last executing test programs: 25.775634262s ago: executing program 2 (id=5730): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x226c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0xfffe, 0x0, 0xfffffffc}, 0x0, 0xc, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) close(0xffffffffffffffff) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES16=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="000000f8ffe60000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x2000006b, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000240)='\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x861b, 0x0, 0x0, 0x41100, 0x72, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b70200000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x8, 0xb, 0x80000000, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1200000002000000042000000600000000000102", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES8=r4, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00'], 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r8, &(0x7f0000000200), 0x20000000}, 0x20) recvmsg$unix(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000a00)=""/245, 0xf5}], 0x1}, 0x0) sendmsg$inet(r6, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) 24.945833562s ago: executing program 2 (id=5733): bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) (async) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1e8e8502d1daf3253762250fdcceab1700000000ffffff0000ff011000c90f", @ANYRES8, @ANYBLOB="0500"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0400000005000000040000000600"/28], 0x50) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[], 0xfffffdef) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x14, 0xf, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000800000000000000101000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000140000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b700000000000000950000000000000000"], 0x0, 0x5, 0x0, 0x0, 0xc0f00, 0x20, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x5f, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_clone(0x24001100, 0x0, 0x8, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) close(r2) (async) close(r2) openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x10000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='xprtrdma_inline_thresh\x00', r1, 0x0, 0x7}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='xprtrdma_inline_thresh\x00', r1, 0x0, 0x7}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000400000000000000000000008500000041000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r2, 0x18000000000002a0, 0x8, 0x0, &(0x7f0000001240)="b9ff03076804268c", 0x0, 0x4068, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r3, &(0x7f0000000980), 0x20000992) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) 24.797432265s ago: executing program 2 (id=5736): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x20, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x7ab046, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e00082b0000000003000000040000004a0000002236d94c7725cec6be549165b80d6ba5c709a8321507706a3263cba455fa80be379c5c3622b300010000000000002c4525fb2d3d2774f69d613efb7796cf7b2d282322f8039a6d78dc8db8505d7d9fb540bba8d05ec41e7080ff22cbb31885b26ed16b8ecea086718753b9fe597a0b020a7966f981fd80c048a18abee382b4c61964b5a93903a66348d3897c1e8dd958dcf438", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0100000005000000040000000500"/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02b6a4e6fd8400"/20, @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000004000000000000000000008500000050000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)='syzkaller\x00', 0x5, 0xfd90, &(0x7f0000000300)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f3, 0x10, &(0x7f0000000080), 0xfffffffffffffc79, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) r4 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) write$cgroup_freezer_state(r3, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r0}, 0x10) 24.414086568s ago: executing program 2 (id=5742): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)=@o_path={&(0x7f0000000240)='./file0\x00', 0x0, 0x4010, r0}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000880)=@o_path={&(0x7f0000000440)='./file0\x00', 0x0, 0x0, r2}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000d66890fc2fcce466c4a471", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000009c0)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000b40)=ANY=[@ANYBLOB="180000080000000000000000020000004460400006000000950012d0ce281731354681faf6d11d1f611e4eb3bd72d1e8f1467595fd7c2e7794f902bfd12761e58920e89ecec0e7629d53891ce21d0dfea602cd853ed4a940dd8cd0564e38a9a1cebf1eacf7a2e4f453dabda8073615907ef0b1a4b723c172bc6c2e0b08da4a1d0f09c1f5cc2ef16343454f649bde7c9ad4782b6270bc9b3e472c6b50b5a6700ddd40"], &(0x7f00000002c0)='syzkaller\x00', 0xcd792399, 0xf0, &(0x7f00000005c0)=""/240, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x5, 0x2}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000900)=[{0x5, 0x5, 0xb, 0x1}, {0x0, 0x4, 0x8, 0x8}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0x0, 0xc}, {0x0, 0x5, 0xe, 0x5}, {0x0, 0x5, 0x0, 0x6}, {0x0, 0x1, 0xe, 0xa}, {0x1, 0x4, 0xf, 0xc}], 0x10, 0xf8e9, @void, @value}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) getpid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_freezer_state(r3, &(0x7f0000000180), 0x2, 0x0) r5 = openat$cgroup_procs(r3, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000000c0), 0x12) write$cgroup_freezer_state(r4, &(0x7f0000000400)='FROZEN\x00', 0x7) write$cgroup_freezer_state(r4, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) 20.7361987s ago: executing program 1 (id=5773): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000160000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='mem_disconnect\x00', r1}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, 0x0, 0x38}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000002c0)={r3}, 0x69) 20.725181341s ago: executing program 1 (id=5775): ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000009c0)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d649379071c33390e418ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a394848ffa077faa55c59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afcc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d060ab186d94af98affb87b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab2e4b380a00d72bc0480f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea508000000a0c548552b571bed5647323c78a996810000000571cbb17d9f37282462f0e9c147c0d497c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526890aa7fe5e68949a3b30567e54d3504723177d356c4604bca492ecec37e83efceefd7ca2533659edc8bef9cb85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbb080000004ffcebde1d9d3d350000000000000000e0c504814393cf96bef209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e5a61561a9845e4ff29e2bdb1d0b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3c72208ec651cc0ae637fa474816bc59d2e2a00092419304b338a982c7e9d3044d856ce24f370030be3b5f79f030b8d3ebce68663ef5af469abe753314fae31a0445859a5ece8fb11a4ee8e46354c9c3a041a1e7b55c4e81dba1e12289ee34463aaf28345bde0c195bc9f022ca8ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a0600adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa7000008000000000000117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae5065b408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cd50feeb7bfad9b7be3283b6450d264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5631820420b75b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe5273405aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348cc2116473381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d174b0000000000000000000000fa08ad0731ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282b6caa2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae0533496b6d58da50ee80a6b9a7438978c5465113f668eb4484350048289d07dbef325d322781e3214c2a3dcf89d99844b762a9cf17548c54fccad2c7ae8072b82e0880815daf966bd5343c1635e123f868a7167cfcff33320253af570f4ef9c0254afdd89ac3943562b530dd88da8a94013bbaf204bebc38055adc39f07f7c22711f4d1f6dcc928d1578a093c072e0b92babc76f47ee367e745a024a2278319d9a4d1378482b74c516647652bfb6e93002494a5cd74e2a9a4734487062437da23e1efa6ef7674108aaa3ffac859c3577c2637bb3bdc69bc365b1f20dba96b8acca62f3f80045318de0dacf2ed44b814e842c2a520159bb6c320cec0910c0b8bd3d547bdfba2e0bb24d117ed0388afd37affbad2f9c77c9c1314a16ffe64f5e3744a2fffd7039670f5706e589a4c3868db06fd892d68a547477f8ef686ff0dba7b8c18c94d5a89b0567a851750a35d9cc200000000000000000000008f4cfc20fab26463ba9556904407e8e4509151e30a9b155674d8467c416f7cd1a99031f1e50f44edf65db143e8e0aa7aa459a76698d473e3d7589ec713eb59b68efe49a632bffd9e338af866fd33daa218a20ffc17c58df85f6d081a17f0702cb2b3449dc9d03f7f124d7c5d75f050860eda7d9b084e919dbd16d60cffb9c1111b28941985d35bc7ce5bdc04c1ef84a9d5f4b531bf88efdf6ca6fdb4e6187c231cee39570020916f5617c795eb2e9c5c15312f3adcca9522ddc6c268d635430086d1ac3a99b37a140a5a2ff36cc82bb7917b4a1a00a218ea6fd47df98c9a500dcea3e1d0355ae5c14651e60021db00000000"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f00000014c0)={0x1d, 