth0_vlan entered promiscuous mode [ 662.276839][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 662.301806][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 662.348410][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 664.762748][T19246] device veth0_vlan left promiscuous mode [ 664.776642][T19246] device veth0_vlan entered promiscuous mode [ 664.826120][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 664.895449][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 664.903779][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 664.957446][T19255] FAULT_INJECTION: forcing a failure. [ 664.957446][T19255] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 664.971672][T19255] CPU: 1 PID: 19255 Comm: syz.1.6478 Not tainted 6.1.128-syzkaller-00029-g5145d157731f #0 [ 664.981399][T19255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 664.991291][T19255] Call Trace: [ 664.994414][T19255] <TASK> [ 664.997189][T19255] dump_stack_lvl+0x151/0x1b7 [ 665.001701][T19255] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 665.007348][T19255] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 665.012643][T19255] ? __wake_up_klogd+0xd5/0x110 [ 665.017328][T19255] dump_stack+0x15/0x18 [ 665.021317][T19255] should_fail_ex+0x3d0/0x520 [ 665.025836][T19255] should_fail+0xb/0x10 [ 665.029823][T19255] should_fail_usercopy+0x1a/0x20 [ 665.034684][T19255] _copy_from_user+0x1e/0xc0 [ 665.039113][T19255] generic_map_update_batch+0x54c/0x8c0 [ 665.044492][T19255] ? generic_map_delete_batch+0x5c0/0x5c0 [ 665.050047][T19255] ? generic_map_delete_batch+0x5c0/0x5c0 [ 665.055599][T19255] bpf_map_do_batch+0x4cc/0x630 [ 665.060292][T19255] __sys_bpf+0x66b/0x7f0 [ 665.064375][T19255] ? bpf_link_show_fdinfo+0x300/0x300 [ 665.069576][T19255] ? bpf_trace_run1+0x240/0x240 [ 665.074261][T19255] __x64_sys_bpf+0x7c/0x90 [ 665.078511][T19255] x64_sys_call+0x87f/0x9a0 [ 665.082847][T19255] do_syscall_64+0x3b/0xb0 [ 665.087102][T19255] ? clear_bhb_loop+0x55/0xb0 [ 665.091617][T19255] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 665.097365][T19255] RIP: 0033:0x7f55f938d169 [ 665.101599][T19255] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 665.121044][T19255] RSP: 002b:00007f55fa1ea038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 665.129284][T19255] RAX: ffffffffffffffda RBX: 00007f55f95a5fa0 RCX: 00007f55f938d169 [ 665.137094][T19255] RDX: 0000000000000038 RSI: 0000200000000900 RDI: 000000000000001a [ 665.144992][T19255] RBP: 00007f55fa1ea090 R08: 0000000000000000 R09: 0000000000000000 [ 665.152805][T19255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 665.160613][T19255] R13: 0000000000000000 R14: 00007f55f95a5fa0 R15: 00007fff16f99738 [ 665.168433][T19255] </TASK> [ 666.502714][T19313] device veth0_vlan left promiscuous mode [ 666.552553][T19313] device veth0_vlan entered promiscuous mode [ 666.613766][T19314] device ip6gretap0 entered promiscuous mode [ 666.647720][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 666.663593][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 666.699980][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 671.042603][T19416] FAULT_INJECTION: forcing a failure. [ 671.042603][T19416] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 671.055554][T19416] CPU: 0 PID: 19416 Comm: syz.0.6531 Not tainted 6.1.128-syzkaller-00029-g5145d157731f #0 [ 671.065183][T19416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 671.075074][T19416] Call Trace: [ 671.078198][T19416] <TASK> [ 671.080978][T19416] dump_stack_lvl+0x151/0x1b7 [ 671.085490][T19416] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 671.090787][T19416] ? vfs_write+0x952/0xed0 [ 671.095038][T19416] ? __kasan_slab_free+0x11/0x20 [ 671.099821][T19416] dump_stack+0x15/0x18 [ 671.103808][T19416] should_fail_ex+0x3d0/0x520 [ 671.108319][T19416] should_fail+0xb/0x10 [ 671.112312][T19416] should_fail_usercopy+0x1a/0x20 [ 671.117168][T19416] _copy_from_user+0x1e/0xc0 [ 671.121598][T19416] __sys_bpf+0x23b/0x7f0 [ 671.125674][T19416] ? bpf_link_show_fdinfo+0x300/0x300 [ 671.130887][T19416] ? __ia32_sys_read+0x90/0x90 [ 671.135491][T19416] ? debug_smp_processor_id+0x17/0x20 [ 671.140691][T19416] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 671.146593][T19416] __x64_sys_bpf+0x7c/0x90 [ 671.150845][T19416] x64_sys_call+0x87f/0x9a0 [ 671.155187][T19416] do_syscall_64+0x3b/0xb0 [ 671.159435][T19416] ? clear_bhb_loop+0x55/0xb0 [ 671.163951][T19416] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 671.169682][T19416] RIP: 0033:0x7fc62d98d169 [ 671.173932][T19416] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 671.193376][T19416] RSP: 002b:00007fc62e84a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 671.201622][T19416] RAX: ffffffffffffffda RBX: 00007fc62dba5fa0 RCX: 00007fc62d98d169 [ 671.209433][T19416] RDX: 0000000000000050 RSI: 0000200000000380 RDI: 0004000000000000 [ 671.217245][T19416] RBP: 00007fc62e84a090 R08: 0000000000000000 R09: 0000000000000000 [ 671.225050][T19416] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 671.232862][T19416] R13: 0000000000000000 R14: 00007fc62dba5fa0 R15: 00007fff58542d78 [ 671.240680][T19416] </TASK> [ 671.416994][T19427] device veth1_macvtap left promiscuous mode [ 671.871033][T19448] FAULT_INJECTION: forcing a failure. [ 671.871033][T19448] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 672.006255][T19448] CPU: 1 PID: 19448 Comm: syz.0.6542 Not tainted 6.1.128-syzkaller-00029-g5145d157731f #0 [ 672.016087][T19448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 672.025982][T19448] Call Trace: [ 672.029121][T19448] <TASK> [ 672.031881][T19448] dump_stack_lvl+0x151/0x1b7 [ 672.036418][T19448] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 672.041697][T19448] dump_stack+0x15/0x18 [ 672.045689][T19448] should_fail_ex+0x3d0/0x520 [ 672.050196][T19448] should_fail_alloc_page+0x68/0x90 [ 672.055230][T19448] prepare_alloc_pages+0x13b/0x6d0 [ 672.060184][T19448] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 672.065207][T19448] ? slab_post_alloc_hook+0x53/0x2c0 [ 672.070331][T19448] ? alloc_vmap_area+0x278/0x1aa0 [ 672.075189][T19448] ? __get_vm_area_node+0x171/0x370 [ 672.080225][T19448] ? __vmalloc_node_range+0x338/0x1560 [ 672.085525][T19448] __alloc_pages+0x162/0x610 [ 672.089951][T19448] ? prep_new_page+0x110/0x110 [ 672.094557][T19448] ? _raw_spin_trylock_bh+0x190/0x190 [ 672.099857][T19448] __get_free_pages+0xe/0x30 [ 672.104281][T19448] kasan_populate_vmalloc_pte+0x39/0x130 [ 672.109743][T19448] ? __apply_to_page_range+0x8ca/0xbe0 [ 672.115056][T19448] __apply_to_page_range+0x8dd/0xbe0 [ 672.120164][T19448] ? kasan_populate_vmalloc+0x70/0x70 [ 672.125371][T19448] ? kasan_populate_vmalloc+0x70/0x70 [ 672.130578][T19448] apply_to_page_range+0x3b/0x50 [ 672.135353][T19448] kasan_populate_vmalloc+0x65/0x70 [ 672.140382][T19448] alloc_vmap_area+0x1961/0x1aa0 [ 672.145167][T19448] ? vm_map_ram+0x940/0x940 [ 672.149500][T19448] ? __kasan_kmalloc+0x9c/0xb0 [ 672.154099][T19448] ? kmalloc_node_trace+0x3d/0xb0 [ 672.158961][T19448] __get_vm_area_node+0x171/0x370 [ 672.163823][T19448] __vmalloc_node_range+0x338/0x1560 [ 672.168940][T19448] ? htab_map_alloc+0x39d/0xf80 [ 672.173638][T19448] ? vmap+0x2b0/0x2b0 [ 672.177443][T19448] ? kasan_save_alloc_info+0x1f/0x30 [ 672.182566][T19448] ? __kasan_kmalloc+0x9c/0xb0 [ 672.187172][T19448] ? __kmalloc_node+0xb4/0x1e0 [ 672.191768][T19448] bpf_map_area_alloc+0xdc/0xf0 [ 672.196452][T19448] ? htab_map_alloc+0x39d/0xf80 [ 672.201146][T19448] htab_map_alloc+0x39d/0xf80 [ 672.205653][T19448] ? htab_map_alloc_check+0x3ce/0x4b0 [ 672.210863][T19448] map_create+0x44a/0xcf0 [ 672.215029][T19448] __sys_bpf+0x2e6/0x7f0 [ 672.219123][T19448] ? bpf_link_show_fdinfo+0x300/0x300 [ 672.224322][T19448] ? __ia32_sys_read+0x90/0x90 [ 672.228917][T19448] ? debug_smp_processor_id+0x17/0x20 [ 672.234125][T19448] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 672.240026][T19448] __x64_sys_bpf+0x7c/0x90 [ 672.244275][T19448] x64_sys_call+0x87f/0x9a0 [ 672.248616][T19448] do_syscall_64+0x3b/0xb0 [ 672.252866][T19448] ? clear_bhb_loop+0x55/0xb0 [ 672.257383][T19448] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 672.263108][T19448] RIP: 0033:0x7fc62d98d169 [ 672.267448][T19448] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 672.286902][T19448] RSP: 002b:00007fc62e84a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 672.295138][T19448] RAX: ffffffffffffffda RBX: 00007fc62dba5fa0 RCX: 00007fc62d98d169 [ 672.302949][T19448] RDX: 0000000000000048 RSI: 0000200000000500 RDI: 0000000000000000 [ 672.310762][T19448] RBP: 00007fc62e84a090 R08: 0000000000000000 R09: 0000000000000000 [ 672.318568][T19448] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 672.326381][T19448] R13: 0000000000000001 R14: 00007fc62dba5fa0 R15: 00007fff58542d78 [ 672.334198][T19448] </TASK> [ 672.651964][T19460] device pim6reg1 entered promiscuous mode [ 674.096908][T19498] device syzkaller0 entered promiscuous mode [ 676.021658][T19568] device pim6reg1 entered promiscuous mode [ 681.286551][T19722] device syzkaller0 entered promiscuous mode [ 683.636907][T19795] bridge0: port 2(bridge_slave_1) entered disabled state [ 683.645607][T19795] bridge0: port 1(bridge_slave_0) entered disabled state [ 683.724863][T19795] device bridge0 left promiscuous mode [ 683.840038][T19795] device bridge_slave_1 left promiscuous mode [ 683.867257][T19795] bridge0: port 2(bridge_slave_1) entered disabled state [ 683.908335][T19795] device bridge_slave_0 left promiscuous mode [ 683.936558][T19795] bridge0: port 1(bridge_slave_0) entered disabled state [ 684.031137][T19805] FAULT_INJECTION: forcing a failure. [ 684.031137][T19805] name failslab, interval 1, probability 0, space 0, times 0 [ 684.043787][T19805] CPU: 0 PID: 19805 Comm: syz.3.6666 Not tainted 6.1.128-syzkaller-00029-g5145d157731f #0 [ 684.053509][T19805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 684.063405][T19805] Call Trace: [ 684.066523][T19805] <TASK> [ 684.069302][T19805] dump_stack_lvl+0x151/0x1b7 [ 684.073811][T19805] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 684.079109][T19805] ? addrconf_ifdown+0x1866/0x1ab0 [ 684.084056][T19805] dump_stack+0x15/0x18 [ 684.088047][T19805] should_fail_ex+0x3d0/0x520 [ 684.092562][T19805] __should_failslab+0xaf/0xf0 [ 684.097157][T19805] should_failslab+0x9/0x20 [ 684.101495][T19805] kmem_cache_alloc_node+0x42/0x330 [ 684.106530][T19805] ? __alloc_skb+0xcc/0x2d0 [ 684.110870][T19805] __alloc_skb+0xcc/0x2d0 [ 684.115040][T19805] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 684.120160][T19805] unregister_netdevice_many+0xeb8/0x1730 [ 684.125714][T19805] ? add_timer+0x68/0x80 [ 684.129792][T19805] ? alloc_netdev_mqs+0xf90/0xf90 [ 684.134652][T19805] ? __queue_delayed_work+0x16d/0x1f0 [ 684.139863][T19805] ? queue_delayed_work_on+0x13f/0x180 [ 684.145153][T19805] ? linkwatch_fire_event+0x1e4/0x240 [ 684.150363][T19805] ? __kasan_check_read+0x11/0x20 [ 684.155222][T19805] unregister_netdevice_queue+0x2e6/0x350 [ 684.160777][T19805] ? list_netdevice+0x710/0x710 [ 684.165463][T19805] ? linkwatch_fire_event+0x211/0x240 [ 684.170673][T19805] __tun_detach+0xd14/0x1510 [ 684.175099][T19805] ? bit_wait_io_timeout+0x120/0x120 [ 684.180221][T19805] tun_chr_close+0x92/0x140 [ 684.184555][T19805] ? tun_chr_open+0x530/0x530 [ 684.189071][T19805] __fput+0x1e5/0x870 [ 684.192894][T19805] ____fput+0x15/0x20 [ 684.196707][T19805] task_work_run+0x24d/0x2e0 [ 684.201134][T19805] ? task_work_cancel+0x2e0/0x2e0 [ 684.205997][T19805] ? filp_close+0x105/0x150 [ 684.210341][T19805] exit_to_user_mode_loop+0x94/0xa0 [ 684.215370][T19805] exit_to_user_mode_prepare+0x5a/0xa0 [ 684.220665][T19805] syscall_exit_to_user_mode+0x26/0x130 [ 684.226044][T19805] do_syscall_64+0x47/0xb0 [ 684.230297][T19805] ? clear_bhb_loop+0x55/0xb0 [ 684.234808][T19805] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 684.240538][T19805] RIP: 0033:0x7f0ef338d169 [ 684.244791][T19805] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 684.264235][T19805] RSP: 002b:00007f0ef41c6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 684.272477][T19805] RAX: 0000000000000000 RBX: 00007f0ef35a5fa0 RCX: 00007f0ef338d169 [ 684.280291][T19805] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 684.288100][T19805] RBP: 00007f0ef41c6090 R08: 0000000000000000 R09: 0000000000000000 [ 684.295911][T19805] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 684.303725][T19805] R13: 0000000000000000 R14: 00007f0ef35a5fa0 R15: 00007ffd7614dd68 [ 684.311540][T19805] </TASK> [ 686.307913][T19879] device wg2 entered promiscuous mode [ 688.123813][T19920] device wg2 entered promiscuous mode [ 688.562361][T19943] device pim6reg1 entered promiscuous mode [ 689.303503][T19959] device sit0 entered promiscuous mode [ 690.117262][T19971] device wg2 entered promiscuous mode [ 690.656167][T19999] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 690.813253][T19999] device syzkaller0 entered promiscuous mode [ 691.076827][T20019] FAULT_INJECTION: forcing a failure. [ 691.076827][T20019] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 691.168371][T20019] CPU: 0 PID: 20019 Comm: syz.2.6735 Not tainted 6.1.128-syzkaller-00029-g5145d157731f #0 [ 691.178114][T20019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 691.188003][T20019] Call Trace: [ 691.191128][T20019] <TASK> [ 691.193903][T20019] dump_stack_lvl+0x151/0x1b7 [ 691.198420][T20019] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 691.203724][T20019] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 691.209365][T20019] dump_stack+0x15/0x18 [ 691.213347][T20019] should_fail_ex+0x3d0/0x520 [ 691.217872][T20019] should_fail_alloc_page+0x68/0x90 [ 691.222899][T20019] prepare_alloc_pages+0x13b/0x6d0 [ 691.227880][T20019] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 691.232875][T20019] ? kasan_check_range+0x7b/0x2a0 [ 691.237744][T20019] __alloc_pages+0x162/0x610 [ 691.242160][T20019] ? prep_new_page+0x110/0x110 [ 691.246768][T20019] ? _raw_spin_trylock_bh+0x190/0x190 [ 691.251966][T20019] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 691.257957][T20019] __get_free_pages+0xe/0x30 [ 691.262381][T20019] kasan_populate_vmalloc_pte+0x39/0x130 [ 691.267845][T20019] ? __apply_to_page_range+0x8ca/0xbe0 [ 691.273146][T20019] __apply_to_page_range+0x8dd/0xbe0 [ 691.278262][T20019] ? kasan_populate_vmalloc+0x70/0x70 [ 691.283474][T20019] ? kasan_populate_vmalloc+0x70/0x70 [ 691.288684][T20019] apply_to_page_range+0x3b/0x50 [ 691.293462][T20019] kasan_populate_vmalloc+0x65/0x70 [ 691.298604][T20019] alloc_vmap_area+0x1961/0x1aa0 [ 691.303372][T20019] ? vm_map_ram+0x940/0x940 [ 691.307707][T20019] ? __kasan_kmalloc+0x9c/0xb0 [ 691.312311][T20019] ? kmalloc_node_trace+0x3d/0xb0 [ 691.317170][T20019] __get_vm_area_node+0x171/0x370 [ 691.322032][T20019] __vmalloc_node_range+0x338/0x1560 [ 691.327160][T20019] ? prealloc_elems_and_freelist+0x99/0x1d0 [ 691.332880][T20019] ? avc_denied+0x1b0/0x1b0 [ 691.337221][T20019] ? prep_new_page+0x110/0x110 [ 691.341820][T20019] ? vmap+0x2b0/0x2b0 [ 691.345647][T20019] ? __kasan_check_write+0x14/0x20 [ 691.350583][T20019] ? mutex_unlock+0xb2/0x260 [ 691.355010][T20019] ? kasan_poison+0x5d/0x70 [ 691.359350][T20019] ? __kasan_kmalloc_large+0xad/0xc0 [ 691.364477][T20019] ? __mutex_lock_slowpath+0x10/0x10 [ 691.369590][T20019] bpf_map_area_alloc+0xdc/0xf0 [ 691.374288][T20019] ? prealloc_elems_and_freelist+0x99/0x1d0 [ 691.380008][T20019] prealloc_elems_and_freelist+0x99/0x1d0 [ 691.385561][T20019] stack_map_alloc+0x39f/0x520 [ 691.390171][T20019] map_create+0x44a/0xcf0 [ 691.395293][T20019] __sys_bpf+0x2e6/0x7f0 [ 691.399365][T20019] ? bpf_link_show_fdinfo+0x300/0x300 [ 691.404578][T20019] ? __ia32_sys_read+0x90/0x90 [ 691.409177][T20019] ? debug_smp_processor_id+0x17/0x20 [ 691.414387][T20019] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 691.420279][T20019] __x64_sys_bpf+0x7c/0x90 [ 691.424555][T20019] x64_sys_call+0x87f/0x9a0 [ 691.428872][T20019] do_syscall_64+0x3b/0xb0 [ 691.433128][T20019] ? clear_bhb_loop+0x55/0xb0 [ 691.437638][T20019] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 691.443376][T20019] RIP: 0033:0x7fb99058d169 [ 691.447616][T20019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 691.467057][T20019] RSP: 002b:00007fb99136d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 691.475302][T20019] RAX: ffffffffffffffda RBX: 00007fb9907a5fa0 RCX: 00007fb99058d169 [ 691.483114][T20019] RDX: 0000000000000048 RSI: 0000200000000900 RDI: 0000000000000000 [ 691.490934][T20019] RBP: 00007fb99136d090 R08: 0000000000000000 R09: 0000000000000000 [ 691.498735][T20019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 691.506634][T20019] R13: 0000000000000000 R14: 00007fb9907a5fa0 R15: 00007ffe60dbc4f8 [ 691.514455][T20019] </TASK> [ 691.624312][T20018] device wg2 entered promiscuous mode [ 692.033704][T20044] ip6_vti0: mtu greater than device maximum [ 694.295409][T20106] device ip6_vti0 entered promiscuous mode [ 696.548171][ T3467] device bridge_slave_1 left promiscuous mode [ 696.564396][ T3467] bridge0: port 2(bridge_slave_1) entered disabled state [ 696.616765][ T3467] device bridge_slave_0 left promiscuous mode [ 696.622747][ T3467] bridge0: port 1(bridge_slave_0) entered disabled state [ 696.800116][T20186] bridge0: port 1(bridge_slave_0) entered blocking state [ 696.818535][T20186] bridge0: port 1(bridge_slave_0) entered disabled state [ 696.866971][T20186] device bridge_slave_0 entered promiscuous mode [ 696.888280][T20186] bridge0: port 2(bridge_slave_1) entered blocking state [ 696.895248][T20186] bridge0: port 2(bridge_slave_1) entered disabled state [ 696.954219][T20186] device bridge_slave_1 entered promiscuous mode [ 697.356883][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 697.374474][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 697.395308][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 697.409401][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 697.424400][ T1593] bridge0: port 1(bridge_slave_0) entered blocking state [ 697.431334][ T1593] bridge0: port 1(bridge_slave_0) entered forwarding state [ 697.443394][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 697.468316][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 697.476952][ T1593] bridge0: port 2(bridge_slave_1) entered blocking state [ 697.483922][ T1593] bridge0: port 2(bridge_slave_1) entered forwarding state [ 697.570829][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 697.625245][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 697.671379][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 697.731946][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 697.781720][T20186] device veth0_vlan entered promiscuous mode [ 697.815888][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 697.836954][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 697.860983][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 697.882895][T20186] device veth1_macvtap entered promiscuous mode [ 697.946181][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 697.984118][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 698.059791][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 698.086474][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 699.720593][T20263] device ip6_vti0 entered promiscuous mode [ 699.733167][T20263] IPv6: ADDRCONF(NETDEV_CHANGE): ip6_vti0: link becomes ready [ 699.795321][T20266] FAULT_INJECTION: forcing a failure. [ 699.795321][T20266] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 699.836717][T20266] CPU: 1 PID: 20266 Comm: syz.0.6823 Not tainted 6.1.128-syzkaller-00029-g5145d157731f #0 [ 699.846452][T20266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 699.856350][T20266] Call Trace: [ 699.859553][T20266] <TASK> [ 699.862333][T20266] dump_stack_lvl+0x151/0x1b7 [ 699.866848][T20266] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 699.872137][T20266] ? migrate_enable+0x1cb/0x2b0 [ 699.876828][T20266] dump_stack+0x15/0x18 [ 699.880922][T20266] should_fail_ex+0x3d0/0x520 [ 699.885445][T20266] should_fail+0xb/0x10 [ 699.889515][T20266] should_fail_usercopy+0x1a/0x20 [ 699.894370][T20266] _copy_to_user+0x1e/0x90 [ 699.898628][T20266] generic_map_lookup_batch+0x6ff/0xcc0 [ 699.904012][T20266] ? bpf_map_update_value+0x410/0x410 [ 699.909219][T20266] ? __fdget+0x1b7/0x240 [ 699.913395][T20266] ? bpf_map_update_value+0x410/0x410 [ 699.918605][T20266] bpf_map_do_batch+0x2e2/0x630 [ 699.923292][T20266] __sys_bpf+0x66b/0x7f0 [ 699.927371][T20266] ? clockevents_program_event+0x22f/0x300 [ 699.933148][T20266] ? bpf_link_show_fdinfo+0x300/0x300 [ 699.938469][T20266] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 699.944458][T20266] __x64_sys_bpf+0x7c/0x90 [ 699.948709][T20266] x64_sys_call+0x87f/0x9a0 [ 699.953057][T20266] do_syscall_64+0x3b/0xb0 [ 699.957298][T20266] ? clear_bhb_loop+0x55/0xb0 [ 699.961826][T20266] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 699.967537][T20266] RIP: 0033:0x7fc62d98d169 [ 699.971794][T20266] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 699.991375][T20266] RSP: 002b:00007fc62e84a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 699.999612][T20266] RAX: ffffffffffffffda RBX: 00007fc62dba5fa0 RCX: 00007fc62d98d169 [ 700.007422][T20266] RDX: 0000000000000038 RSI: 00002000000003c0 RDI: 0000000000000018 [ 700.015230][T20266] RBP: 00007fc62e84a090 R08: 0000000000000000 R09: 0000000000000000 [ 700.023044][T20266] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 700.030856][T20266] R13: 0000000000000000 R14: 00007fc62dba5fa0 R15: 00007fff58542d78 [ 700.038675][T20266] </TASK> [ 700.174125][T20264] bridge0: port 1(bridge_slave_0) entered blocking state [ 700.205957][T20264] bridge0: port 1(bridge_slave_0) entered disabled state [ 700.216260][T20264] device bridge_slave_0 entered promiscuous mode [ 700.235519][T20264] bridge0: port 2(bridge_slave_1) entered blocking state [ 700.314204][T20264] bridge0: port 2(bridge_slave_1) entered disabled state [ 700.365768][T20264] device bridge_slave_1 entered promiscuous mode [ 700.910512][ T3467] device bridge_slave_1 left promiscuous mode [ 700.956769][ T3467] bridge0: port 2(bridge_slave_1) entered disabled state [ 700.967351][ T3467] device bridge_slave_0 left promiscuous mode [ 700.973830][ T3467] bridge0: port 1(bridge_slave_0) entered disabled state [ 700.988308][ T3467] device veth1_macvtap left promiscuous mode [ 700.994970][ T3467] device veth0_vlan left promiscuous mode [ 701.078486][T20300] device sit0 entered promiscuous mode [ 701.257613][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 701.274297][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 701.356156][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 701.366969][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 701.384846][ T3459] bridge0: port 1(bridge_slave_0) entered blocking state [ 701.391767][ T3459] bridge0: port 1(bridge_slave_0) entered forwarding state [ 701.417284][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 701.426706][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 701.434800][ T3459] bridge0: port 2(bridge_slave_1) entered blocking state [ 701.441687][ T3459] bridge0: port 2(bridge_slave_1) entered forwarding state [ 701.456294][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 701.532191][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 701.586871][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 701.672151][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 701.722632][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 701.898961][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 701.926449][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 701.942601][T20264] device veth0_vlan entered promiscuous mode [ 701.985466][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 701.993551][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 702.047273][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 702.055072][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 702.069227][T20264] device veth1_macvtap entered promiscuous mode [ 702.100517][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 702.109718][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 702.125071][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 702.161834][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 702.180946][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 702.200604][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 702.222904][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 708.093614][T20346] bridge0: port 1(bridge_slave_0) entered blocking state [ 708.101064][T20346] bridge0: port 1(bridge_slave_0) entered disabled state [ 708.116638][T20346] device bridge_slave_0 entered promiscuous mode [ 708.127113][T20346] bridge0: port 2(bridge_slave_1) entered blocking state [ 708.136962][T20346] bridge0: port 2(bridge_slave_1) entered disabled state [ 708.197916][T20346] device bridge_slave_1 entered promiscuous mode [ 708.251330][T20363] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 708.336008][T20363] device syzkaller0 entered promiscuous mode [ 708.834559][ T1593] device bridge_slave_1 left promiscuous mode [ 708.860573][ T1593] bridge0: port 2(bridge_slave_1) entered disabled state [ 708.897396][ T1593] device bridge_slave_0 left promiscuous mode [ 708.903418][ T1593] bridge0: port 1(bridge_slave_0) entered disabled state [ 708.966342][ T1593] device veth1_macvtap left promiscuous mode [ 708.972195][ T1593] device veth0_vlan left promiscuous mode [ 709.519664][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 709.527368][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 709.596583][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 709.616774][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 709.625019][ T3459] bridge0: port 1(bridge_slave_0) entered blocking state [ 709.631899][ T3459] bridge0: port 1(bridge_slave_0) entered forwarding state [ 709.639599][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 709.647889][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 709.656357][ T3459] bridge0: port 2(bridge_slave_1) entered blocking state [ 709.663214][ T3459] bridge0: port 2(bridge_slave_1) entered forwarding state [ 709.670820][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 709.680109][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 709.688329][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 709.696461][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 709.857454][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 709.873592][T20346] device veth0_vlan entered promiscuous mode [ 709.885162][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 709.894977][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 709.908282][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 709.916141][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 709.924161][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 709.931717][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 709.975481][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 710.033161][T20346] device veth1_macvtap entered promiscuous mode [ 710.129105][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 710.138391][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 710.318553][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 710.336491][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 710.972725][T20400] GPL: port 1(veth0_vlan) entered blocking state [ 711.025697][T20400] GPL: port 1(veth0_vlan) entered disabled state [ 711.216682][T20413] FAULT_INJECTION: forcing a failure. [ 