0x0, 0x0, &(0x7f0000001340)='GPL\x00', 0xa9ba, 0x77, &(0x7f0000001380)=""/119, 0x40f00, 0x54, '\x00', 0x0, @lsm=0x2b, 0xffffffffffffffff, 0x8, &(0x7f0000001400)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000001440)={0x0, 0xd, 0xff, 0x1}, 0x10, 0x0, r1, 0x0, 0x0, 0x0, 0x10, 0x368e, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000177f74179b4a4a4066487a8327a96871d5fcffffff18130000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x401, 0x0, 0x0, 0x41100, 0x47, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x2, 0x7, 0x3, 0x8}, 0x10, 0x0, r1, 0x0, &(0x7f0000000980), 0x0, 0x10, 0x1ae54, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = syz_clone(0x812080, &(0x7f0000000440)="9ed8216c8a7ea263cc0d02b12305f86dbc8997dba2f3324b8c95db802f637745d74df22a49b5556836323e29eee07814aa6ba614bf897208c166e50f372935dca66bf0fbba0daf7eaf761b67ff7f900d404dae146d79e7d2549ddf4ccdbbdf0065062dd4", 0x64, &(0x7f0000000400), &(0x7f0000000240), &(0x7f00000035c0)="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") perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x2, 0x7, 0x4, 0x7, 0x0, 0x9, 0x600, 0x9, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7, 0x1}, 0x2, 0x0, 0x7, 0x6, 0x80, 0xba, 0x9, 0x0, 0x68d2, 0x0, 0x9}, r3, 0x0, r0, 0x3) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='net_prio.prioidx\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r6, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000640)=[0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0], 0x0, 0xc5, &(0x7f0000000780), 0x0, 0x10, &(0x7f00000006c0), &(0x7f0000000800), 0x8, 0xb8, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x6, 0x4, 0xf1, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x6, 0x0, 0x0, &(0x7f00000003c0)='syzkaller\x00', 0xc00, 0x1000, &(0x7f0000001340)=""/4096, 0x100, 0x7, '\x00', r7, 0x25, r6, 0x8, &(0x7f00000009c0)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000a80)=[r6, r8, r6, r5, r6, r5, r9, r5], &(0x7f0000000ac0)=[{0x1, 0x2, 0x5, 0xa}, {0x1, 0x1, 0x5, 0xb}, {0x3, 0x4, 0xf, 0xa}, {0x1, 0x5, 0x7, 0xb}], 0x10, 0xdceb, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0xd, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x4564}, [@map_fd={0x18, 0x0, 0x1, 0x0, r4}, @printk={@i}]}, &(0x7f0000000140)='syzkaller\x00', 0x9, 0xf6, &(0x7f00000004c0)=""/246, 0x40f00, 0x10, '\x00', r7, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7, @void, @value}, 0x94) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 20.637219599s ago: executing program 1 (id=5780): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x20, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x7ab046, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e00082b0000000003000000040000004a0000002236d94c7725cec6be549165b80d6ba5c709a8321507706a3263cba455fa80be379c5c3622b300010000000000002c4525fb2d3d2774f69d613efb7796cf7b2d282322f8039a6d78dc8db8505d7d9fb540bba8d05ec41e7080ff22cbb31885b26ed16b8ecea086718753b9fe597a0b020a7966f981fd80c048a18abee382b4c61964b5a93903a66348d3897c1e8dd958dcf438", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0100000005000000040000000500"/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02b6a4e6fd8400"/20, @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000004000000000000000000008500000050000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)='syzkaller\x00', 0x5, 0xfd90, &(0x7f0000000300)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f3, 0x10, &(0x7f0000000080), 0xfffffffffffffc79, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) r4 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) write$cgroup_freezer_state(r3, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r0}, 0x10) 19.820355878s ago: executing program 3 (id=5796): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0], 0x0, 0x88, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x6b, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000004c0)=r1, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="1700000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB="1000000000000000000000000000000000000000c4b28ed433518bdbd5e5ef8d603a69ecee581650c79e1c7c1507377a2d3841fcd2cae7c59f69fe1b197cdf117eceed3fecefc9de5206e1b43d015d", @ANYRES32=r0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r3}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0x1c, &(0x7f0000000b00)=ANY=[@ANYBLOB="180800001b000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b706000014000000b7030000000d00008500000005000000bca900000000000035090100000000009500000000000000b7020000000000007b6af8ff00000000b5090000000000007baaf0ff00000000bf8700000000000007080000fffdffffbf2400000000000007060000f0ffffff740200000800000018260000", @ANYRES32=r5, @ANYBLOB="0000000000020000b7050000080000004608f0ff76000000bf9849f0ba0d8e8b475ee200000000000056080000000000008500000005006ba3036746896d1300009500000000000000701c816336fbd84256d476be873c6048f71ba1a6bd4438f57cbb3f2b53fcc48342da27d409038a24ac279b956321fb5715b40e7ab1910888012eecadab9cf02f74e0d29762f24857cee5417159c27914c3972c195812686ca88f0829af4ecdfaf416d9ea123e02e7e1774dfc6442"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000790000000900", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="06061e0000000000000004000000ff0000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32], 0x48) perf_event_open(&(0x7f00000009c0)={0x2, 0x80, 0x47, 0x2, 0x3, 0xe0, 0x0, 0x9, 0x200, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000900), 0x2}, 0x14804, 0x2, 0x1, 0x4, 0x81, 0x7, 0xc7, 0x0, 0x6796, 0x0, 0x1000}, 0x0, 0x3, r4, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000070018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="a53bf6c79f10394b4e9704006d05000002000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000500), 0x0, r7}, 0x38) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r8 = bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffff93) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNGETIFF(r10, 0x800454d2, &(0x7f0000000040)={'pim6reg0\x00'}) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001680)={&(0x7f00000013c0)="c9fe36c7bef4e157edf7992c3929594933a538290115428e8c1f211ae0419652faccb159a425c54aca52ccf35644126ecdccd227a59188e4f94a5591f5b3d418ead75444a2ac73e3b177ff8ccc902da683b3c583b6f2acbc1e01b34ac3869e319b6f654a658ca11bc9ad0cabe890b58e8a0bed032e47bced9f1d2385082feefd416787e5031b9f", 0x0, 0x0, &(0x7f0000001580)="00341a0c52aad205e9af020f6b9bc6d4ef5df1666027e76802fb4f33515f30a31816b239b931be351cab1ae385ef4ef9c24d73e737cf9961db6d80bd7c19bef8f31a3c992bd2f51c0d38f49421b5b0c5193b4cf91f0d134f6cce73be55cc7b1da02e3f77bea7973c37bb4022f5fcab7b6fbc7bcf0e", 0x80, r8, 0x4}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r11}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 19.527837663s ago: executing program 3 (id=5798): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000160000001811", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='mem_disconnect\x00', r1}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, 0x0, 0x38}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000002c0)={r3}, 0x69) 19.515753274s ago: executing program 3 (id=5799): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x1, 0x40, 0x40, 0x41, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000180), 0x1003, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000b80)={r0, &(0x7f00000014c0)='o', &(0x7f0000000b40)=""/31}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x7, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x18, 0x32, &(0x7f0000001780)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6c}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffff1}}, @map_fd={0x18, 0x5, 0x1, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x7}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x57}}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @jmp={0x5, 0x0, 0x0, 0xa, 0x8, 0x10}, @exit, @btf_id={0x18, 0x3, 0x3, 0x0, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1}}]}}, 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001340)={0x0, &(0x7f0000001480)=""/167, 0x0, 0xa7, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x18, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000045000000000000e3030000001b3af0ff040000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0xd, 0x24, &(0x7f0000000240)=""/36, 0x100, 0x1, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000001540)={0x3, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=[r2, 0xffffffffffffffff, r2, r2, 0xffffffffffffffff, r2, r2, r2, r2], 0x0, 0x10, 0x2, @void, @value}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001300)={&(0x7f0000001740)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000000000003000000030000000000000000000006040000000000000000000001000000000000000000"], &(0x7f0000000300)=""/4082, 0x4d, 0xff2, 0x3, 0x10000, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000040)=""/155, 0x1000000, 