711.216682][T20413] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 711.237137][T20413] CPU: 0 PID: 20413 Comm: syz.1.6869 Not tainted 6.1.128-syzkaller-00029-g5145d157731f #0 [ 711.246874][T20413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 711.256771][T20413] Call Trace: [ 711.259900][T20413] <TASK> [ 711.262672][T20413] dump_stack_lvl+0x151/0x1b7 [ 711.267190][T20413] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 711.272483][T20413] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 711.278122][T20413] dump_stack+0x15/0x18 [ 711.282118][T20413] should_fail_ex+0x3d0/0x520 [ 711.286631][T20413] should_fail+0xb/0x10 [ 711.290621][T20413] should_fail_usercopy+0x1a/0x20 [ 711.295478][T20413] _copy_from_user+0x1e/0xc0 [ 711.299905][T20413] generic_map_update_batch+0x54c/0x8c0 [ 711.305292][T20413] ? generic_map_delete_batch+0x5c0/0x5c0 [ 711.310841][T20413] ? generic_map_delete_batch+0x5c0/0x5c0 [ 711.316394][T20413] bpf_map_do_batch+0x4cc/0x630 [ 711.321080][T20413] __sys_bpf+0x66b/0x7f0 [ 711.325158][T20413] ? clockevents_program_event+0x22f/0x300 [ 711.330801][T20413] ? bpf_link_show_fdinfo+0x300/0x300 [ 711.336020][T20413] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 711.342005][T20413] __x64_sys_bpf+0x7c/0x90 [ 711.346250][T20413] x64_sys_call+0x87f/0x9a0 [ 711.350585][T20413] do_syscall_64+0x3b/0xb0 [ 711.354979][T20413] ? clear_bhb_loop+0x55/0xb0 [ 711.359490][T20413] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 711.365218][T20413] RIP: 0033:0x7f55f938d169 [ 711.369472][T20413] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 711.388916][T20413] RSP: 002b:00007f55fa1ea038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 711.397157][T20413] RAX: ffffffffffffffda RBX: 00007f55f95a5fa0 RCX: 00007f55f938d169 [ 711.404967][T20413] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 711.412780][T20413] RBP: 00007f55fa1ea090 R08: 0000000000000000 R09: 0000000000000000 [ 711.420593][T20413] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 711.428413][T20413] R13: 0000000000000000 R14: 00007f55f95a5fa0 R15: 00007fff16f99738 [ 711.436220][T20413] </TASK> [ 711.604058][T20418] bridge0: port 1(bridge_slave_0) entered blocking state [ 711.663948][T20418] bridge0: port 1(bridge_slave_0) entered disabled state [ 711.705242][T20418] device bridge_slave_0 entered promiscuous mode [ 711.748643][T20418] bridge0: port 2(bridge_slave_1) entered blocking state [ 711.788633][T20418] bridge0: port 2(bridge_slave_1) entered disabled state [ 711.850684][T20418] device bridge_slave_1 entered promiscuous mode [ 711.897181][ T1593] device bridge_slave_1 left promiscuous mode [ 711.903145][ T1593] bridge0: port 2(bridge_slave_1) entered disabled state [ 711.956416][ T1593] device bridge_slave_0 left promiscuous mode [ 711.962404][ T1593] bridge0: port 1(bridge_slave_0) entered disabled state [ 712.007632][ T1593] device veth1_macvtap left promiscuous mode [ 712.013515][ T1593] device veth0_vlan left promiscuous mode [ 712.740383][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 712.759739][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 712.891948][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 712.909235][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 712.966357][ T3459] bridge0: port 1(bridge_slave_0) entered blocking state [ 712.973226][ T3459] bridge0: port 1(bridge_slave_0) entered forwarding state [ 713.058399][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 713.100791][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 713.138639][ T3459] bridge0: port 2(bridge_slave_1) entered blocking state [ 713.145614][ T3459] bridge0: port 2(bridge_slave_1) entered forwarding state [ 713.220679][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 713.232304][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 713.248643][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 713.265287][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 713.282194][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 713.339945][T20418] device veth0_vlan entered promiscuous mode [ 713.349468][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 713.360139][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 713.375018][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 713.392278][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 713.463962][T20418] device veth1_macvtap entered promiscuous mode [ 713.481185][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 713.496512][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 713.510291][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 713.559509][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 713.869721][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 713.900910][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 713.941495][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 713.970373][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 714.171280][T20464] device bridge0 entered promiscuous mode [ 715.074913][T20467] bridge0: port 1(bridge_slave_0) entered blocking state [ 715.082343][T20467] bridge0: port 1(bridge_slave_0) entered disabled state [ 715.134056][T20467] device bridge_slave_0 entered promiscuous mode [ 715.223127][T20467] bridge0: port 2(bridge_slave_1) entered blocking state [ 715.256062][T20467] bridge0: port 2(bridge_slave_1) entered disabled state [ 715.263642][T20467] device bridge_slave_1 entered promiscuous mode [ 715.774988][ T1593] device bridge_slave_1 left promiscuous mode [ 715.796121][ T1593] bridge0: port 2(bridge_slave_1) entered disabled state [ 715.844166][ T1593] device bridge_slave_0 left promiscuous mode [ 715.866234][ T1593] bridge0: port 1(bridge_slave_0) entered disabled state [ 715.904150][ T1593] device veth1_macvtap left promiscuous mode [ 715.932605][ T1593] device veth0_vlan left promiscuous mode [ 716.441800][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 716.460189][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 716.504120][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 716.555754][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 716.590506][ T3459] bridge0: port 1(bridge_slave_0) entered blocking state [ 716.597515][ T3459] bridge0: port 1(bridge_slave_0) entered forwarding state [ 716.657589][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 716.694635][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 716.776270][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 716.840956][ T3459] bridge0: port 2(bridge_slave_1) entered blocking state [ 716.847861][ T3459] bridge0: port 2(bridge_slave_1) entered forwarding state [ 716.943360][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 716.976653][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 717.014994][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 717.080788][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 717.104653][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 717.130459][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 717.148773][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 717.206797][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 717.215421][T20467] device veth0_vlan entered promiscuous mode [ 717.231820][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 717.248553][T20467] device veth1_macvtap entered promiscuous mode [ 717.260206][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 717.269368][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 717.314046][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 717.390358][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 718.446798][ T1593] device bridge_slave_1 left promiscuous mode [ 718.452878][ T1593] bridge0: port 2(bridge_slave_1) entered disabled state [ 718.469706][ T1593] device bridge_slave_0 left promiscuous mode [ 718.484657][ T1593] bridge0: port 1(bridge_slave_0) entered disabled state [ 718.553557][ T1593] device veth1_macvtap left promiscuous mode [ 718.559628][ T1593] device veth0_vlan left promiscuous mode [ 719.184448][T20527] bridge0: port 1(bridge_slave_0) entered blocking state [ 719.192933][T20527] bridge0: port 1(bridge_slave_0) entered disabled state [ 719.201129][T20527] device bridge_slave_0 entered promiscuous mode [ 719.228049][T20527] bridge0: port 2(bridge_slave_1) entered blocking state [ 719.242030][T20527] bridge0: port 2(bridge_slave_1) entered disabled state [ 719.249561][T20527] device bridge_slave_1 entered promiscuous mode [ 720.247813][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 720.275557][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 720.332845][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 720.416414][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 720.474783][ T1593] bridge0: port 1(bridge_slave_0) entered blocking state [ 720.481692][ T1593] bridge0: port 1(bridge_slave_0) entered forwarding state [ 720.489009][ T28] audit: type=1400 audit(1742734319.778:178): avc: denied { create } for pid=20562 comm="syz.2.6911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 720.523759][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 720.532094][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 720.540479][ T1593] bridge0: port 2(bridge_slave_1) entered blocking state [ 720.547352][ T1593] bridge0: port 2(bridge_slave_1) entered forwarding state [ 720.554813][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 720.590549][T20527] device veth0_vlan entered promiscuous mode [ 720.607482][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 720.617602][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 720.625539][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 720.635359][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 720.651706][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 720.695590][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 720.745665][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 720.786698][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 720.833151][T20527] device veth1_macvtap entered promiscuous mode [ 720.872497][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 720.881113][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 720.970017][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 721.026401][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 721.086378][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 721.131267][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 721.206642][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 721.266855][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 721.287689][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 721.498605][T20584] FAULT_INJECTION: forcing a failure. [ 721.498605][T20584] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 721.546457][T20584] CPU: 1 PID: 20584 Comm: syz.3.6919 Not tainted 6.1.128-syzkaller-00029-g5145d157731f #0 [ 721.556184][T20584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 721.566082][T20584] Call Trace: [ 721.569201][T20584] <TASK> [ 721.571978][T20584] dump_stack_lvl+0x151/0x1b7 [ 721.576492][T20584] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 721.581787][T20584] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 721.587775][T20584] dump_stack+0x15/0x18 [ 721.591769][T20584] should_fail_ex+0x3d0/0x520 [ 721.596369][T20584] should_fail+0xb/0x10 [ 721.600362][T20584] should_fail_usercopy+0x1a/0x20 [ 721.605222][T20584] _copy_from_user+0x1e/0xc0 [ 721.609665][T20584] generic_map_update_batch+0x4d9/0x8c0 [ 721.615032][T20584] ? generic_map_delete_batch+0x5c0/0x5c0 [ 721.620585][T20584] ? generic_map_delete_batch+0x5c0/0x5c0 [ 721.626140][T20584] bpf_map_do_batch+0x4cc/0x630 [ 721.630860][T20584] __sys_bpf+0x66b/0x7f0 [ 721.634905][T20584] ? bpf_link_show_fdinfo+0x300/0x300 [ 721.640117][T20584] ? bpf_trace_run1+0x240/0x240 [ 721.644801][T20584] ? __ia32_sys_read+0x90/0x90 [ 721.649408][T20584] __x64_sys_bpf+0x7c/0x90 [ 721.653654][T20584] x64_sys_call+0x87f/0x9a0 [ 721.657990][T20584] do_syscall_64+0x3b/0xb0 [ 721.662243][T20584] ? clear_bhb_loop+0x55/0xb0 [ 721.666757][T20584] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 721.672485][T20584] RIP: 0033:0x7f0ef338d169 [ 721.676737][T20584] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 721.696179][T20584] RSP: 002b:00007f0ef41c6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 721.704425][T20584] RAX: ffffffffffffffda RBX: 00007f0ef35a5fa0 RCX: 00007f0ef338d169 [ 721.712238][T20584] RDX: 0000000000000038 RSI: 0000200000000900 RDI: 000000000000001a [ 721.720049][T20584] RBP: 00007f0ef41c6090 R08: 0000000000000000 R09: 0000000000000000 [ 721.727865][T20584] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 721.735672][T20584] R13: 0000000000000000 R14: 00007f0ef35a5fa0 R15: 00007ffd7614dd68 [ 721.743488][T20584] </TASK> [ 722.590346][ T3459] device bridge_slave_1 left promiscuous mode [ 722.606783][ T3459] bridge0: port 2(bridge_slave_1) entered disabled state [ 722.654543][ T3459] device bridge_slave_0 left promiscuous mode [ 722.692115][ T3459] bridge0: port 1(bridge_slave_0) entered disabled state [ 722.731148][ T3459] device veth1_macvtap left promiscuous mode [ 722.770437][ T3459] device veth0_vlan left promiscuous mode [ 723.085862][T20612] bridge0: port 1(bridge_slave_0) entered blocking state [ 723.093043][T20612] bridge0: port 1(bridge_slave_0) entered disabled state [ 723.100704][T20612] device bridge_slave_0 entered promiscuous mode [ 723.108996][T20612] bridge0: port 2(bridge_slave_1) entered blocking state [ 723.115841][T20612] bridge0: port 2(bridge_slave_1) entered disabled state [ 723.159914][T20612] device bridge_slave_1 entered promiscuous mode [ 723.727140][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 723.744764][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 723.816453][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 723.824876][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 723.875518][ T3459] bridge0: port 1(bridge_slave_0) entered blocking state [ 723.882422][ T3459] bridge0: port 1(bridge_slave_0) entered forwarding state [ 723.905436][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 723.982707][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 724.008883][ T3459] bridge0: port 2(bridge_slave_1) entered blocking state [ 724.015777][ T3459] bridge0: port 2(bridge_slave_1) entered forwarding state [ 724.076159][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 724.106303][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 724.114188][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 724.173425][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 724.191478][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 724.231052][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 724.244936][T20612] device veth0_vlan entered promiscuous mode [ 724.255335][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 724.264094][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 724.286427][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 724.309916][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 724.324294][T20612] device veth1_macvtap entered promiscuous mode [ 724.376824][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 724.401828][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 724.441025][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 724.511845][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 725.416843][ T1593] device bridge_slave_1 left promiscuous mode [ 725.422771][ T1593] bridge0: port 2(bridge_slave_1) entered disabled state [ 725.430344][ T1593] device bridge_slave_0 left promiscuous mode [ 725.436356][ T1593] bridge0: port 1(bridge_slave_0) entered disabled state [ 725.444372][ T1593] device veth1_macvtap left promiscuous mode [ 725.450249][ T1593] device veth0_vlan left promiscuous mode [ 725.741271][T20702] device wg2 left promiscuous mode [ 725.777728][T20702] device wg2 entered promiscuous mode [ 725.850184][T20700] device syzkaller0 entered promiscuous mode [ 725.878182][T20703] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 726.245587][T20719] tun0: tun_chr_ioctl cmd 1074025677 [ 726.257017][T20719] tun0: linktype set to 825 [ 726.293618][T20704] bridge0: port 1(bridge_slave_0) entered blocking state [ 726.308241][T20704] bridge0: port 1(bridge_slave_0) entered disabled state [ 726.315830][T20704] device bridge_slave_0 entered promiscuous mode [ 726.333257][T20704] bridge0: port 2(bridge_slave_1) entered blocking state [ 726.343415][T20704] bridge0: port 2(bridge_slave_1) entered disabled state [ 726.355679][T20704] device bridge_slave_1 entered promiscuous mode [ 726.586656][T20704] bridge0: port 2(bridge_slave_1) entered blocking state [ 726.593554][T20704] bridge0: port 2(bridge_slave_1) entered forwarding state [ 726.600692][T20704] bridge0: port 1(bridge_slave_0) entered blocking state [ 726.607552][T20704] bridge0: port 1(bridge_slave_0) entered forwarding state [ 726.732627][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 726.768317][ T3462] bridge0: port 1(bridge_slave_0) entered disabled state [ 726.799082][ T3462] bridge0: port 2(bridge_slave_1) entered disabled state [ 726.875044][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 726.915742][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 727.033427][ T3462] bridge0: port 1(bridge_slave_0) entered blocking state [ 727.040350][ T3462] bridge0: port 1(bridge_slave_0) entered forwarding state [ 727.086379][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 727.122633][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 727.158785][ T3462] bridge0: port 2(bridge_slave_1) entered blocking state [ 727.165693][ T3462] bridge0: port 2(bridge_slave_1) entered forwarding state [ 727.237403][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 727.247679][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 727.268836][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 727.312829][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 727.438225][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 727.467236][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 727.538925][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 727.562370][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 727.663131][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 727.678943][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 727.706925][T20704] device veth0_vlan entered promiscuous mode [ 727.741375][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 727.766425][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 727.787145][T20704] device veth1_macvtap entered promiscuous mode [ 727.808915][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 727.818609][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 727.842771][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 727.851073][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 728.009347][T20780] FAULT_INJECTION: forcing a failure. [ 728.009347][T20780] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 728.086317][T20780] CPU: 0 PID: 20780 Comm: syz.1.6980 Not tainted 6.1.128-syzkaller-00029-g5145d157731f #0 [ 728.096056][T20780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 728.105963][T20780] Call Trace: [ 728.109074][T20780] <TASK> [ 728.111851][T20780] dump_stack_lvl+0x151/0x1b7 [ 728.116375][T20780] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 728.121659][T20780] ? migrate_enable+0x1cb/0x2b0 [ 728.126355][T20780] dump_stack+0x15/0x18 [ 728.130336][T20780] should_fail_ex+0x3d0/0x520 [ 728.134880][T20780] should_fail+0xb/0x10 [ 728.138843][T20780] should_fail_usercopy+0x1a/0x20 [ 728.143705][T20780] _copy_to_user+0x1e/0x90 [ 728.147958][T20780] generic_map_lookup_batch+0x778/0xcc0 [ 728.153346][T20780] ? bpf_map_update_value+0x410/0x410 [ 728.158551][T20780] ? __fdget+0x1b7/0x240 [ 728.162626][T20780] ? bpf_map_update_value+0x410/0x410 [ 728.167832][T20780] bpf_map_do_batch+0x2e2/0x630 [ 728.172517][T20780] __sys_bpf+0x66b/0x7f0 [ 728.176601][T20780] ? bpf_link_show_fdinfo+0x300/0x300 [ 728.181809][T20780] ? __ia32_sys_read+0x90/0x90 [ 728.186409][T20780] ? debug_smp_processor_id+0x17/0x20 [ 728.191616][T20780] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 728.197515][T20780] __x64_sys_bpf+0x7c/0x90 [ 728.201766][T20780] x64_sys_call+0x87f/0x9a0 [ 728.206107][T20780] do_syscall_64+0x3b/0xb0 [ 728.210359][T20780] ? clear_bhb_loop+0x55/0xb0 [ 728.214874][T20780] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 728.220605][T20780] RIP: 0033:0x7f55f938d169 [ 728.224856][T20780] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 728.244312][T20780] RSP: 002b:00007f55fa1c9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 728.252541][T20780] RAX: ffffffffffffffda RBX: 00007f55f95a6080 RCX: 00007f55f938d169 [ 728.260354][T20780] RDX: 0000000000000038 RSI: 00002000000003c0 RDI: 0000000000000018 [ 728.268168][T20780] RBP: 00007f55fa1c9090 R08: 0000000000000000 R09: 0000000000000000 [ 728.275975][T20780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 728.283793][T20780] R13: 0000000000000000 R14: 00007f55f95a6080 R15: 00007fff16f99738 [ 728.291605][T20780] </TASK> [ 729.036693][ T1593] device bridge_slave_1 left promiscuous mode [ 729.042640][ T1593] bridge0: port 2(bridge_slave_1) entered disabled state [ 729.050028][ T1593] device bridge_slave_0 left promiscuous mode [ 729.056162][ T1593] bridge0: port 1(bridge_slave_0) entered disabled state [ 729.063915][ T1593] device veth1_macvtap left promiscuous mode [ 729.070488][ T1593] device veth0_vlan left promiscuous mode [ 729.718739][T20808] bridge0: port 1(bridge_slave_0) entered blocking state [ 729.790257][T20808] bridge0: port 1(bridge_slave_0) entered disabled state [ 729.876879][T20808] device bridge_slave_0 entered promiscuous mode [ 729.946406][T20808] bridge0: port 2(bridge_slave_1) entered blocking state [ 729.953294][T20808] bridge0: port 2(bridge_slave_1) entered disabled state [ 730.034614][T20808] device bridge_slave_1 entered promiscuous mode [ 730.769572][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 730.777417][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 730.823797][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 730.834309][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 730.849706][ T3474] bridge0: port 1(bridge_slave_0) entered blocking state [ 730.856605][ T3474] bridge0: port 1(bridge_slave_0) entered forwarding state [ 730.884922][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 730.910387][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 730.926266][ T3474] bridge0: port 2(bridge_slave_1) entered blocking state [ 730.933165][ T3474] bridge0: port 2(bridge_slave_1) entered forwarding state [ 730.984232][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 730.997908][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 731.046369][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 731.055281][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 731.204380][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 731.214493][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 731.232713][T20808] device veth0_vlan entered promiscuous mode [ 731.326064][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 731.353018][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 731.408921][T20808] device veth1_macvtap entered promiscuous mode [ 731.471092][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 731.489497][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 731.517265][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 731.582330][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 731.596441][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 731.605135][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 731.636569][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 732.907488][T20877] FAULT_INJECTION: forcing a failure. [ 732.907488][T20877] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 732.920718][T20877] CPU: 0 PID: 20877 Comm: syz.3.7010 Not tainted 6.1.128-syzkaller-00029-g5145d157731f #0 [ 732.930442][T20877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 732.940334][T20877] Call Trace: [ 732.943449][T20877] <TASK> [ 732.946228][T20877] dump_stack_lvl+0x151/0x1b7 [ 732.950738][T20877] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 732.956037][T20877] dump_stack+0x15/0x18 [ 732.960033][T20877] should_fail_ex+0x3d0/0x520 [ 732.964540][T20877] should_fail_alloc_page+0x68/0x90 [ 732.969576][T20877] prepare_alloc_pages+0x13b/0x6d0 [ 732.974522][T20877] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 732.979552][T20877] ? slab_post_alloc_hook+0x53/0x2c0 [ 732.984678][T20877] ? alloc_vmap_area+0x1a5/0x1aa0 [ 732.989533][T20877] ? __get_vm_area_node+0x171/0x370 [ 732.994570][T20877] ? __vmalloc_node_range+0x338/0x1560 [ 732.999865][T20877] __alloc_pages+0x162/0x610 [ 733.004293][T20877] ? prep_new_page+0x110/0x110 [ 733.008892][T20877] ? _raw_spin_trylock_bh+0x190/0x190 [ 733.014103][T20877] __get_free_pages+0xe/0x30 [ 733.018536][T20877] kasan_populate_vmalloc_pte+0x39/0x130 [ 733.023996][T20877] ? __apply_to_page_range+0x8ca/0xbe0 [ 733.029290][T20877] __apply_to_page_range+0x8dd/0xbe0 [ 733.034409][T20877] ? kasan_populate_vmalloc+0x70/0x70 [ 733.039616][T20877] ? kasan_populate_vmalloc+0x70/0x70 [ 733.044856][T20877] apply_to_page_range+0x3b/0x50 [ 733.049599][T20877] kasan_populate_vmalloc+0x65/0x70 [ 733.054629][T20877] alloc_vmap_area+0x1961/0x1aa0 [ 733.059410][T20877] ? vm_map_ram+0x940/0x940 [ 733.063747][T20877] ? __kasan_kmalloc+0x9c/0xb0 [ 733.068345][T20877] ? kmalloc_node_trace+0x3d/0xb0 [ 733.073209][T20877] __get_vm_area_node+0x171/0x370 [ 733.078065][T20877] ? __kmalloc_node+0xb4/0x1e0 [ 733.082666][T20877] __vmalloc_node_range+0x338/0x1560 [ 733.087785][T20877] ? dev_map_create_hash+0x29/0x1c0 [ 733.092830][T20877] ? vmap+0x2b0/0x2b0 [ 733.096638][T20877] ? bpf_map_area_alloc+0x4f/0xf0 [ 733.101498][T20877] bpf_map_area_alloc+0xdc/0xf0 [ 733.106184][T20877] ? dev_map_create_hash+0x29/0x1c0 [ 733.111217][T20877] dev_map_create_hash+0x29/0x1c0 [ 733.116080][T20877] ? bpf_map_init_from_attr+0x15f/0x3e0 [ 733.121462][T20877] dev_map_alloc+0x2af/0x510 [ 733.125888][T20877] map_create+0x44a/0xcf0 [ 733.130057][T20877] __sys_bpf+0x2e6/0x7f0 [ 733.134132][T20877] ? bpf_link_show_fdinfo+0x300/0x300 [ 733.139344][T20877] ? __ia32_sys_read+0x90/0x90 [ 733.143943][T20877] ? debug_smp_processor_id+0x17/0x20 [ 733.149149][T20877] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 733.155057][T20877] __x64_sys_bpf+0x7c/0x90 [ 733.159304][T20877] x64_sys_call+0x87f/0x9a0 [ 733.163640][T20877] do_syscall_64+0x3b/0xb0 [ 733.167904][T20877] ? clear_bhb_loop+0x55/0xb0 [ 733.172409][T20877] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 733.178138][T20877] RIP: 0033:0x7f0ef338d169 [ 733.182390][T20877] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 733.201832][T20877] RSP: 002b:00007f0ef41c6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 733.210082][T20877] RAX: ffffffffffffffda RBX: 00007f0ef35a5fa0 RCX: 00007f0ef338d169 [ 733.217893][T20877] RDX: 0000000000000048 RSI: 0000200000000580 RDI: 0000000000000000 [ 733.225707][T20877] RBP: 00007f0ef41c6090 R08: 0000000000000000 R09: 0000000000000000 [ 733.233518][T20877] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 733.241323][T20877] R13: 0000000000000000 R14: 00007f0ef35a5fa0 R15: 00007ffd7614dd68 [ 733.249143][T20877] </TASK> [ 733.995668][T20892] device syzkaller0 entered promiscuous mode [ 734.027428][ T1593] device bridge_slave_1 