0x9b, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) close(r4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001a00)={r4, 0x0, 0xe, 0x2b, &(0x7f0000000900)="ed0f1ed7030d921b61316411b673", &(0x7f0000000940)=""/43, 0x8, 0x0, 0x800, 0x0, &(0x7f0000000980)="c873d5f5904a6325d7ee6b63ecf4f7340dbd7541333ec9c7d8fef9b3216fba36bbf04c4327f8932b910f6d4659f04b4aad15d873fd245469505d4f73bae09e0c35a685e2ea7fdda00d0c1bf6ba894b43333d3405264cb5b80f65d8ac72185ab9986cc319eae34363d54a05867753f94e5c175a34b255f01dc43c7ea36bedc79a57fc54c8eff3064efbfeb5ecfae30fda0ea299e5e993e12b7cab73c19ba2abc6fc17fb2e74235c4bdc0d0cf7bc87439256bbc9c31ddbec239a6320cd6e37c1649c99e2920faa59d3ed6ff0b551e3b70f977e7864de19b308f7a5c3d84a153fe6109e9c76ca820b1f4752a075f7cc504c5fac1ff4f4fffa05897148cbb814bbf9877ace8f3aa143847dc6f86233f5fcc8094919bad3324b19a852cfe0bb6c99181f9c2aa6f0e9b1eff3af49c0a044f6ac94bbd613c17fa1c6b83bd415536f94ccaf9feb7316fbd60544935ffb18cc13956457f803a207764f7eb18ef5f61eb84934066dba7889ea74e375f0539e5e58f9bad3c808430dc6ec979609211516c3fff1c66c322324570821a7e7aa28e9a7484bd51ae4a91da7b7408ffecb89ff0d6f86328a6f58817a283d137abfedd834af9f50792f1d3ff57a4fd9249659bbb80c88742762b90c24392b2825faf10e64616f9254ac2625594a9f6aa396b686522d8b8ee8906609b835d55391b8142b7226a5342f6e63756c203a040fec3f0f2d12b82e460743c7cdaee5b696fa10e1c588a2ff9603e9a99453e44b1b6e13117c71eef01166c0eacb2880086aedda1b1103baf8eaca9d5be2c849fc7ae4fd2dfb5b498b016d47498e8fd6d712d822e68af5fe13b1a1e698c2026bf7d0eec7a5bbdc08394c884e062d4d3eea157beaee53c607aa48a0f84150c373dd2811c3589413e90717f001d73858fc04dc631160617115ca396957778da765711ba18ac6f5dceed1b8046487beb5c35b86b854d54341acbb38b0bb0d39898e15bfecd74891cd1b636a641260a2cbc5555f9be952091524e2a8d9b8a929e976a9cc90e7b8a8bc5ec35b439f2d74554854579e7ac56161cf2473d123483535e148152c5bbff16f3ea063a392c0c1482d46fbcb7483a183ce81f264e32fea671205830531d24661218592a6ad437c82c3d4016d52cb2113f06755f07f73f3c3ce43e0b4021a0121a1576fb54ca97b291bea7171b04d795b076980f66c414e18001ea2cbecdedf1170cda3eb432a1d40c8645a03e3c46dc42622f41fba9920d5a00dcad0e7830672633250388aaa314472bc9ec956b90429cec01bd870a39df194d01a30d2a52d1110003d50652e7dd23bc46d346e9e5c5a34e6d55b0cdad73d6652517cd70d1f78471a75b039a6821dff7e695e4b30414ca1e36cad71d94d3a61cf7675b2ad52fbdb9015cbfe0fb14b905d53f4798e01f49178a8056047e4b5e5471fe19d8735e7945994cc539d7072495b0802048f6f91bfb7d081e3873a102252dc54872d8f29f7f5e4ab700868159037ff75139634b5f37531b8cc078d1ced666bb7f4a5f8aca2d8f7bcf938a9c9165ffcf4df7540a656d1c5d22bb9c9b52e2bd7b180de60318a4e70c4bd39ef33cf9718b2adb166821107d08d95d87e028be4d36e1460355cb53788b50a85c2a0de0afaa5ebf887c16a4efcee946c737a40eca19bf652144eb5d02e6222ff3274c8a7a83d165d9b2c24c1a224e92830e9c90bb334d9297a6594816f2361392815277ccd3b6a2ad4272290ba6df28a69f6fa27902cb6e0442b54b8d46d84aa32493e3e3287d6131e67c515fa6c438bb717bcacffdebb6f6befc64a7d0c8d1efca8106bff74b7e0c8e2a2cc0a4fda8d27ff880948e04a965d8af5291ce2e28553ff6582edc6a79143b30ba0cf9c559af1dfbf5cc7e72ebc5292794fb8d1e5405cd6704504e57d5506c8d016aa1a052e6e8b112c8b57b4d1e47f47b9745792ec02f7fc29f74c3422612eb37cb254f3a8a10139529c4a85f3128707a3ad7ed0125b41d68d522539367426c30b280828fe4890e4bebffdbfed1a2918d90349980f968f65b25d51e96fae1cb735c69aa3711733926b72941bf66f0bf9c8ade64e0668f94d240e96f947eea08789a129bc820fc822f24cb4bf709c375973c8451823cfdcb398f1e6e6bb0912eb6f914410229bc619596e052d04252e6802665f9ac15ef2dc29e06d7c17ca9fd69ba58ae7645c63fa62e7d782d65910fc187d44f65daa267df16794108ce2fe6e61d78dbc2fbfb5cfdcf79f73fa8c1e44206ccdac07e5823d125140762fb0e40b22541918caf6411d9026a26cb23d9b2264e2fdb876a1b7e61a2e90e72362a336173b57dfcdfd2449d97d7e79c44c59239728225c5cbe313938c8b0e0b9a906fd395b7a855e2e48a7414547cb31e216febbc72140d2c75ff0e1b39e72009470faddac2e0261c5c4ba3c64de3049a1386a28fa83d493a4e7caab1e204681788012ca5542becd09f4de219223f62fa3a3d8103eacaf7f22edd31d9738ad4732078555625cb18b9e10c85434e738fb0abfe219d2b4434296636ec2978563c9304af00b264f88cbaa28fd8f5eb997f77c5e2146be07c40f7983dfc89e510156fd7ba1b68670cf6053a54e0e1e1d7454b737b742ce5c38ee78fef30164cdb3916252343f8daf59631fa22e3cf10cb0e11f762e882ee238147206ac1d04dd833594e0672cb4bc8adf7529c02ffa792644ae57cd52fa1ddd32cd62a6379f2510bc7857f9f2337ebc4e3b7d8d0020f66c324b2356b60a41bbe2349e8dac27c29dd2fab22ca8d5cc50ae5dd98b7c396870577fdc2a6f353f1a0459c1eeb1889900917854b51c7ced2b7595de3967f5a31459098024c0492654190edf813147cb596b5567ae001867aaf81007ac921b5725c7714a", 0x0, 0x7, 0x0, 0x9}, 0x50) 18.602343251s ago: executing program 3 (id=5805): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1f00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="1801000000050000000000000000ea0485000000d000000095"], &(0x7f0000000a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x18, 0x17, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x101}, [@alu={0x7, 0x1, 0x8, 0x3, 0x9, 0x0, 0xfffffffffffffffc}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffff9}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000000540)='GPL\x00', 0x18000, 0x87, &(0x7f0000000600)=""/135, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000009c0)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000b40)=[{0x2, 0x3, 0x7}, {0x3, 0x4, 0xa, 0xb}, {0x0, 0x1, 0x1, 0x9}, {0x5, 0x5, 0x1, 0x1}, {0x2, 0x3, 0x3, 0x2}], 0x10, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a80)={&(0x7f0000000440)='objagg_obj_create\x00', r2, 0x0, 0x9}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000000000000000000000000000071100600a2ebe19a1f6a04a4000000005cd751e3a4d8630af90bda762269998f4a4a36e8af1607106304c62cfff2e7d860c154cb81dacca0d99be07f7d223daf6f51f3eefceef817ce00fd9d50ff8743712d8a8a06b0ab06c5e0d47d49618cade2c1648bccfd7d5596fc2cb0bdbfed27e03d4f8f98f3b411dce6ae77f6bc1168bd483d8e4fa30d1b8afd3bf7c8a40fcacda8f2186a0f987739fff01a2091fa4f1254b1cf81b95a23a58ba9c2bc51969244fe32fe7a3ab28fb7c30900"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr, 0xffffffffffffffff, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00', 0x800}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0x1, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r4}, &(0x7f00000002c0), 0x0}, 0x20) gettid() openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0xeb, 0x0, &(0x7f00000008c0)="982b2cebba66dd9f6cfaa1ebec0f39d07e5e3c14be4749922b41c58c3534b8cb97d7956950e87e147e60e00c682ac7fd5f48fd5881b4679e0128425e732a537757e2b2d8b0a0120f08f1f242b02e6cc7ca54acdaed395d08e2790ca0c48dd3633c54c865a486ee2cfd4ce6482866700ac66e909ce3c3f8e94dcb05000000560398264697f1e8152685acdb08265f338eeaa8425d1a9443187ac75728de4439b655ae0b9d4fc6052e46e0d19cfd14146c36f255c4ba4ca208c53d1de3ab8b4dc36893a4e8c97aa9392a45926960c50de331c39fa450e44bb5f527728d2adb4dbe5e3ad65f5a63e3ed500962", 0x0, 0xa1b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0x10, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000007b6409a92363fd04000007020000f8ffffffb703000008000000b7040000000000008500000082", @ANYRES16=r0, @ANYBLOB="0000000000000000b702000000000000850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 18.588033162s ago: executing program 4 (id=5806): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r1, 0x0, 0x0}, 0x10) 18.536750317s ago: executing program 4 (id=5808): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x5670}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0000000024000004000000000021bdfcb3ed714d00000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$tun(0xffffffffffffff9c, 0x0, 0x40, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={&(0x7f0000000780)="5d7e70487eef7d97c5c0d33aa5e4afa1718549dc21ad35f5669b8c3bbcb8d165ea609c24b55a9df18cd76ac07b38d6bea580fb2f3af321870b49b23de85a72904057e00426b7ab", 0x0, 0x0, &(0x7f0000000a40)="f521f0f1b98b354395cff5141e8f8768e94b5524b021a4fb9391f25dae2040567d763c72a0c9db1e952065cb2f22db5fc6c23c66aaa49bc7461a7705be7c241b620b313cd3a43c6737f423adf619b3", 0xaf, 0xffffffffffffffff, 0x4}, 0x38) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="0100000004000000030000000600000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000080000000000000000000000000000000000000000089e880e9e00a59e515b7fd9fb84b7b948a1ec355bfb799c94b3e7864eeb613d45c3d199b192cd131d822"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x3e, 0x0, 0x2, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x4, &(0x7f0000000bc0)=ANY=[@ANYRESOCT=r0], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000c00), 0xc}, 0x15243, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1f, 0x1, 0x2, &(0x7f0000000680)) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x8, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x49) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000ac0)={r2, 0x0, 0x9a, 0xab, &(0x7f00000005c0)="a2f49573623379f2bc3c2241942e8c741c885773b99287f8b7e0798a9ba71b3aa26316124a313abe1bac9a8b2f536b5f0c30edb342109a0cb2e04456efa682283b687c89a50bf5cac3988975790ccd5551486210a78d4702707b518fc8d1f25af34cc9678d2e0883ed38236a6d2dbd668d9ebcc837dd842f7f265fab4a3da12b1610e60f14251b51dcef953a290f16b5f900afecce1c6ba8bfcd", &(0x7f0000000800)=""/171, 0x8, 0x0, 0xbd, 0x1f, &(0x7f00000008c0)="ddb951d6c9bda6041ecd44751f385fb6cb43354a553bcf6244c9979d5f4428cc0b0529a8db54b45fc35e516533df887998eaac32d2c18bd7fae6c395f67e09dd7becbe918902002e10f6fe1d0cafe91ef46127e6354b92c741af204f1b535b3126ac01e38c125b8f78d2b31eb8bf28a632c003de1a554148fd13f02fc8b219c6bd482a3a8a9efd0309ed7627e9bd15ee970b00494b6de8a9d2665196493473bc0335ba855b0b1d4f701ff20413453b663fdf01f33cf58699caac99feee", &(0x7f0000000400)="a409ec3de2e6eaf058f3cacd706236d01f6aec91737d70a3eef0252b214bca", 0x2, 0x0, 0x462}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x13, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) 18.126730381s ago: executing program 3 (id=5810): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r0) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffe0f, &(0x7f00000001c0), 0x2}, 0x12) (async) recvmsg(r2, &(0x7f00000001c0)={0x0, 0xfffffffffffffe0f, &(0x7f00000001c0), 0x2}, 0x12) sendmsg$inet(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x22fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x37, 0x0, 0x2, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000740), 0x3}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async) perf_event_open(&(0x7f0000000380)={0x1, 0x37, 0x0, 0x2, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000740), 0x3}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) syz_clone(0x1010000, &(0x7f0000000180)="71b8a0ff711896927bb6998ca99b3a27b10a", 0x12, &(0x7f0000000200), &(0x7f00000002c0), &(0x7f0000000780)="0a0470669b6fa34be933af57d55326a6375d753886d8cb30ef985c3c1cd9f930f5e04e5d165f442e4e7e73e4caf333963253dd7465c8e7beee4969376634707399532f4b943b7efe787989815b66d17e8abca33bc108a11329ba6b684e1f88a21f2f84a7614b6be4a047848b295f037a765e909d009f2c76ec5220f3d111d7a3b95f37ed866464910f73f90399ed03cd0f1e6fe91743fe9a6e1cb22625004a2631e2534fc19062652986973d126b71db791feaba37958d36d1b73ae0100ff3c5074a0a2a6ca04c06371e9ff348e9d009b3f6e4e824c0de74a7da8755211d2fa48ac2efa5") (async) r5 = syz_clone(0x1010000, &(0x7f0000000180)="71b8a0ff711896927bb6998ca99b3a27b10a", 0x12, &(0x7f0000000200), &(0x7f00000002c0), &(0x7f0000000780)="0a0470669b6fa34be933af57d55326a6375d753886d8cb30ef985c3c1cd9f930f5e04e5d165f442e4e7e73e4caf333963253dd7465c8e7beee4969376634707399532f4b943b7efe787989815b66d17e8abca33bc108a11329ba6b684e1f88a21f2f84a7614b6be4a047848b295f037a765e909d009f2c76ec5220f3d111d7a3b95f37ed866464910f73f90399ed03cd0f1e6fe91743fe9a6e1cb22625004a2631e2534fc19062652986973d126b71db791feaba37958d36d1b73ae0100ff3c5074a0a2a6ca04c06371e9ff348e9d009b3f6e4e824c0de74a7da8755211d2fa48ac2efa5") syz_open_procfs$namespace(r5, &(0x7f0000000300)='ns/ipc\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a6, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400)={r4}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400)={r4, 0xffffffffffffffff}, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000b80)={r6, &(0x7f00000009c0)="2866043a935eadc1939915329fe95962904c0a5f4fd58adb2ae2eea0556be4b8a54a36bb2d1e453a496ce37069406f2640f5bb082b2891c78e9833b176a824052c596bd4e6c0a6d6cada6e014ebd1a2ad4d3295834d03b004c8d7a2b0b4e42d74150b1e35db34920bb38aa2355170da129f640f23a1e789f6e4ebd270964bf79a6077e652bb9bb8f86f52582d5231c512b98ae8ad8a67b32d4665b6154d93e6746e8f8c56291ab568ebbc15a2f5bb6d15f1af66f13d1f128f27d232ea88e47012d2165d9b5c4eaec04ae480aa0b8401ccfb41ae4d654c89b61ed64c81c4a8c1f0a42c0", &(0x7f0000000ac0)=""/145}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000000000000000000000000000000000f010c1a02481fe8299107ab0ab69b4fbe0bbd82eca2077640c0c6f5eb6fe5de80dd526f981e2ffc4044b13f28d2878a3edd346ead47b3d1ba92c2e10c9eec252828734dd4a2fe11fa4a224dc253217bb7db5c98c7d8cf760eeaa2afd69bd46ee8c688be32909733e2f603c2d9e0d08f4705f8b955a8eebf18cde9fd1557e79afd937ed91b2da2cd34a3dde288f2864c23ddd55f4ba989c94c40177ee12cb87440b15d098fe6df289ec1ebe2fdf0545ffbd6bc49491d9a7a9dfb97c032857137b4dcb58ab9c3ce5844f04888c20a21ad31b45c28bec0721b5c5000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@volatile, @fwd={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000540)=""/228, 0x36, 0xe4, 0x1, 0x0, 0x0, @void, @value}, 0x20) (async) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@volatile, @fwd={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000540)=""/228, 0x36, 0xe4, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, r7, 0x2, 0x3, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, r7, 0x2, 0x3, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r8, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0xc03}, 0x1022, 0xe76e, 0x0, 0x5, 0x0, 0x0, 0xfffd, 0x0, 0x1, 0x0, 0x4}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) 18.110379823s ago: executing program 4 (id=5811): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000160000001811", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='mem_disconnect\x00', r1}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, 0x0, 0x38}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000002c0)={r3}, 0x69) 18.100804384s ago: executing program 4 (id=5812): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b08000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="ffffffffffffffff080000000800005940000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1fd, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="020000fe030000000400000008000000000000002c81cd6503b0ea00d87f747000677bece41e7793b3b191b670bbc928e490e083093395653dcea7add820a56de57c3e4e4affbb0500ca701f9aad078e40365bff991409d4c4444d09698252b5aedc33a6c4b99af1dc61c51f5851d8eeee5b29fb6a9df848045082a854407750d9a1ea0cc74f20791324c21299fea4a00bd497f0531fc8b0236b39145cbff447371eb9a2245a3b1b3a552f7e5ad8a4e09e69f5f38a146b97c1e4be930945eead69cc", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="000000be3a00"/25, @ANYRES32=r0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000ffffffff00"/28], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x1ac81b, 0x0, 0x0, 0x0, 0x1000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8, 0x0, 0x0, 0x1010000}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0)={0x0, r2}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000340)={{r4}, &(0x7f00000002c0), &(0x7f0000000300)='%pK \x00'}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r6}, 0x0, &(0x7f0000000040)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r5}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) 18.019036751s ago: executing program 3 (id=5814): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000740)={&(0x7f00000000c0)=@abs, 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000340)=""/150, 0x96}, {&(0x7f0000000400)=""/142, 0x8e}, {&(0x7f00000004c0)=""/118, 0x76}, {&(0x7f0000000540)=""/159, 0x9f}, {&(0x7f0000000180)=""/48, 0x30}, {&(0x7f0000000600)=""/178, 0xb2}], 0x6}, 0x2142) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0xd3, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r2}, &(0x7f0000001d80), &(0x7f0000001d40)=r1}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x20a1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x2) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r8, &(0x7f0000000140)=ANY=[], 0xfffffdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000040)=ANY=[@ANYRES8=r7], 0x0, 0x0, 0xfffffffffffffec2, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe06, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/11], 0x48) 18.018481181s ago: executing program 0 (id=5815): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x10) 18.017171921s ago: executing program 0 (id=5816): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000bb00000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x13, &(0x7f0000000080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x800}, @cb_func={0x18, 0x5, 0x4, 0x0, 0x7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x0, 0x10}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1, r0, 0x1, 0xffffffffffffffff, 0x1, 0x1], 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000400), 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000006c0)={@fallback=r3, 0x3, 0x0, 0x3ff, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000480)=[0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000008c0)={r6, 0x58, &(0x7f0000000a40)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r6, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x18, 0xf57, 0x0, 0x3ff, 0x0, 0x1, 0x8, '\x00', r7, 0xffffffffffffffff, 0x0, 0x0, 0x3, 0x0, @void, @value, @void, @value}, 0x50) r8 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000880)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000840)={@ifindex=r7, r4, 0x12, 0x2003, r2, @value=r8, @void, @void, @void, r5}, 0x20) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0)={@fallback=r0, r0, 0x1d, 0x2000, r1, @value, @void, @void, @void, r5}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000bb00000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x13, &(0x7f0000000080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x800}, @cb_func={0x18, 0x5, 0x4, 0x0, 0x7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x0, 0x10}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1, r0, 0x1, 0xffffffffffffffff, 0x1, 0x1], 