left promiscuous mode [ 734.036102][ T1593] bridge0: port 2(bridge_slave_1) entered disabled state [ 734.048026][ T1593] device bridge_slave_0 left promiscuous mode [ 734.054047][ T1593] bridge0: port 1(bridge_slave_0) entered disabled state [ 734.061945][ T1593] device veth1_macvtap left promiscuous mode [ 734.067843][ T1593] device veth0_vlan left promiscuous mode [ 734.397014][T20882] bridge0: port 1(bridge_slave_0) entered blocking state [ 734.403933][T20882] bridge0: port 1(bridge_slave_0) entered disabled state [ 734.419139][T20882] device bridge_slave_0 entered promiscuous mode [ 734.431894][T20882] bridge0: port 2(bridge_slave_1) entered blocking state [ 734.443446][T20882] bridge0: port 2(bridge_slave_1) entered disabled state [ 734.451131][T20882] device bridge_slave_1 entered promiscuous mode [ 734.714620][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 734.722157][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 734.866849][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 734.875081][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 734.883367][ T3459] bridge0: port 1(bridge_slave_0) entered blocking state [ 734.890267][ T3459] bridge0: port 1(bridge_slave_0) entered forwarding state [ 734.897961][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 734.906839][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 734.914862][ T3459] bridge0: port 2(bridge_slave_1) entered blocking state [ 734.921713][ T3459] bridge0: port 2(bridge_slave_1) entered forwarding state [ 734.929286][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 734.937190][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 734.945013][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 734.953130][T20908] bridge0: port 2(bridge_slave_1) entered disabled state [ 734.962160][T20908] bridge0: port 1(bridge_slave_0) entered disabled state [ 734.972246][T20908] device bridge0 left promiscuous mode [ 735.073136][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 735.267222][T20882] device veth0_vlan entered promiscuous mode [ 735.319878][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 735.339332][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 735.383016][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 735.494814][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 735.588064][T20882] device veth1_macvtap entered promiscuous mode [ 735.623198][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 735.641603][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 735.718038][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 735.762809][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 736.636719][ T1593] device bridge_slave_1 left promiscuous mode [ 736.642647][ T1593] bridge0: port 2(bridge_slave_1) entered disabled state [ 736.650020][ T1593] device bridge_slave_0 left promiscuous mode [ 736.655929][ T1593] bridge0: port 1(bridge_slave_0) entered disabled state [ 736.663908][ T1593] device veth1_macvtap left promiscuous mode [ 736.669780][ T1593] device veth0_vlan left promiscuous mode [ 737.727142][T20936] bridge0: port 1(bridge_slave_0) entered blocking state [ 737.734072][T20936] bridge0: port 1(bridge_slave_0) entered disabled state [ 737.742591][T20936] device bridge_slave_0 entered promiscuous mode [ 737.749724][T20936] bridge0: port 2(bridge_slave_1) entered blocking state [ 737.774346][T20936] bridge0: port 2(bridge_slave_1) entered disabled state [ 737.790494][T20936] device bridge_slave_1 entered promiscuous mode [ 737.942540][T20947] FAULT_INJECTION: forcing a failure. [ 737.942540][T20947] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 738.012724][T20947] CPU: 1 PID: 20947 Comm: syz.2.7028 Not tainted 6.1.128-syzkaller-00029-g5145d157731f #0 [ 738.022465][T20947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 738.032354][T20947] Call Trace: [ 738.035476][T20947] <TASK> [ 738.038253][T20947] dump_stack_lvl+0x151/0x1b7 [ 738.042766][T20947] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 738.048060][T20947] ? __check_object_size+0x76/0x650 [ 738.053093][T20947] dump_stack+0x15/0x18 [ 738.057087][T20947] should_fail_ex+0x3d0/0x520 [ 738.061606][T20947] should_fail+0xb/0x10 [ 738.065596][T20947] should_fail_usercopy+0x1a/0x20 [ 738.070468][T20947] _copy_to_user+0x1e/0x90 [ 738.074709][T20947] generic_map_lookup_batch+0x778/0xcc0 [ 738.080090][T20947] ? bpf_map_update_value+0x410/0x410 [ 738.085305][T20947] ? bpf_map_do_batch+0x1bd/0x630 [ 738.090154][T20947] ? bpf_map_update_value+0x410/0x410 [ 738.095365][T20947] bpf_map_do_batch+0x2e2/0x630 [ 738.100052][T20947] __sys_bpf+0x66b/0x7f0 [ 738.104128][T20947] ? clockevents_program_event+0x22f/0x300 [ 738.109769][T20947] ? bpf_link_show_fdinfo+0x300/0x300 [ 738.114985][T20947] ? __sched_clock_gtod_offset+0x100/0x100 [ 738.120617][T20947] ? debug_smp_processor_id+0x17/0x20 [ 738.125820][T20947] __x64_sys_bpf+0x7c/0x90 [ 738.130077][T20947] x64_sys_call+0x87f/0x9a0 [ 738.134416][T20947] do_syscall_64+0x3b/0xb0 [ 738.138669][T20947] ? clear_bhb_loop+0x55/0xb0 [ 738.143207][T20947] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 738.148909][T20947] RIP: 0033:0x7fb99058d169 [ 738.153163][T20947] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 738.172604][T20947] RSP: 002b:00007fb99136d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 738.180852][T20947] RAX: ffffffffffffffda RBX: 00007fb9907a5fa0 RCX: 00007fb99058d169 [ 738.188659][T20947] RDX: 0000000000000038 RSI: 00002000000003c0 RDI: 0000000000000018 [ 738.196479][T20947] RBP: 00007fb99136d090 R08: 0000000000000000 R09: 0000000000000000 [ 738.204285][T20947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 738.212120][T20947] R13: 0000000000000000 R14: 00007fb9907a5fa0 R15: 00007ffe60dbc4f8 [ 738.219912][T20947] </TASK> [ 738.372762][T20948] device syzkaller0 entered promiscuous mode [ 738.581919][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 738.590729][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 738.615263][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 738.666416][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 738.674477][ T3462] bridge0: port 1(bridge_slave_0) entered blocking state [ 738.681343][ T3462] bridge0: port 1(bridge_slave_0) entered forwarding state [ 738.688583][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 738.708534][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 738.728997][ T3462] bridge0: port 2(bridge_slave_1) entered blocking state [ 738.735873][ T3462] bridge0: port 2(bridge_slave_1) entered forwarding state [ 738.743735][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 738.753420][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 738.783770][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 738.803846][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 738.821728][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 738.830701][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 738.841454][T20936] device veth0_vlan entered promiscuous mode [ 738.861201][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 738.892737][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 738.923901][T20936] device veth1_macvtap entered promiscuous mode [ 738.943257][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 738.952510][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 738.961660][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 739.008159][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 739.023703][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 739.035547][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 739.078721][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 740.226788][ T1593] device bridge_slave_1 left promiscuous mode [ 740.232827][ T1593] bridge0: port 2(bridge_slave_1) entered disabled state [ 740.240166][ T1593] device bridge_slave_0 left promiscuous mode [ 740.246168][ T1593] bridge0: port 1(bridge_slave_0) entered disabled state [ 740.254068][ T1593] device veth1_macvtap left promiscuous mode [ 740.260042][ T1593] device veth0_vlan left promiscuous mode [ 740.773810][T20988] device bridge_slave_1 left promiscuous mode [ 740.837108][T20988] bridge0: port 2(bridge_slave_1) entered disabled state [ 740.872166][T20988] device bridge_slave_0 left promiscuous mode [ 740.885053][T20988] bridge0: port 1(bridge_slave_0) entered disabled state [ 741.579131][T20995] bridge0: port 1(bridge_slave_0) entered blocking state [ 741.589198][T20995] bridge0: port 1(bridge_slave_0) entered disabled state [ 741.604159][T20995] device bridge_slave_0 entered promiscuous mode [ 741.730009][T21010] device syzkaller0 entered promiscuous mode [ 741.772206][T20995] bridge0: port 2(bridge_slave_1) entered blocking state [ 741.794986][T20995] bridge0: port 2(bridge_slave_1) entered disabled state [ 741.802446][T20995] device bridge_slave_1 entered promiscuous mode [ 742.225208][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 742.237333][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 742.252664][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 742.268131][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 742.282666][ T3474] bridge0: port 1(bridge_slave_0) entered blocking state [ 742.289565][ T3474] bridge0: port 1(bridge_slave_0) entered forwarding state [ 742.298893][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 742.309293][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 742.333528][ T3474] bridge0: port 2(bridge_slave_1) entered blocking state [ 742.340428][ T3474] bridge0: port 2(bridge_slave_1) entered forwarding state [ 742.410181][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 742.453029][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 742.535346][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 742.545947][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 742.556918][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 742.564322][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 742.571927][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 742.586105][T20995] device veth0_vlan entered promiscuous mode [ 742.604693][T20995] device veth1_macvtap entered promiscuous mode [ 742.616705][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 742.689081][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 742.716864][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 742.756592][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 744.136717][ T1593] device bridge_slave_1 left promiscuous mode [ 744.142645][ T1593] bridge0: port 2(bridge_slave_1) entered disabled state [ 744.150189][ T1593] device bridge_slave_0 left promiscuous mode [ 744.156212][ T1593] bridge0: port 1(bridge_slave_0) entered disabled state [ 744.163972][ T1593] device veth1_macvtap left promiscuous mode [ 744.169851][ T1593] device veth0_vlan left promiscuous mode [ 744.407425][T21046] device ip6gretap0 entered promiscuous mode [ 744.865684][T21047] bridge0: port 1(bridge_slave_0) entered blocking state [ 744.899145][T21047] bridge0: port 1(bridge_slave_0) entered disabled state [ 744.944761][T21047] device bridge_slave_0 entered promiscuous mode [ 744.992098][T21047] bridge0: port 2(bridge_slave_1) entered blocking state [ 745.030908][T21047] bridge0: port 2(bridge_slave_1) entered disabled state [ 745.089212][T21047] device bridge_slave_1 entered promiscuous mode [ 745.872501][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 745.882120][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 746.220236][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 746.228898][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 746.241485][ T3462] bridge0: port 1(bridge_slave_0) entered blocking state [ 746.248381][ T3462] bridge0: port 1(bridge_slave_0) entered forwarding state [ 746.265520][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 746.278274][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 746.294248][ T3462] bridge0: port 2(bridge_slave_1) entered blocking state [ 746.301153][ T3462] bridge0: port 2(bridge_slave_1) entered forwarding state [ 746.310023][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 746.332993][T21096] FAULT_INJECTION: forcing a failure. [ 746.332993][T21096] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 746.346924][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 746.354847][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 746.362399][T21096] CPU: 1 PID: 21096 Comm: syz.1.7071 Not tainted 6.1.128-syzkaller-00029-g5145d157731f #0 [ 746.372095][T21096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 746.381990][T21096] Call Trace: [ 746.385114][T21096] <TASK> [ 746.387888][T21096] dump_stack_lvl+0x151/0x1b7 [ 746.392402][T21096] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 746.397698][T21096] ? __check_object_size+0x76/0x650 [ 746.402732][T21096] ? __virt_addr_valid+0x242/0x2f0 [ 746.407678][T21096] dump_stack+0x15/0x18 [ 746.411670][T21096] should_fail_ex+0x3d0/0x520 [ 746.416193][T21096] should_fail+0xb/0x10 [ 746.420174][T21096] should_fail_usercopy+0x1a/0x20 [ 746.425039][T21096] _copy_from_user+0x1e/0xc0 [ 746.429462][T21096] generic_map_update_batch+0x54c/0x8c0 [ 746.434848][T21096] ? generic_map_delete_batch+0x5c0/0x5c0 [ 746.440399][T21096] ? generic_map_delete_batch+0x5c0/0x5c0 [ 746.445954][T21096] bpf_map_do_batch+0x4cc/0x630 [ 746.450641][T21096] __sys_bpf+0x66b/0x7f0 [ 746.454748][T21096] ? bpf_link_show_fdinfo+0x300/0x300 [ 746.459933][T21096] ? irqentry_exit+0x30/0x40 [ 746.464355][T21096] ? __bpf_trace_sys_enter+0x62/0x70 [ 746.469478][T21096] __x64_sys_bpf+0x7c/0x90 [ 746.473735][T21096] x64_sys_call+0x87f/0x9a0 [ 746.478073][T21096] do_syscall_64+0x3b/0xb0 [ 746.482319][T21096] ? clear_bhb_loop+0x55/0xb0 [ 746.486833][T21096] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 