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) (async) close(r3) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000400), 0x8) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000006c0)={@fallback=r3, 0x3, 0x0, 0x3ff, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000480)=[0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000008c0)={r6, 0x58, &(0x7f0000000a40)}, 0x10) (async) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r6, 0x58, &(0x7f0000000280)}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x18, 0xf57, 0x0, 0x3ff, 0x0, 0x1, 0x8, '\x00', r7, 0xffffffffffffffff, 0x0, 0x0, 0x3, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000880)=0xffffffffffffffff, 0x4) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000840)={@ifindex=r7, r4, 0x12, 0x2003, r2, @value=r8, @void, @void, @void, r5}, 0x20) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0)={@fallback=r0, r0, 0x1d, 0x2000, r1, @value, @void, @void, @void, r5}, 0x20) (async) 17.893718261s ago: executing program 0 (id=5817): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, 0x0, 0x40, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) (async, rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) (async, rerun: 64) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) (rerun: 64) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) (async) syz_clone(0x41000000, &(0x7f0000000280)="83350ee7ed57f66b9c3e535853a9dce34a924eed63f17b86fc8af39dc71da223405ae84e7680a3205d1d6066e60557b9e278b8848ef684be5cd74197512e0cf3702fdc64034ff597f66cf0c9522031f1e1", 0x51, &(0x7f0000000000), &(0x7f0000000380), 0x0) 17.682424579s ago: executing program 4 (id=5818): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='fib_table_lookup\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r1, r2, 0x2, 0x2, 0x0, @void, @value}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r7, &(0x7f00000004c0), &(0x7f0000000540)=""/10, 0x2}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x503}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f2, &(0x7f0000000080)) 17.632784993s ago: executing program 0 (id=5819): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r1, 0x0, 0x0}, 0x10) 17.631366834s ago: executing program 0 (id=5820): bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r0, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xc2, &(0x7f0000000200)=[{}], 0x8, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0xf5, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r4}, 0x0, &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) openat$cgroup_ro(r0, &(0x7f0000000500)='cgroup.kill\x00', 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@bloom_filter={0x1e, 0xc, 0xc41d, 0x3, 0x1, r0, 0xfffffffe, '\x00', r1, r0, 0x3, 0x4, 0x4, 0x5, @void, @value, @void, @value}, 0x50) perf_event_open(0x0, 0x0, 0xe, r0, 0x8) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0xfd, 0x5, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000480)}, 0x1240}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) 492.635949ms ago: executing program 1 (id=5822): bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014fa0000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000003000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x97, &(0x7f00000001c0)=""/151, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63, 0x0, &(0x7f00000000c0)='\x00', 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair(0x2b, 0x5, 0x2, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mkdir(&(0x7f0000000000)='./file\x00', 0x0) mkdir(&(0x7f00000000c0)='./file/file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file/file0/..//file0/file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000008c0)='page_pool_state_hold\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000002c00000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000008c0)='page_pool_state_hold\x00', r7}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r6, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f2, &(0x7f0000000080)) 384.147198ms ago: executing program 1 (id=5826): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r0, 0x0, 0x0}, 0x10) 306.081765ms ago: executing program 1 (id=5827): syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0xf4240, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b703000000b700008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r0, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x29, &(0x7f00000004c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0xae, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000007c0)='blkio.throttle.io_serviced\x00', 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@bloom_filter={0x1e, 0x9, 0x0, 0xb, 0x3008, r1, 0x8, '\x00', r2, r3, 0x2, 0x5, 0x5, 0x3, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="c11be01ae6f2adc9000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000010000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x5, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000a800000085000000d000000095"], &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3f, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x11, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000ffffffff000000000000000085000000a8000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b705000000000000850000007b00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000300)={r8}, 0xc) 246.05103ms ago: executing program 4 (id=5825): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000001000000850000000e000000850000002a0000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x14) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x1f2f, 0x2f, 0x2f, &(0x7f00000007c0)="9f44948721919580684010a49e66", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0xffffff4b, 0x0, 0x1, 0x5, '\x00', 0x0, r2, 0x3, 0x2, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000380)={r0, r3}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x34}, 0x10) setsockopt$sock_attach_bpf(r4, 0x1, 0x4b, &(0x7f0000000000), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, 0x0, 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x6, 0x600, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x91, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x4010, 0xffffffffffffffff, 0x3, 0x1, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000100), 0x200df000, r7}, 0x38) 25.369929ms ago: executing program 2 (id=5823): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000016000000181100", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='mem_disconnect\x00', r1}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, 0x0, 0x38}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000002c0)={r3}, 0x69) 10.16193ms ago: executing program 0 (id=5821): bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f00000000c0)='%pS \x00'}, 0x20) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x401, '\x00', 0x0, r1, 0x4, 0x5, 0x1, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x7c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{}, &(0x7f0000000040), &(0x7f00000000c0)='%pS \x00'}, 0x20) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x401, '\x00', 0x0, r1, 0x4, 0x5, 0x1, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x7c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) (async) 0s ago: executing program 2 (id=5828): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000006110100000000000620000000000000095"], &(0x7f0000000100)='GPL\x00', 0x5, 0xd2, &(0x7f00000002c0)=""/210, 0x0, 0x5, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 64) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x3, 0x2, 0x3, 0x1, 0x0, 0xf}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="0100"/20, @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="0200000002ac7200"/28], 0x50) (async, rerun: 32) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) (rerun: 32) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x8, 0x2, 0x27, 0x2008, r5, 0x5, '\x00', 0x0, r6, 0x4, 0x0, 0x5, 0x6, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r7}, 0x38) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 64) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r8}, 0x10) r9 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x0, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x2}, 0x10, 0x874d, 0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000600)=[{0x0, 0x2, 0x0, 0x5}], 0x10, 0x8001, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0x24, &(0x7f0000000c00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000b7080000000000007b8af8ff00000000b7080000050000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a50000000500000000000000852000000100080018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000000000008500000086000000183000000200"/40], &(0x7f0000000440)='GPL\x00', 0x401, 0x93, &(0x7f0000000480)=""/147, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0xa, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, r9, 0x8, &(0x7f0000000780), &(0x7f0000000980)=[{0x1, 0x1}, {0x1, 0x0, 0xf, 0x1}, {0x5, 0x2, 0x6}, {0x0, 0x2, 