746.492562][T21096] RIP: 0033:0x7f55f938d169 [ 746.496814][T21096] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 746.516256][T21096] RSP: 002b:00007f55fa1ea038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 746.524502][T21096] RAX: ffffffffffffffda RBX: 00007f55f95a5fa0 RCX: 00007f55f938d169 [ 746.532316][T21096] RDX: 0000000000000038 RSI: 0000200000000900 RDI: 000000000000001a [ 746.540134][T21096] RBP: 00007f55fa1ea090 R08: 0000000000000000 R09: 0000000000000000 [ 746.547940][T21096] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 746.555753][T21096] R13: 0000000000000000 R14: 00007f55f95a5fa0 R15: 00007fff16f99738 [ 746.563567][T21096] </TASK> [ 746.639778][T21047] device veth0_vlan entered promiscuous mode [ 746.676658][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 746.695103][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 746.708183][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 746.716641][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 746.767018][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 746.779610][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 746.796467][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 746.816676][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 746.848840][T21047] device veth1_macvtap entered promiscuous mode [ 746.931560][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 746.946634][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 746.963770][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 746.979488][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 747.028340][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 748.046775][ T1593] device bridge_slave_1 left promiscuous mode [ 748.052706][ T1593] bridge0: port 2(bridge_slave_1) entered disabled state [ 748.060096][ T1593] device bridge_slave_0 left promiscuous mode [ 748.066063][ T1593] bridge0: port 1(bridge_slave_0) entered disabled state [ 748.073727][ T1593] device veth1_macvtap left promiscuous mode [ 748.079586][ T1593] device veth0_vlan left promiscuous mode [ 748.666915][T21128] FAULT_INJECTION: forcing a failure. [ 748.666915][T21128] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 748.691224][T21124] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 748.708740][T21124] device syzkaller0 entered promiscuous mode [ 748.714698][T21128] CPU: 0 PID: 21128 Comm: syz.3.7083 Not tainted 6.1.128-syzkaller-00029-g5145d157731f #0 [ 748.724418][T21128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 748.734314][T21128] Call Trace: [ 748.737437][T21128] <TASK> [ 748.740212][T21128] dump_stack_lvl+0x151/0x1b7 [ 748.744725][T21128] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 748.750020][T21128] dump_stack+0x15/0x18 [ 748.754007][T21128] should_fail_ex+0x3d0/0x520 [ 748.758526][T21128] should_fail_alloc_page+0x68/0x90 [ 748.763560][T21128] prepare_alloc_pages+0x13b/0x6d0 [ 748.768512][T21128] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 748.773537][T21128] ? slab_post_alloc_hook+0x53/0x2c0 [ 748.778656][T21128] ? alloc_vmap_area+0x278/0x1aa0 [ 748.783518][T21128] ? __get_vm_area_node+0x171/0x370 [ 748.788553][T21128] ? __vmalloc_node_range+0x338/0x1560 [ 748.793849][T21128] __alloc_pages+0x162/0x610 [ 748.798272][T21128] ? prep_new_page+0x110/0x110 [ 748.802874][T21128] ? _raw_spin_trylock_bh+0x190/0x190 [ 748.808080][T21128] __get_free_pages+0xe/0x30 [ 748.812506][T21128] kasan_populate_vmalloc_pte+0x39/0x130 [ 748.817973][T21128] ? __apply_to_page_range+0x8ca/0xbe0 [ 748.823267][T21128] __apply_to_page_range+0x8dd/0xbe0 [ 748.828389][T21128] ? kasan_populate_vmalloc+0x70/0x70 [ 748.833601][T21128] ? kasan_populate_vmalloc+0x70/0x70 [ 748.838805][T21128] apply_to_page_range+0x3b/0x50 [ 748.843580][T21128] kasan_populate_vmalloc+0x65/0x70 [ 748.848614][T21128] alloc_vmap_area+0x1961/0x1aa0 [ 748.853392][T21128] ? vm_map_ram+0x940/0x940 [ 748.857727][T21128] ? __kasan_kmalloc+0x9c/0xb0 [ 748.862323][T21128] ? kmalloc_node_trace+0x3d/0xb0 [ 748.867184][T21128] __get_vm_area_node+0x171/0x370 [ 748.872047][T21128] __vmalloc_node_range+0x338/0x1560 [ 748.877168][T21128] ? prealloc_elems_and_freelist+0x99/0x1d0 [ 748.882893][T21128] ? avc_denied+0x1b0/0x1b0 [ 748.887238][T21128] ? prep_new_page+0x110/0x110 [ 748.891840][T21128] ? vmap+0x2b0/0x2b0 [ 748.895650][T21128] ? __kasan_check_write+0x14/0x20 [ 748.900601][T21128] ? mutex_unlock+0xb2/0x260 [ 748.905025][T21128] ? kasan_poison+0x5d/0x70 [ 748.909367][T21128] ? __kasan_kmalloc_large+0xad/0xc0 [ 748.914489][T21128] ? __mutex_lock_slowpath+0x10/0x10 [ 748.919608][T21128] bpf_map_area_alloc+0xdc/0xf0 [ 748.924296][T21128] ? prealloc_elems_and_freelist+0x99/0x1d0 [ 748.930027][T21128] prealloc_elems_and_freelist+0x99/0x1d0 [ 748.935578][T21128] stack_map_alloc+0x39f/0x520 [ 748.940178][T21128] map_create+0x44a/0xcf0 [ 748.944343][T21128] __sys_bpf+0x2e6/0x7f0 [ 748.948422][T21128] ? bpf_link_show_fdinfo+0x300/0x300 [ 748.953637][T21128] ? __ia32_sys_read+0x90/0x90 [ 748.958232][T21128] ? debug_smp_processor_id+0x17/0x20 [ 748.963437][T21128] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 748.969339][T21128] __x64_sys_bpf+0x7c/0x90 [ 748.973594][T21128] x64_sys_call+0x87f/0x9a0 [ 748.977934][T21128] do_syscall_64+0x3b/0xb0 [ 748.982191][T21128] ? clear_bhb_loop+0x55/0xb0 [ 748.986700][T21128] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 748.992428][T21128] RIP: 0033:0x7f0ef338d169 [ 748.996678][T21128] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 749.016127][T21128] RSP: 002b:00007f0ef41c6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 749.024456][T21128] RAX: ffffffffffffffda RBX: 00007f0ef35a5fa0 RCX: 00007f0ef338d169 [ 749.032261][T21128] RDX: 0000000000000048 RSI: 0000200000000900 RDI: 0000000000000000 [ 749.040076][T21128] RBP: 00007f0ef41c6090 R08: 0000000000000000 R09: 0000000000000000 [ 749.047885][T21128] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 749.055696][T21128] R13: 0000000000000000 R14: 00007f0ef35a5fa0 R15: 00007ffd7614dd68 [ 749.063521][T21128] </TASK> [ 749.176038][T21149] ip6_vti0: mtu greater than device maximum [ 749.247692][T21143] bridge0: port 1(bridge_slave_0) entered blocking state [ 749.257116][T21143] bridge0: port 1(bridge_slave_0) entered disabled state [ 749.264480][T21143] device bridge_slave_0 entered promiscuous mode [ 749.361832][T21143] bridge0: port 2(bridge_slave_1) entered blocking state [ 749.396230][T21143] bridge0: port 2(bridge_slave_1) entered disabled state [ 749.403744][T21143] device bridge_slave_1 entered promiscuous mode [ 750.694246][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 750.709449][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 750.763326][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 750.776393][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 750.795926][ T1593] bridge0: port 1(bridge_slave_0) entered blocking state [ 750.802803][ T1593] bridge0: port 1(bridge_slave_0) entered forwarding state [ 750.819136][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 750.828133][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 750.866921][ T1593] bridge0: port 2(bridge_slave_1) entered blocking state [ 750.873779][ T1593] bridge0: port 2(bridge_slave_1) entered forwarding state [ 750.976487][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 750.996291][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 751.135491][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 751.166646][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 751.196396][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 751.226224][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 751.234618][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 751.243130][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 751.251328][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 751.259941][T21143] device veth0_vlan entered promiscuous mode [ 751.314105][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 751.322220][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 751.334860][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 751.343195][ T1593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 751.378291][T21143] device veth1_macvtap entered promiscuous mode [ 751.448199][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 751.456678][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 751.506322][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 751.545048][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 752.306664][ T3474] device bridge_slave_1 left promiscuous mode [ 752.312595][ T3474] bridge0: port 2(bridge_slave_1) entered disabled state [ 752.319996][ T3474] device bridge_slave_0 left promiscuous mode [ 752.325936][ T3474] bridge0: port 1(bridge_slave_0) entered disabled state [ 752.333848][ T3474] device veth1_macvtap left promiscuous mode [ 752.339743][ T3474] device veth0_vlan left promiscuous mode [ 754.115939][T21210] bridge0: port 1(bridge_slave_0) entered blocking state [ 754.122907][T21210] bridge0: port 1(bridge_slave_0) entered disabled state [ 754.130521][T21210] device bridge_slave_0 entered promiscuous mode [ 754.137631][T21210] bridge0: port 2(bridge_slave_1) entered blocking state [ 754.144523][T21210] bridge0: port 2(bridge_slave_1) entered disabled state [ 754.152193][T21210] device bridge_slave_1 entered promiscuous mode [ 754.857757][T21210] bridge0: port 2(bridge_slave_1) entered blocking state [ 754.864632][T21210] bridge0: port 2(bridge_slave_1) entered forwarding state [ 754.871748][T21210] bridge0: port 1(bridge_slave_0) entered blocking state [ 754.878525][T21210] bridge0: port 1(bridge_slave_0) entered forwarding state [ 754.948364][ T3462] bridge0: port 1(bridge_slave_0) entered disabled state [ 754.956960][ T3462] bridge0: port 2(bridge_slave_1) entered disabled state [ 754.976449][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 754.985273][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 755.045485][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 755.100927][ T3462] bridge0: port 1(bridge_slave_0) entered blocking state [ 755.107824][ T3462] bridge0: port 1(bridge_slave_0) entered forwarding state [ 755.191986][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 755.236379][ T3462] bridge0: port 2(bridge_slave_1) entered blocking state [ 755.243246][ T3462] bridge0: port 2(bridge_slave_1) entered forwarding state [ 755.300382][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 755.336505][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 755.402725][T21253] FAULT_INJECTION: forcing a failure. [ 755.402725][T21253] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 755.527426][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 755.536588][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 755.566353][T21253] CPU: 1 PID: 21253 Comm: syz.0.7122 Not tainted 6.1.128-syzkaller-00029-g5145d157731f #0 [ 755.576071][T21253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 755.585965][T21253] Call Trace: [ 755.589095][T21253] <TASK> [ 755.591873][T21253] dump_stack_lvl+0x151/0x1b7 [ 755.596386][T21253] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 755.600869][T21210] device veth0_vlan entered promiscuous mode [ 755.601673][T21253] ? migrate_enable+0x1cb/0x2b0 [ 755.612182][T21253] dump_stack+0x15/0x18 [ 755.616168][T21253] should_fail_ex+0x3d0/0x520 [ 755.620691][T21253] should_fail+0xb/0x10 [ 755.624674][T21253] should_fail_usercopy+0x1a/0x20 [ 755.629538][T21253] _copy_to_user+0x1e/0x90 [ 755.632005][T21210] device veth1_macvtap entered promiscuous mode [ 755.633788][T21253] generic_map_lookup_batch+0x6ff/0xcc0 [ 755.645255][T21253] ? bpf_map_update_value+0x410/0x410 [ 755.650456][T21253] ? __fdget+0x1b7/0x240 [ 755.654527][T21253] ? bpf_map_update_value+0x410/0x410 [ 755.659738][T21253] bpf_map_do_batch+0x2e2/0x630 [ 755.664423][T21253] __sys_bpf+0x66b/0x7f0 [ 755.668508][T21253] ? clockevents_program_event+0x22f/0x300 [ 755.674152][T21253] ? bpf_link_show_fdinfo+0x300/0x300 [ 755.679356][T21253] ? __sched_clock_gtod_offset+0x100/0x100 [ 755.684998][T21253] ? debug_smp_processor_id+0x17/0x20 [ 755.690201][T21253] __x64_sys_bpf+0x7c/0x90 [ 755.694453][T21253] x64_sys_call+0x87f/0x9a0 [ 755.698793][T21253] do_syscall_64+0x3b/0xb0 [ 755.703047][T21253] ? clear_bhb_loop+0x55/0xb0 [ 755.707559][T21253] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 755.713288][T21253] RIP: 0033:0x7fc62d98d169 [ 755.717538][T21253] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 755.736985][T21253] RSP: 002b:00007fc62e84a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 755.745227][T21253] RAX: ffffffffffffffda RBX: 00007fc62dba5fa0 RCX: 00007fc62d98d169 [ 755.753041][T21253] RDX: 0000000000000038 RSI: 00002000000003c0 RDI: 0000000000000018 [ 755.760853][T21253] RBP: 00007fc62e84a090 R08: 0000000000000000 R09: 0000000000000000 [ 755.768661][T21253] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 755.776475][T21253] R13: 0000000000000000 R14: 00007fc62dba5fa0 R15: 00007fff58542d78 [ 755.784292][T21253] </TASK> [ 755.794801][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 755.803977][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 755.813761][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 755.821596][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 755.831707][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 755.841883][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 755.851216][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 755.859305][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 755.867822][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 755.876645][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 755.884788][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 755.908304][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 755.927768][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 756.712532][ T3474] device bridge_slave_1 left promiscuous mode [ 756.718561][ T3474] bridge0: port 2(bridge_slave_1) entered disabled state [ 756.726527][ T3474] device bridge_slave_0 left promiscuous mode [ 756.732536][ T3474] bridge0: port 1(bridge_slave_0) entered disabled state [ 756.741110][ T3474] device veth1_macvtap left promiscuous mode [ 756.747044][ T3474] device veth0_vlan left promiscuous mode [ 758.690952][T21285] bridge0: port 1(bridge_slave_0) entered blocking state [ 758.723675][T21285] bridge0: port 1(bridge_slave_0) entered disabled state [ 758.736572][T21285] device bridge_slave_0 entered promiscuous mode [ 758.776020][T21285] bridge0: port 2(bridge_slave_1) entered blocking state [ 758.787063][T21285] bridge0: port 2(bridge_slave_1) entered disabled state [ 758.816775][T21285] device bridge_slave_1 entered promiscuous mode [ 759.155215][T21285] bridge0: port 2(bridge_slave_1) entered blocking state [ 759.162113][T21285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 759.169219][T21285] bridge0: port 1(bridge_slave_0) entered blocking state [ 759.175990][T21285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 759.243157][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 759.252708][ T3462] bridge0: port 1(bridge_slave_0) entered disabled state [ 759.294780][ T3462] bridge0: port 2(bridge_slave_1) entered disabled state [ 759.355503][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 759.386272][ T3462] bridge0: port 1(bridge_slave_0) entered blocking state [ 759.393153][ T3462] bridge0: port 1(bridge_slave_0) entered forwarding state [ 759.400480][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 759.408678][ T3462] bridge0: port 2(bridge_slave_1) entered blocking state [ 759.415550][ T3462] bridge0: port 2(bridge_slave_1) entered forwarding state [ 759.571222][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 759.579414][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 759.615769][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 759.624206][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 759.636577][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 759.644641][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 759.654158][T21285] device veth0_vlan entered promiscuous mode [ 759.746196][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 759.756806][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 759.801342][T21285] device veth1_macvtap entered promiscuous mode [ 759.879772][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 759.898136][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 759.941881][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 760.008587][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 760.019135][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 760.036195][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 760.112011][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 761.546624][ T3474] device bridge_slave_1 left promiscuous mode [ 761.552548][ T3474] bridge0: port 2(bridge_slave_1) entered disabled state [ 761.560469][ T3474] device bridge_slave_0 left promiscuous mode [ 761.566524][ T3474] bridge0: port 1(bridge_slave_0) entered disabled state [ 761.574330][ T3474] device veth1_macvtap left promiscuous mode [ 761.580222][ T3474] device veth0_vlan left promiscuous mode [ 762.815055][T21359] FAULT_INJECTION: forcing a failure. [ 762.815055][T21359] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 762.902653][T21359] CPU: 1 PID: 21359 Comm: syz.3.7153 Not tainted 6.1.128-syzkaller-00029-g5145d157731f #0 [ 762.912383][T21359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 762.922277][T21359] Call Trace: [ 762.925398][T21359] <TASK> [ 762.928178][T21359] dump_stack_lvl+0x151/0x1b7 [ 762.932797][T21359] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 762.938093][T21359] dump_stack+0x15/0x18 [ 762.942078][T21359] should_fail_ex+0x3d0/0x520 [ 762.946589][T21359] should_fail_alloc_page+0x68/0x90 [ 762.951626][T21359] prepare_alloc_pages+0x13b/0x6d0 [ 762.956579][T21359] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 762.961606][T21359] ? slab_post_alloc_hook+0x53/0x2c0 [ 762.966728][T21359] ? alloc_vmap_area+0x1a5/0x1aa0 [ 762.971585][T21359] ? __get_vm_area_node+0x171/0x370 [ 762.976621][T21359] ? __vmalloc_node_range+0x338/0x1560 [ 762.981915][T21359] __alloc_pages+0x162/0x610 [ 762.986360][T21359] ? prep_new_page+0x110/0x110 [ 762.990943][T21359] ? _raw_spin_trylock_bh+0x190/0x190 [ 762.996151][T21359] __get_free_pages+0xe/0x30 [ 763.000572][T21359] kasan_populate_vmalloc_pte+0x39/0x130 [ 763.006042][T21359] ? __apply_to_page_range+0x8ca/0xbe0 [ 763.011471][T21359] __apply_to_page_range+0x8dd/0xbe0 [ 763.016587][T21359] ? kasan_populate_vmalloc+0x70/0x70 [ 763.021797][T21359] ? kasan_populate_vmalloc+0x70/0x70 [ 763.027000][T21359] apply_to_page_range+0x3b/0x50 [ 763.031777][T21359] kasan_populate_vmalloc+0x65/0x70 [ 763.036808][T21359] alloc_vmap_area+0x1961/0x1aa0 [ 763.041590][T21359] ? vm_map_ram+0x940/0x940 [ 763.045922][T21359] ? __kasan_kmalloc+0x9c/0xb0 [ 763.050522][T21359] ? kmalloc_node_trace+0x3d/0xb0 [ 763.055382][T21359] __get_vm_area_node+0x171/0x370 [ 763.060241][T21359] ? __kmalloc_node+0xb4/0x1e0 [ 763.064845][T21359] __vmalloc_node_range+0x338/0x1560 [ 763.069964][T21359] ? dev_map_create_hash+0x29/0x1c0 [ 763.075003][T21359] ? vmap+0x2b0/0x2b0 [ 763.078815][T21359] ? bpf_map_area_alloc+0x4f/0xf0 [ 763.083677][T21359] bpf_map_area_alloc+0xdc/0xf0 [ 763.088363][T21359] ? dev_map_create_hash+0x29/0x1c0 [ 763.093411][T21359] dev_map_create_hash+0x29/0x1c0 [ 763.098258][T21359] ? bpf_map_init_from_attr+0x15f/0x3e0 [ 763.103640][T21359] dev_map_alloc+0x2af/0x510 [ 763.108065][T21359] map_create+0x44a/0xcf0 [ 763.112236][T21359] __sys_bpf+0x2e6/0x7f0 [ 763.116309][T21359] ? bpf_link_show_fdinfo+0x300/0x300 [ 763.121520][T21359] ? __ia32_sys_read+0x90/0x90 [ 763.126115][T21359] ? debug_smp_processor_id+0x17/0x20 [ 763.131319][T21359] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 763.137222][T21359] __x64_sys_bpf+0x7c/0x90 [ 763.141474][T21359] x64_sys_call+0x87f/0x9a0 [ 763.145812][T21359] do_syscall_64+0x3b/0xb0 [ 763.150068][T21359] ? clear_bhb_loop+0x55/0xb0 [ 763.154582][T21359] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 763.160310][T21359] RIP: 0033:0x7f0ef338d169 [ 763.164564][T21359] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 763.184004][T21359] RSP: 002b:00007f0ef41a5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 763.192251][T21359] RAX: ffffffffffffffda RBX: 00007f0ef35a6080 RCX: 00007f0ef338d169 [ 763.200058][T21359] RDX: 0000000000000048 RSI: 0000200000000580 RDI: 0000000000000000 [ 763.207891][T21359] RBP: 00007f0ef41a5090 R08: 0000000000000000 R09: 0000000000000000 [ 763.215680][T21359] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 763.223493][T21359] R13: 0000000000000000 R14: 00007f0ef35a6080 R15: 00007ffd7614dd68 [ 763.231311][T21359] </TASK> [ 763.274583][T21349] bridge0: port 1(bridge_slave_0) entered blocking state [ 763.281660][T21349] bridge0: port 1(bridge_slave_0) entered disabled state [ 763.289427][T21349] device bridge_slave_0 entered promiscuous mode [ 763.358470][T21349] bridge0: port 2(bridge_slave_1) entered blocking state [ 763.366108][T21349] bridge0: port 2(bridge_slave_1) entered disabled state [ 763.373496][T21349] device bridge_slave_1 entered promiscuous mode [ 763.591422][T21349] bridge0: port 2(bridge_slave_1) entered blocking state [ 763.598336][T21349] bridge0: port 2(bridge_slave_1) entered forwarding state [ 763.605404][T21349] bridge0: port 1(bridge_slave_0) entered blocking state [ 763.612219][T21349] bridge0: port 1(bridge_slave_0) entered forwarding state [ 763.721381][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 763.776508][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 764.005869][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 764.022346][ T3459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 764.043466][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 764.053396][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 764.106366][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 764.136335][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 764.222906][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 764.236513][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 764.252315][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 764.262739][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 764.291460][T21349] device veth0_vlan entered promiscuous mode [ 764.347398][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 764.357026][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 764.484001][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 764.495458][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 764.507283][T21349] device veth1_macvtap entered promiscuous mode [ 764.548324][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 764.566435][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 764.577627][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 764.611076][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 764.621551][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 764.789191][T21349] syz-executor (21349) used greatest stack depth: 20816 bytes left [ 765.646961][ T3462] device bridge_slave_1 left promiscuous mode [ 765.652893][ T3462] bridge0: port 2(bridge_slave_1) entered disabled state [ 765.660308][ T3462] device bridge_slave_0 left promiscuous mode [ 765.666410][ T3462] bridge0: port 1(bridge_slave_0) entered disabled state [ 765.674172][ T3462] device veth1_macvtap left promiscuous mode [ 765.680056][ T3462] device veth0_vlan left promiscuous mode [ 767.606409][T21456] device veth1_macvtap left promiscuous mode [ 767.628528][T21459] FAULT_INJECTION: forcing a failure. [ 767.628528][T21459] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 767.682208][T21440] bridge0: port 1(bridge_slave_0) entered blocking state [ 767.694819][T21440] bridge0: port 1(bridge_slave_0) entered disabled state [ 767.716507][T21440] device bridge_slave_0 entered promiscuous mode [ 767.726098][T21459] CPU: 0 PID: 21459 Comm: syz.1.7184 Not tainted 6.1.128-syzkaller-00029-g5145d157731f #0 [ 767.735816][T21459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 767.745711][T21459] Call Trace: [ 767.748834][T21459] <TASK> [ 767.751612][T21459] dump_stack_lvl+0x151/0x1b7 [ 767.756122][T21459] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 767.761418][T21459] ? migrate_enable+0x1cb/0x2b0 [ 767.766108][T21459] ? bpf_map_update_value+0x11f/0x410 [ 767.771312][T21459] ? bpf_percpu_hash_update+0x1e/0xc0 [ 767.776521][T21459] dump_stack+0x15/0x18 [ 767.780512][T21459] should_fail_ex+0x3d0/0x520 [ 767.785024][T21459] should_fail+0xb/0x10 [ 767.789016][T21459] should_fail_usercopy+0x1a/0x20 [ 767.793878][T21459] _copy_from_user+0x1e/0xc0 [ 767.798304][T21459] generic_map_update_batch+0x4d9/0x8c0 [ 767.803687][T21459] ? generic_map_delete_batch+0x5c0/0x5c0 [ 767.809241][T21459] ? generic_map_delete_batch+0x5c0/0x5c0 [ 767.814794][T21459] bpf_map_do_batch+0x4cc/0x630 [ 767.819485][T21459] __sys_bpf+0x66b/0x7f0 [ 767.823563][T21459] ? bpf_link_show_fdinfo+0x300/0x300 [ 767.828771][T21459] ? bpf_trace_run1+0x240/0x240 [ 767.833455][T21459] ? __ia32_sys_read+0x90/0x90 [ 767.838060][T21459] __x64_sys_bpf+0x7c/0x90 [ 767.842310][T21459] x64_sys_call+0x87f/0x9a0 [ 767.846645][T21459] do_syscall_64+0x3b/0xb0 [ 767.850898][T21459] ? clear_bhb_loop+0x55/0xb0 [ 767.855412][T21459] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 767.861141][T21459] RIP: 0033:0x7f55f938d169 [ 767.865395][T21459] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 767.884835][T21459] RSP: 002b:00007f55fa1ea038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 767.893081][T21459] RAX: ffffffffffffffda RBX: 00007f55f95a5fa0 RCX: 00007f55f938d169 [ 767.900895][T21459] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 767.908791][T21459] RBP: 00007f55fa1ea090 R08: 0000000000000000 R09: 0000000000000000 [ 767.916602][T21459] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 767.924419][T21459] R13: 0000000000000000 R14: 00007f55f95a5fa0 R15: 00007fff16f99738 [ 767.932246][T21459] </TASK> [ 767.946509][T21440] bridge0: port 2(bridge_slave_1) entered blocking state [ 767.953486][T21440] bridge0: port 2(bridge_slave_1) entered disabled state [ 767.961529][T21440] device bridge_slave_1 entered promiscuous mode [ 768.729390][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 768.736817][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 768.748718][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 768.758867][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 768.818253][ T3462] bridge0: port 1(bridge_slave_0) entered blocking state [ 768.825157][ T3462] bridge0: port 1(bridge_slave_0) entered forwarding state [ 768.865455][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 768.881812][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 768.898862][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 768.925288][ T3462] bridge0: port 2(bridge_slave_1) entered blocking state [ 768.932208][ T3462] bridge0: port 2(bridge_slave_1) entered forwarding state [ 768.998369][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 769.006572][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 769.014561][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 769.022859][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 769.072680][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 769.081149][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 