0x0, 0x7}, {0x0, 0x3, 0x6}, {0x0, 0x1}, {0x0, 0x0, 0x5, 0x5}, {0x0, 0x3, 0x1000000, 0x8}], 0x10, 0x7, @void, @value}, 0x94) (async, rerun: 32) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0x5, 0x9, 0x84, 0x144, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (rerun: 32) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r10}, 0x38) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, &(0x7f0000000840)=""/121, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r10}, 0x38) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r11}, 0x10) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r12, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) (async) close(r4) kernel console output (not intermixed with test programs): 3] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 476.146580][T14363] bridge0: port 1(bridge_slave_0) entered blocking state [ 476.153415][T14363] bridge0: port 1(bridge_slave_0) entered forwarding state [ 476.162511][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 476.170682][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 476.177538][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 476.315541][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 476.323475][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 476.403473][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 476.411877][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 476.420004][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 476.427671][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 476.640877][T14523] device veth0_vlan entered promiscuous mode [ 476.734980][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 476.744381][T14523] device veth1_macvtap entered promiscuous mode [ 476.757760][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 476.769849][T14559] device pim6reg1 entered promiscuous mode [ 476.845112][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 476.870486][T14562] device pim6reg1 entered promiscuous mode [ 476.876494][T14562] FAULT_INJECTION: forcing a failure. [ 476.876494][T14562] name failslab, interval 1, probability 0, space 0, times 0 [ 476.889645][T14562] CPU: 1 PID: 14562 Comm: syz.1.4502 Tainted: G W 6.1.99-syzkaller-00049-g1fe91f863a7f #0 [ 476.900741][T14562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 476.910722][T14562] Call Trace: [ 476.913843][T14562] [ 476.917927][T14562] dump_stack_lvl+0x151/0x1b7 [ 476.922438][T14562] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 476.927729][T14562] ? irq_work_queue+0xcd/0x160 [ 476.932335][T14562] ? __wake_up_klogd+0xde/0x110 [ 476.937021][T14562] dump_stack+0x15/0x1b [ 476.941011][T14562] should_fail_ex+0x3d0/0x520 [ 476.945525][T14562] ? __alloc_skb+0xcc/0x2d0 [ 476.949865][T14562] __should_failslab+0xaf/0xf0 [ 476.954466][T14562] should_failslab+0x9/0x20 [ 476.958803][T14562] kmem_cache_alloc_node+0x3e/0x2d0 [ 476.963839][T14562] __alloc_skb+0xcc/0x2d0 [ 476.968006][T14562] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 476.973130][T14562] rtmsg_ifinfo+0x78/0x120 [ 476.977380][T14562] __dev_notify_flags+0xdd/0x610 [ 476.982153][T14562] ? __dev_change_flags+0x6e0/0x6e0 [ 476.987185][T14562] ? __dev_change_flags+0x569/0x6e0 [ 476.992221][T14562] ? dev_get_flags+0x1e0/0x1e0 [ 476.996819][T14562] ? kstrtouint+0xf6/0x180 [ 477.001075][T14562] dev_change_flags+0xf0/0x1a0 [ 477.005760][T14562] dev_ifsioc+0x177/0x1150 [ 477.010014][T14562] ? dev_ioctl+0xe60/0xe60 [ 477.014265][T14562] ? __kasan_check_write+0x14/0x20 [ 477.019214][T14562] ? mutex_lock+0xb1/0x1e0 [ 477.023467][T14562] ? bit_wait_io_timeout+0x120/0x120 [ 477.028588][T14562] dev_ioctl+0x543/0xe60 [ 477.032753][T14562] sock_do_ioctl+0x26b/0x450 [ 477.037181][T14562] ? has_cap_mac_admin+0x3c0/0x3c0 [ 477.042125][T14562] ? sock_show_fdinfo+0xa0/0xa0 [ 477.046817][T14562] ? selinux_file_ioctl+0x3cc/0x540 [ 477.051849][T14562] sock_ioctl+0x455/0x740 [ 477.056012][T14562] ? sock_poll+0x400/0x400 [ 477.060264][T14562] ? __fget_files+0x2cb/0x330 [ 477.064781][T14562] ? security_file_ioctl+0x84/0xb0 [ 477.069726][T14562] ? sock_poll+0x400/0x400 [ 477.074066][T14562] __se_sys_ioctl+0x114/0x190 [ 477.078579][T14562] __x64_sys_ioctl+0x7b/0x90 [ 477.083003][T14562] x64_sys_call+0x98/0x9a0 [ 477.087257][T14562] do_syscall_64+0x3b/0xb0 [ 477.091512][T14562] ? clear_bhb_loop+0x55/0xb0 [ 477.096024][T14562] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 477.101752][T14562] RIP: 0033:0x7ff5b837dff9 [ 477.106006][T14562] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 477.125449][T14562] RSP: 002b:00007ff5b90f4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 477.133690][T14562] RAX: ffffffffffffffda RBX: 00007ff5b8535f80 RCX: 00007ff5b837dff9 [ 477.141502][T14562] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 0000000000000006 [ 477.149316][T14562] RBP: 00007ff5b90f4090 R08: 0000000000000000 R09: 0000000000000000 [ 477.157123][T14562] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 477.164936][T14562] R13: 0000000000000000 R14: 00007ff5b8535f80 R15: 00007ffd4c760f08 [ 477.172754][T14562] [ 477.663050][T14574] device pim6reg1 entered promiscuous mode [ 477.730911][T14578] device pim6reg1 entered promiscuous mode [ 478.123105][T14599] device pim6reg1 entered promiscuous mode [ 478.133927][T14604] syz.1.4535[14604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 478.134000][T14604] syz.1.4535[14604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 478.549729][ T10] device erspan0 left promiscuous mode [ 478.625291][ T10] GPL: port 1(erspan0) entered disabled state [ 478.658640][T14616] device pim6reg1 entered promiscuous mode [ 478.782338][T14624] device pim6reg1 entered promiscuous mode [ 478.881378][T14636] syz.3.4547[14636] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 478.881452][T14636] syz.3.4547[14636] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 478.916674][ T10] device bridge_slave_1 left promiscuous mode [ 478.942842][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 478.993434][ T10] device bridge_slave_0 left promiscuous mode [ 479.099398][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 479.110469][ T10] device veth1_macvtap left promiscuous mode [ 479.125117][ T10] device veth0_vlan left promiscuous mode [ 479.709172][T14641] device pim6reg1 entered promiscuous mode [ 480.090646][T14664] device pim6reg1 entered promiscuous mode [ 480.098298][T14664] FAULT_INJECTION: forcing a failure. [ 480.098298][T14664] name failslab, interval 1, probability 0, space 0, times 0 [ 480.110833][T14664] CPU: 0 PID: 14664 Comm: syz.4.4556 Tainted: G W 6.1.99-syzkaller-00049-g1fe91f863a7f #0 [ 480.121893][T14664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 480.131790][T14664] Call Trace: [ 480.134913][T14664] [ 480.137689][T14664] dump_stack_lvl+0x151/0x1b7 [ 480.142202][T14664] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 480.147501][T14664] ? __stack_depot_save+0x36/0x480 [ 480.152447][T14664] dump_stack+0x15/0x1b [ 480.156436][T14664] should_fail_ex+0x3d0/0x520 [ 480.160949][T14664] ? __hw_addr_add_ex+0x1fd/0x770 [ 480.165812][T14664] __should_failslab+0xaf/0xf0 [ 480.170412][T14664] should_failslab+0x9/0x20 [ 480.174749][T14664] __kmem_cache_alloc_node+0x3d/0x250 [ 480.179958][T14664] ? x64_sys_call+0x98/0x9a0 [ 480.184383][T14664] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 480.190287][T14664] ? __hw_addr_add_ex+0x1fd/0x770 [ 480.195146][T14664] kmalloc_trace+0x2a/0xa0 [ 480.199398][T14664] __hw_addr_add_ex+0x1fd/0x770 [ 480.204086][T14664] dev_mc_add+0x78/0xd0 [ 480.208082][T14664] igmp_group_added+0x1b4/0x800 [ 480.212763][T14664] ? igmpv3_del_delrec+0x740/0x740 [ 480.217709][T14664] ? igmpv3_del_delrec+0x667/0x740 [ 480.222664][T14664] ____ip_mc_inc_group+0x679/0x8d0 [ 480.227607][T14664] ? __ip_mc_inc_group+0x30/0x30 [ 480.232375][T14664] ? __kasan_check_write+0x14/0x20 [ 480.237325][T14664] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 480.242622][T14664] ? __kasan_check_read+0x11/0x20 [ 480.247479][T14664] ip_mc_up+0x10f/0x1e0 [ 480.251471][T14664] inetdev_event+0xc80/0x1110 [ 480.255986][T14664] ? ipv4_doint_and_flush+0x150/0x150 [ 480.261194][T14664] ? arp_netdev_event+0xd4/0x2a0 [ 480.265969][T14664] raw_notifier_call_chain+0x8c/0xf0 [ 480.271144][T14664] __dev_notify_flags+0x304/0x610 [ 480.275953][T14664] ? __dev_change_flags+0x6e0/0x6e0 [ 480.280984][T14664] ? __dev_change_flags+0x569/0x6e0 [ 480.286023][T14664] ? dev_get_flags+0x1e0/0x1e0 [ 480.290619][T14664] ? kstrtouint+0xf6/0x180 [ 480.294876][T14664] dev_change_flags+0xf0/0x1a0 [ 480.299474][T14664] dev_ifsioc+0x177/0x1150 [ 480.303723][T14664] ? dev_ioctl+0xe60/0xe60 [ 480.307975][T14664] ? __kasan_check_write+0x14/0x20 [ 480.312923][T14664] ? mutex_lock+0xb1/0x1e0 [ 480.317175][T14664] ? bit_wait_io_timeout+0x120/0x120 [ 480.322299][T14664] dev_ioctl+0x543/0xe60 [ 480.326375][T14664] sock_do_ioctl+0x26b/0x450 [ 480.330804][T14664] ? has_cap_mac_admin+0x3c0/0x3c0 [ 480.335751][T14664] ? sock_show_fdinfo+0xa0/0xa0 [ 480.340437][T14664] ? selinux_file_ioctl+0x3cc/0x540 [ 480.345470][T14664] sock_ioctl+0x455/0x740 [ 480.349635][T14664] ? sock_poll+0x400/0x400 [ 480.353889][T14664] ? __fget_files+0x2cb/0x330 [ 480.358403][T14664] ? security_file_ioctl+0x84/0xb0 [ 480.363346][T14664] ? sock_poll+0x400/0x400 [ 480.367602][T14664] __se_sys_ioctl+0x114/0x190 [ 480.372114][T14664] __x64_sys_ioctl+0x7b/0x90 [ 480.376541][T14664] x64_sys_call+0x98/0x9a0 [ 480.380797][T14664] do_syscall_64+0x3b/0xb0 [ 480.385046][T14664] ? clear_bhb_loop+0x55/0xb0 [ 480.389560][T14664] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 480.395288][T14664] RIP: 0033:0x7f372277dff9 [ 480.399549][T14664] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 480.418987][T14664] RSP: 002b:00007f3723545038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 480.427229][T14664] RAX: ffffffffffffffda RBX: 00007f3722935f80 RCX: 00007f372277dff9 [ 480.435047][T14664] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 000000000000000a [ 480.442853][T14664] RBP: 00007f3723545090 R08: 0000000000000000 R09: 0000000000000000 [ 480.450665][T14664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 480.458476][T14664] R13: 0000000000000000 R14: 00007f3722935f80 R15: 00007ffc5e714f68 [ 480.466291][T14664] [ 480.633632][T14690] device pim6reg1 entered promiscuous mode [ 481.013291][T14705] device pim6reg1 entered promiscuous mode [ 481.724848][T14725] device pim6reg1 entered promiscuous mode [ 481.834671][T14732] device pim6reg1 entered promiscuous mode [ 482.811888][T14762] device pim6reg1 entered promiscuous mode [ 482.938531][T14772] GPL: port 1(erspan0) entered blocking state [ 482.944438][T14772] GPL: port 1(erspan0) entered disabled state [ 482.977232][T14772] device erspan0 entered promiscuous mode [ 482.988143][T14774] device pim6reg1 entered promiscuous mode [ 483.030120][T14781] device pim6reg1 entered promiscuous mode [ 483.036371][T14781] FAULT_INJECTION: forcing a failure. [ 483.036371][T14781] name failslab, interval 1, probability 0, space 0, times 0 [ 483.053747][T14781] CPU: 1 PID: 14781 Comm: syz.2.4600 Tainted: G W 6.1.99-syzkaller-00049-g1fe91f863a7f #0 [ 483.064852][T14781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 483.074747][T14781] Call Trace: [ 483.077871][T14781] [ 483.080649][T14781] dump_stack_lvl+0x151/0x1b7 [ 483.085160][T14781] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 483.090454][T14781] ? stack_trace_save+0x113/0x1c0 [ 483.095317][T14781] dump_stack+0x15/0x1b [ 483.099306][T14781] should_fail_ex+0x3d0/0x520 [ 483.103822][T14781] ? fib6_info_alloc+0x33/0xe0 [ 483.108420][T14781] __should_failslab+0xaf/0xf0 [ 483.113022][T14781] should_failslab+0x9/0x20 [ 483.117361][T14781] __kmem_cache_alloc_node+0x3d/0x250 [ 483.122567][T14781] ? kasan_set_track+0x4b/0x70 [ 483.127174][T14781] ? __kasan_kmalloc+0x9c/0xb0 [ 483.131766][T14781] ? kmalloc_trace+0x44/0xa0 [ 483.136194][T14781] ? fib6_info_alloc+0x33/0xe0 [ 483.140795][T14781] __kmalloc+0xa3/0x1e0 [ 483.144791][T14781] fib6_info_alloc+0x33/0xe0 [ 483.149232][T14781] ip6_route_info_create+0x50b/0x14c0 [ 483.154422][T14781] ? __mutex_lock_slowpath+0x10/0x10 [ 483.159546][T14781] ip6_route_add+0x27/0x130 [ 483.163883][T14781] addrconf_add_dev+0x419/0x5f0 [ 483.168568][T14781] ? addrconf_verify_rtnl+0xeb0/0xeb0 [ 483.173784][T14781] ? __kasan_check_read+0x11/0x20 [ 483.178637][T14781] addrconf_init_auto_addrs+0xadc/0x1050 [ 483.184105][T14781] ? addrconf_dad_run+0x610/0x610 [ 483.188967][T14781] ? __local_bh_enable_ip+0x58/0x80 [ 483.194000][T14781] ? _raw_write_unlock_bh+0x32/0x50 [ 483.199034][T14781] ? addrconf_permanent_addr+0xb40/0xba0 [ 483.204505][T14781] ? __kasan_check_write+0x14/0x20 [ 483.209450][T14781] ? addrconf_notify+0xe10/0xe10 [ 483.214225][T14781] ? igmpv3_del_delrec+0x740/0x740 [ 483.219169][T14781] ? __local_bh_enable_ip+0x58/0x80 [ 483.224202][T14781] ? __kasan_check_write+0x14/0x20 [ 483.229146][T14781] ? mutex_unlock+0xb2/0x260 [ 483.233573][T14781] ? tun_device_event+0x3ef/0xf80 [ 483.238438][T14781] ? __mutex_lock_slowpath+0x10/0x10 [ 483.243561][T14781] ? macsec_notify+0x101/0x4c0 [ 483.248161][T14781] ? addrconf_link_ready+0xfb/0x1e0 [ 483.253192][T14781] addrconf_notify+0x976/0xe10 [ 483.257791][T14781] raw_notifier_call_chain+0x8c/0xf0 [ 483.262911][T14781] __dev_notify_flags+0x304/0x610 [ 483.267774][T14781] ? __dev_change_flags+0x6e0/0x6e0 [ 483.272811][T14781] ? __dev_change_flags+0x569/0x6e0 [ 483.277837][T14781] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 483.284435][T14781] ? dev_get_flags+0x1e0/0x1e0 [ 483.289034][T14781] ? kstrtouint+0xf6/0x180 [ 483.293291][T14781] dev_change_flags+0xf0/0x1a0 [ 483.297888][T14781] dev_ifsioc+0x177/0x1150 [ 483.302142][T14781] ? dev_ioctl+0xe60/0xe60 [ 483.306393][T14781] ? __mutex_lock_slowpath+0xe/0x10 [ 483.311435][T14781] ? mutex_lock+0x130/0x1e0 [ 483.315766][T14781] ? bit_wait_io_timeout+0x120/0x120 [ 483.320894][T14781] dev_ioctl+0x543/0xe60 [ 483.324966][T14781] sock_do_ioctl+0x26b/0x450 [ 483.329393][T14781] ? has_cap_mac_admin+0x3c0/0x3c0 [ 483.334346][T14781] ? sock_show_fdinfo+0xa0/0xa0 [ 483.339030][T14781] ? selinux_file_ioctl+0x3cc/0x540 [ 483.344065][T14781] sock_ioctl+0x455/0x740 [ 483.348227][T14781] ? sock_poll+0x400/0x400 [ 483.352480][T14781] ? __fget_files+0x2cb/0x330 [ 483.356993][T14781] ? security_file_ioctl+0x84/0xb0 [ 483.361939][T14781] ? sock_poll+0x400/0x400 [ 483.366195][T14781] __se_sys_ioctl+0x114/0x190 [ 483.370712][T14781] __x64_sys_ioctl+0x7b/0x90 [ 483.375140][T14781] x64_sys_call+0x98/0x9a0 [ 483.379385][T14781] do_syscall_64+0x3b/0xb0 [ 483.383638][T14781] ? clear_bhb_loop+0x55/0xb0 [ 483.388150][T14781] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 483.393881][T14781] RIP: 0033:0x7f891db7dff9 [ 483.398137][T14781] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 483.417577][T14781] RSP: 002b:00007f891e8b1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 483.425819][T14781] RAX: ffffffffffffffda RBX: 00007f891dd35f80 RCX: 00007f891db7dff9 [ 483.433629][T14781] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 000000000000000a [ 483.441443][T14781] RBP: 00007f891e8b1090 R08: 0000000000000000 R09: 0000000000000000 [ 483.449253][T14781] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 483.457069][T14781] R13: 0000000000000000 R14: 00007f891dd35f80 R15: 00007ffea1879778 [ 483.464883][T14781] [ 483.470341][T14778] device pim6reg1 entered promiscuous mode [ 483.644738][T14802] device pim6reg1 entered promiscuous mode [ 483.651442][T14802] FAULT_INJECTION: forcing a failure. [ 483.651442][T14802] name failslab, interval 1, probability 0, space 0, times 0 [ 483.671210][T14802] CPU: 0 PID: 14802 Comm: syz.4.4606 Tainted: G W 6.1.99-syzkaller-00049-g1fe91f863a7f #0 [ 483.682321][T14802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 483.692219][T14802] Call Trace: [ 483.695342][T14802] [ 483.698119][T14802] dump_stack_lvl+0x151/0x1b7 [ 483.702636][T14802] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 483.707926][T14802] ? stack_trace_save+0x113/0x1c0 [ 483.712790][T14802] dump_stack+0x15/0x1b [ 483.716780][T14802] should_fail_ex+0x3d0/0x520 [ 483.721293][T14802] ? fib6_info_alloc+0x33/0xe0 [ 483.725890][T14802] __should_failslab+0xaf/0xf0 [ 483.730487][T14802] should_failslab+0x9/0x20 [ 483.734826][T14802] __kmem_cache_alloc_node+0x3d/0x250 [ 483.740035][T14802] ? kasan_set_track+0x4b/0x70 [ 483.744634][T14802] ? __kasan_kmalloc+0x9c/0xb0 [ 483.749234][T14802] ? kmalloc_trace+0x44/0xa0 [ 483.753660][T14802] ? fib6_info_alloc+0x33/0xe0 [ 483.758263][T14802] __kmalloc+0xa3/0x1e0 [ 483.762255][T14802] fib6_info_alloc+0x33/0xe0 [ 483.766693][T14802] ip6_route_info_create+0x50b/0x14c0 [ 483.771888][T14802] ? __mutex_lock_slowpath+0x10/0x10 [ 483.777010][T14802] ip6_route_add+0x27/0x130 [ 483.781350][T14802] addrconf_add_dev+0x419/0x5f0 [ 483.786036][T14802] ? addrconf_verify_rtnl+0xeb0/0xeb0 [ 483.791247][T14802] ? __kasan_check_read+0x11/0x20 [ 483.796106][T14802] addrconf_init_auto_addrs+0xadc/0x1050 [ 483.801572][T14802] ? addrconf_dad_run+0x610/0x610 [ 483.806432][T14802] ? __local_bh_enable_ip+0x58/0x80 [ 483.811464][T14802] ? _raw_write_unlock_bh+0x32/0x50 [ 483.816499][T14802] ? addrconf_permanent_addr+0xb40/0xba0 [ 483.821969][T14802] ? __kasan_check_write+0x14/0x20 [ 483.826916][T14802] ? addrconf_notify+0xe10/0xe10 [ 483.831688][T14802] ? igmpv3_del_delrec+0x740/0x740 [ 483.836637][T14802] ? __local_bh_enable_ip+0x58/0x80 [ 483.841671][T14802] ? __kasan_check_write+0x14/0x20 [ 483.846617][T14802] ? mutex_unlock+0xb2/0x260 [ 483.851045][T14802] ? tun_device_event+0x3ef/0xf80 [ 483.855904][T14802] ? __mutex_lock_slowpath+0x10/0x10 [ 483.861023][T14802] ? macsec_notify+0x101/0x4c0 [ 483.865629][T14802] ? addrconf_link_ready+0xfb/0x1e0 [ 483.870659][T14802] addrconf_notify+0x976/0xe10 [ 483.875259][T14802] raw_notifier_call_chain+0x8c/0xf0 [ 483.880383][T14802] __dev_notify_flags+0x304/0x610 [ 483.885241][T14802] ? __dev_change_flags+0x6e0/0x6e0 [ 483.890274][T14802] ? __dev_change_flags+0x569/0x6e0 [ 483.895308][T14802] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 