769.142184][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 769.152421][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 769.163759][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 769.175535][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 769.206699][T21440] device veth0_vlan entered promiscuous mode [ 769.308546][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 769.336790][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 769.398999][T21440] device veth1_macvtap entered promiscuous mode [ 769.429242][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 769.442410][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 769.481442][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 769.528345][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 769.571747][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 770.316712][ T3474] device bridge_slave_1 left promiscuous mode [ 770.322653][ T3474] bridge0: port 2(bridge_slave_1) entered disabled state [ 770.330031][ T3474] device bridge_slave_0 left promiscuous mode [ 770.336029][ T3474] bridge0: port 1(bridge_slave_0) entered disabled state [ 770.343828][ T3474] device veth1_macvtap left promiscuous mode [ 770.349712][ T3474] device veth0_vlan left promiscuous mode [ 771.887378][T21530] device syzkaller0 entered promiscuous mode [ 776.113581][T21534] bridge0: port 1(bridge_slave_0) entered blocking state [ 776.120554][T21534] bridge0: port 1(bridge_slave_0) entered disabled state [ 776.127950][T21534] device bridge_slave_0 entered promiscuous mode [ 776.135172][T21534] bridge0: port 2(bridge_slave_1) entered blocking state [ 776.142081][T21534] bridge0: port 2(bridge_slave_1) entered disabled state [ 776.149547][T21534] device bridge_slave_1 entered promiscuous mode [ 776.360233][T21534] bridge0: port 2(bridge_slave_1) entered blocking state [ 776.367118][T21534] bridge0: port 2(bridge_slave_1) entered forwarding state [ 776.374184][T21534] bridge0: port 1(bridge_slave_0) entered blocking state [ 776.381018][T21534] bridge0: port 1(bridge_slave_0) entered forwarding state [ 776.460685][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 776.471216][ T3474] bridge0: port 1(bridge_slave_0) entered disabled state [ 776.487016][ T3474] bridge0: port 2(bridge_slave_1) entered disabled state [ 776.526298][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 776.546484][ T3474] bridge0: port 1(bridge_slave_0) entered blocking state [ 776.553434][ T3474] bridge0: port 1(bridge_slave_0) entered forwarding state [ 776.566110][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 776.574234][ T3474] bridge0: port 2(bridge_slave_1) entered blocking state [ 776.581111][ T3474] bridge0: port 2(bridge_slave_1) entered forwarding state [ 776.598081][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 776.606403][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 776.649409][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 776.664556][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 776.672815][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 776.680679][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 776.707506][T21534] device veth0_vlan entered promiscuous mode [ 776.743730][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 776.778913][T21534] device veth1_macvtap entered promiscuous mode [ 776.817486][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 776.840528][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 777.546895][ T3462] device bridge_slave_1 left promiscuous mode [ 777.552863][ T3462] bridge0: port 2(bridge_slave_1) entered disabled state [ 777.560464][ T3462] device bridge_slave_0 left promiscuous mode [ 777.566466][ T3462] bridge0: port 1(bridge_slave_0) entered disabled state [ 777.574181][ T3462] device veth1_macvtap left promiscuous mode [ 777.580050][ T3462] device veth0_vlan left promiscuous mode [ 779.365514][T21587] FAULT_INJECTION: forcing a failure. [ 779.365514][T21587] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 779.395937][T21587] CPU: 0 PID: 21587 Comm: syz.0.7220 Not tainted 6.1.128-syzkaller-00029-g5145d157731f #0 [ 779.405750][T21587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 779.415649][T21587] Call Trace: [ 779.418770][T21587] <TASK> [ 779.421545][T21587] dump_stack_lvl+0x151/0x1b7 [ 779.426066][T21587] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 779.431355][T21587] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 779.436998][T21587] dump_stack+0x15/0x18 [ 779.440993][T21587] should_fail_ex+0x3d0/0x520 [ 779.445501][T21587] should_fail+0xb/0x10 [ 779.449491][T21587] should_fail_usercopy+0x1a/0x20 [ 779.454351][T21587] copyout+0x1e/0x90 [ 779.458089][T21587] _copy_to_iter+0x3dc/0xe10 [ 779.462519][T21587] ? iov_iter_init+0x1c0/0x1c0 [ 779.467116][T21587] ? __sched_text_start+0x8/0x8 [ 779.471808][T21587] ? __kasan_check_write+0x14/0x20 [ 779.476750][T21587] copy_page_to_iter+0x230/0x350 [ 779.481522][T21587] sk_msg_recvmsg+0x27e/0xc50 [ 779.486043][T21587] unix_bpf_recvmsg+0x4df/0xd30 [ 779.490731][T21587] ? unix_stream_bpf_update_proto+0x200/0x200 [ 779.496624][T21587] ? wait_woken+0x100/0x100 [ 779.500973][T21587] unix_dgram_recvmsg+0x9f/0xd0 [ 779.505651][T21587] ? unix_dgram_sendmsg+0x2050/0x2050 [ 779.510856][T21587] ____sys_recvmsg+0x285/0x530 [ 779.515469][T21587] ? __sys_recvmsg_sock+0x50/0x50 [ 779.520327][T21587] __sys_recvmsg+0x2e9/0x3d0 [ 779.524745][T21587] ? ____sys_recvmsg+0x530/0x530 [ 779.529525][T21587] ? kvm_sched_clock_read+0x18/0x40 [ 779.534556][T21587] ? sched_clock+0x9/0x10 [ 779.538737][T21587] __x64_sys_recvmsg+0x7f/0x90 [ 779.543319][T21587] x64_sys_call+0x171/0x9a0 [ 779.547660][T21587] do_syscall_64+0x3b/0xb0 [ 779.551907][T21587] ? clear_bhb_loop+0x55/0xb0 [ 779.556423][T21587] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 779.562152][T21587] RIP: 0033:0x7fc62d98d169 [ 779.566403][T21587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 779.585850][T21587] RSP: 002b:00007fc62e84a038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 779.594181][T21587] RAX: ffffffffffffffda RBX: 00007fc62dba5fa0 RCX: 00007fc62d98d169 [ 779.601990][T21587] RDX: 0000000000000000 RSI: 00002000000004c0 RDI: 0000000000000004 [ 779.609798][T21587] RBP: 00007fc62e84a090 R08: 0000000000000000 R09: 0000000000000000 [ 779.617613][T21587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 779.625421][T21587] R13: 0000000000000000 R14: 00007fc62dba5fa0 R15: 00007fff58542d78 [ 779.633242][T21587] </TASK> [ 779.704778][T21585] bridge0: port 1(bridge_slave_0) entered blocking state [ 779.712164][T21585] bridge0: port 1(bridge_slave_0) entered disabled state [ 779.719992][T21585] device bridge_slave_0 entered promiscuous mode [ 779.727132][T21585] bridge0: port 2(bridge_slave_1) entered blocking state [ 779.734019][T21585] bridge0: port 2(bridge_slave_1) entered disabled state [ 779.793858][T21585] device bridge_slave_1 entered promiscuous mode [ 780.517345][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 780.531395][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 780.588634][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 780.648697][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 780.666510][ T3462] bridge0: port 1(bridge_slave_0) entered blocking state [ 780.673393][ T3462] bridge0: port 1(bridge_slave_0) entered forwarding state [ 780.682074][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 780.756090][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 780.764838][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 780.782594][ T3462] bridge0: port 2(bridge_slave_1) entered blocking state [ 780.789471][ T3462] bridge0: port 2(bridge_slave_1) entered forwarding state [ 780.895959][T21585] device veth0_vlan entered promiscuous mode [ 780.956835][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 780.986475][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 781.034899][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 781.056662][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 781.064992][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 781.073708][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 781.082937][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 781.090903][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 781.099155][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 781.106603][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 781.120436][T21585] device veth1_macvtap entered promiscuous mode [ 781.166241][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 781.186424][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 781.269428][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 781.308885][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 781.348896][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 781.371256][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 781.577016][T21585] syz-executor (21585) used greatest stack depth: 20504 bytes left [ 782.586702][ T3459] device bridge_slave_1 left promiscuous mode [ 782.592623][ T3459] bridge0: port 2(bridge_slave_1) entered disabled state [ 782.600136][ T3459] device bridge_slave_0 left promiscuous mode [ 782.606144][ T3459] bridge0: port 1(bridge_slave_0) entered disabled state [ 782.613775][ T3459] device veth1_macvtap left promiscuous mode [ 782.619666][ T3459] device veth0_vlan left promiscuous mode [ 783.918470][T21679] syz.1.7247[21679] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 783.918555][T21679] syz.1.7247[21679] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 783.927436][T21678] syz.1.7247[21678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 784.594770][T21691] bridge0: port 1(bridge_slave_0) entered blocking state [ 784.666127][T21691] bridge0: port 1(bridge_slave_0) entered disabled state [ 784.717960][T21691] device bridge_slave_0 entered promiscuous mode [ 784.794517][T21691] bridge0: port 2(bridge_slave_1) entered blocking state [ 784.816014][T21691] bridge0: port 2(bridge_slave_1) entered disabled state [ 784.823490][T21691] device bridge_slave_1 entered promiscuous mode [ 785.273351][T21691] bridge0: port 2(bridge_slave_1) entered blocking state [ 785.280242][T21691] bridge0: port 2(bridge_slave_1) entered forwarding state [ 785.287337][T21691] bridge0: port 1(bridge_slave_0) entered blocking state [ 785.294111][T21691] bridge0: port 1(bridge_slave_0) entered forwarding state [ 785.332556][ T3474] bridge0: port 1(bridge_slave_0) entered disabled state [ 785.341118][ T3474] bridge0: port 2(bridge_slave_1) entered disabled state [ 785.355276][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 785.378332][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 785.411278][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 785.466349][ T3474] bridge0: port 1(bridge_slave_0) entered blocking state [ 785.473209][ T3474] bridge0: port 1(bridge_slave_0) entered forwarding state [ 785.480735][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 785.488803][ T3474] bridge0: port 2(bridge_slave_1) entered blocking state [ 785.495654][ T3474] bridge0: port 2(bridge_slave_1) entered forwarding state [ 785.528193][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 785.539976][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 785.578099][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 785.591543][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 785.599566][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 785.608006][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 785.622795][T21691] device veth0_vlan entered promiscuous mode [ 785.655640][T21730] device sit0 left promiscuous mode [ 785.689706][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 785.697630][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 785.705708][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 785.713719][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 785.829755][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 785.853731][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 786.012201][T21691] device veth1_macvtap entered promiscuous mode [ 786.108188][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 786.121167][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 786.154005][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 786.235655][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 786.245230][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=4 req=6800 state=3 status=67 (errno 11: Resource temporarily unavailable) [ 788.376941][ T3462] GPL: port 1(veth0_vlan) entered disabled state [ 788.385571][ T3462] device bridge_slave_1 left promiscuous mode [ 788.391887][ T3462] bridge0: port 2(bridge_slave_1) entered disabled state [ 788.399512][ T3462] device bridge_slave_0 left promiscuous mode [ 788.405465][ T3462] bridge0: port 1(bridge_slave_0) entered disabled state [ 788.413858][ T3462] device veth1_macvtap left promiscuous mode [ 788.420060][ T3462] device veth0_vlan left promiscuous mode [ 788.425763][ T3462] device veth1_macvtap left promiscuous mode [ 788.431968][ T3462] device veth0_vlan left promiscuous mode [ 789.606822][ T3462] device bridge_slave_1 left promiscuous mode [ 789.612746][ T3462] bridge0: port 2(bridge_slave_1) entered disabled state [ 789.620050][ T3462] device bridge_slave_0 left promiscuous mode [ 789.626083][ T3462] bridge0: port 1(bridge_slave_0) entered disabled state [ 789.633695][ T3462] device bridge_slave_1 left promiscuous mode [ 789.639689][ T3462] bridge0: port 2(bridge_slave_1) entered disabled state [ 789.647149][ T3462] device bridge_slave_0 left promiscuous mode [ 789.653062][ T3462] bridge0: port 1(bridge_slave_0) entered disabled state [ 789.660980][ T3462] device veth1_macvtap left promiscuous mode [ 789.667079][ T3462] device veth1_macvtap left promiscuous mode