483.901905][T14802] ? dev_get_flags+0x1e0/0x1e0 [ 483.906503][T14802] ? kstrtouint+0xf6/0x180 [ 483.910759][T14802] dev_change_flags+0xf0/0x1a0 [ 483.915357][T14802] dev_ifsioc+0x177/0x1150 [ 483.919612][T14802] ? dev_ioctl+0xe60/0xe60 [ 483.923866][T14802] ? __mutex_lock_slowpath+0xe/0x10 [ 483.928895][T14802] ? mutex_lock+0x130/0x1e0 [ 483.933237][T14802] ? bit_wait_io_timeout+0x120/0x120 [ 483.938359][T14802] dev_ioctl+0x543/0xe60 [ 483.942436][T14802] sock_do_ioctl+0x26b/0x450 [ 483.946864][T14802] ? has_cap_mac_admin+0x3c0/0x3c0 [ 483.951810][T14802] ? sock_show_fdinfo+0xa0/0xa0 [ 483.956500][T14802] ? selinux_file_ioctl+0x3cc/0x540 [ 483.961530][T14802] sock_ioctl+0x455/0x740 [ 483.965697][T14802] ? sock_poll+0x400/0x400 [ 483.969952][T14802] ? __fget_files+0x2cb/0x330 [ 483.974465][T14802] ? security_file_ioctl+0x84/0xb0 [ 483.979409][T14802] ? sock_poll+0x400/0x400 [ 483.983666][T14802] __se_sys_ioctl+0x114/0x190 [ 483.988177][T14802] __x64_sys_ioctl+0x7b/0x90 [ 483.992603][T14802] x64_sys_call+0x98/0x9a0 [ 483.996856][T14802] do_syscall_64+0x3b/0xb0 [ 484.001108][T14802] ? clear_bhb_loop+0x55/0xb0 [ 484.005620][T14802] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 484.011350][T14802] RIP: 0033:0x7f372277dff9 [ 484.015603][T14802] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 484.035044][T14802] RSP: 002b:00007f3723545038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 484.043290][T14802] RAX: ffffffffffffffda RBX: 00007f3722935f80 RCX: 00007f372277dff9 [ 484.051100][T14802] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 0000000000000006 [ 484.058913][T14802] RBP: 00007f3723545090 R08: 0000000000000000 R09: 0000000000000000 [ 484.066723][T14802] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 484.074540][T14802] R13: 0000000000000000 R14: 00007f3722935f80 R15: 00007ffc5e714f68 [ 484.082352][T14802] [ 484.297272][T14825] device pim6reg1 entered promiscuous mode [ 484.332554][T14830] device pim6reg1 entered promiscuous mode [ 484.454830][T14836] device pim6reg1 entered promiscuous mode [ 484.490055][T14843] device pim6reg1 entered promiscuous mode [ 484.511278][T14843] FAULT_INJECTION: forcing a failure. [ 484.511278][T14843] name failslab, interval 1, probability 0, space 0, times 0 [ 484.735903][T14843] CPU: 1 PID: 14843 Comm: syz.1.4622 Tainted: G W 6.1.99-syzkaller-00049-g1fe91f863a7f #0 [ 484.747025][T14843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 484.756917][T14843] Call Trace: [ 484.760038][T14843] [ 484.762816][T14843] dump_stack_lvl+0x151/0x1b7 [ 484.767330][T14843] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 484.772629][T14843] ? stack_trace_save+0x113/0x1c0 [ 484.777485][T14843] dump_stack+0x15/0x1b [ 484.781476][T14843] should_fail_ex+0x3d0/0x520 [ 484.785994][T14843] ? fib6_info_alloc+0x33/0xe0 [ 484.790592][T14843] __should_failslab+0xaf/0xf0 [ 484.795191][T14843] should_failslab+0x9/0x20 [ 484.799530][T14843] __kmem_cache_alloc_node+0x3d/0x250 [ 484.804737][T14843] ? kasan_set_track+0x4b/0x70 [ 484.809338][T14843] ? __kasan_kmalloc+0x9c/0xb0 [ 484.813936][T14843] ? kmalloc_trace+0x44/0xa0 [ 484.818364][T14843] ? fib6_info_alloc+0x33/0xe0 [ 484.822966][T14843] __kmalloc+0xa3/0x1e0 [ 484.826956][T14843] fib6_info_alloc+0x33/0xe0 [ 484.831383][T14843] ip6_route_info_create+0x50b/0x14c0 [ 484.836590][T14843] ? __mutex_lock_slowpath+0x10/0x10 [ 484.841718][T14843] ip6_route_add+0x27/0x130 [ 484.846051][T14843] addrconf_add_dev+0x419/0x5f0 [ 484.850739][T14843] ? addrconf_verify_rtnl+0xeb0/0xeb0 [ 484.855950][T14843] ? __kasan_check_read+0x11/0x20 [ 484.860806][T14843] addrconf_init_auto_addrs+0xadc/0x1050 [ 484.866273][T14843] ? addrconf_dad_run+0x610/0x610 [ 484.871134][T14843] ? __local_bh_enable_ip+0x58/0x80 [ 484.876167][T14843] ? _raw_write_unlock_bh+0x32/0x50 [ 484.881201][T14843] ? addrconf_permanent_addr+0xb40/0xba0 [ 484.886675][T14843] ? __kasan_check_write+0x14/0x20 [ 484.891619][T14843] ? addrconf_notify+0xe10/0xe10 [ 484.896392][T14843] ? igmpv3_del_delrec+0x740/0x740 [ 484.901339][T14843] ? __local_bh_enable_ip+0x58/0x80 [ 484.906374][T14843] ? __kasan_check_write+0x14/0x20 [ 484.911317][T14843] ? mutex_unlock+0xb2/0x260 [ 484.915746][T14843] ? tun_device_event+0x3ef/0xf80 [ 484.920606][T14843] ? __mutex_lock_slowpath+0x10/0x10 [ 484.925726][T14843] ? macsec_notify+0x101/0x4c0 [ 484.930330][T14843] ? addrconf_link_ready+0xfb/0x1e0 [ 484.935363][T14843] addrconf_notify+0x976/0xe10 [ 484.939965][T14843] raw_notifier_call_chain+0x8c/0xf0 [ 484.945085][T14843] __dev_notify_flags+0x304/0x610 [ 484.949943][T14843] ? __dev_change_flags+0x6e0/0x6e0 [ 484.954976][T14843] ? __dev_change_flags+0x569/0x6e0 [ 484.960011][T14843] ? dev_get_flags+0x1e0/0x1e0 [ 484.964613][T14843] ? kstrtouint+0xf6/0x180 [ 484.968865][T14843] dev_change_flags+0xf0/0x1a0 [ 484.973463][T14843] dev_ifsioc+0x177/0x1150 [ 484.977719][T14843] ? dev_ioctl+0xe60/0xe60 [ 484.981969][T14843] ? __kasan_check_write+0x14/0x20 [ 484.986916][T14843] ? mutex_lock+0xb1/0x1e0 [ 484.991169][T14843] ? bit_wait_io_timeout+0x120/0x120 [ 484.996292][T14843] dev_ioctl+0x543/0xe60 [ 485.000372][T14843] sock_do_ioctl+0x26b/0x450 [ 485.004795][T14843] ? has_cap_mac_admin+0x3c0/0x3c0 [ 485.009742][T14843] ? sock_show_fdinfo+0xa0/0xa0 [ 485.014436][T14843] ? selinux_file_ioctl+0x3cc/0x540 [ 485.019466][T14843] sock_ioctl+0x455/0x740 [ 485.023632][T14843] ? sock_poll+0x400/0x400 [ 485.027883][T14843] ? __fget_files+0x2cb/0x330 [ 485.032404][T14843] ? security_file_ioctl+0x84/0xb0 [ 485.037345][T14843] ? sock_poll+0x400/0x400 [ 485.041597][T14843] __se_sys_ioctl+0x114/0x190 [ 485.046110][T14843] __x64_sys_ioctl+0x7b/0x90 [ 485.050537][T14843] x64_sys_call+0x98/0x9a0 [ 485.054794][T14843] do_syscall_64+0x3b/0xb0 [ 485.059043][T14843] ? clear_bhb_loop+0x55/0xb0 [ 485.063556][T14843] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 485.069282][T14843] RIP: 0033:0x7ff5b837dff9 [ 485.073538][T14843] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 485.092978][T14843] RSP: 002b:00007ff5b90f4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 485.101224][T14843] RAX: ffffffffffffffda RBX: 00007ff5b8535f80 RCX: 00007ff5b837dff9 [ 485.109034][T14843] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 000000000000000a [ 485.116848][T14843] RBP: 00007ff5b90f4090 R08: 0000000000000000 R09: 0000000000000000 [ 485.124655][T14843] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 485.132466][T14843] R13: 0000000000000000 R14: 00007ff5b8535f80 R15: 00007ffd4c760f08 [ 485.140285][T14843] [ 485.542544][T14862] device pim6reg1 entered promiscuous mode [ 485.549327][T14862] FAULT_INJECTION: forcing a failure. [ 485.549327][T14862] name failslab, interval 1, probability 0, space 0, times 0 [ 485.562797][T14862] CPU: 0 PID: 14862 Comm: syz.2.4625 Tainted: G W 6.1.99-syzkaller-00049-g1fe91f863a7f #0 [ 485.573897][T14862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 485.583790][T14862] Call Trace: [ 485.586912][T14862] [ 485.589690][T14862] dump_stack_lvl+0x151/0x1b7 [ 485.594202][T14862] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 485.599496][T14862] ? kasan_quarantine_put+0x34/0x1a0 [ 485.604617][T14862] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 485.610260][T14862] dump_stack+0x15/0x1b [ 485.614252][T14862] should_fail_ex+0x3d0/0x520 [ 485.618765][T14862] ? ipv6_add_addr+0x41b/0xdf0 [ 485.623365][T14862] __should_failslab+0xaf/0xf0 [ 485.627965][T14862] should_failslab+0x9/0x20 [ 485.632305][T14862] __kmem_cache_alloc_node+0x3d/0x250 [ 485.637517][T14862] ? ipv6_add_addr+0x41b/0xdf0 [ 485.642114][T14862] kmalloc_trace+0x2a/0xa0 [ 485.646367][T14862] ipv6_add_addr+0x41b/0xdf0 [ 485.650794][T14862] ? ipv6_generate_stable_address+0x6e0/0x6e0 [ 485.656694][T14862] ? nlmsg_notify+0x15a/0x1c0 [ 485.661207][T14862] addrconf_add_linklocal+0x326/0x9e0 [ 485.666414][T14862] ? inet6_addr_del+0x550/0x550 [ 485.671100][T14862] ? rt6_nh_dump_exceptions+0x650/0x650 [ 485.676483][T14862] ? __kasan_check_write+0x14/0x20 [ 485.681430][T14862] ? fib6_add+0x3168/0x3df0 [ 485.685773][T14862] ? memcpy+0x56/0x70 [ 485.689588][T14862] ? ipv6_generate_eui64+0x7b3/0x1080 [ 485.694794][T14862] addrconf_addr_gen+0x57f/0xcf0 [ 485.699573][T14862] ? addrconf_sysctl_register+0x1a0/0x1a0 [ 485.705122][T14862] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 485.709985][T14862] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 485.715021][T14862] ? __kasan_check_write+0x14/0x20 [ 485.719965][T14862] ? ip6_route_add+0x102/0x130 [ 485.724566][T14862] ? addrconf_add_dev+0x419/0x5f0 [ 485.729427][T14862] ? addrconf_verify_rtnl+0xeb0/0xeb0 [ 485.734637][T14862] ? __kasan_check_read+0x11/0x20 [ 485.739495][T14862] addrconf_init_auto_addrs+0xb96/0x1050 [ 485.744961][T14862] ? addrconf_dad_run+0x610/0x610 [ 485.749821][T14862] ? __local_bh_enable_ip+0x58/0x80 [ 485.754855][T14862] ? _raw_write_unlock_bh+0x32/0x50 [ 485.759888][T14862] ? addrconf_permanent_addr+0xb40/0xba0 [ 485.765358][T14862] ? __kasan_check_write+0x14/0x20 [ 485.770305][T14862] ? addrconf_notify+0xe10/0xe10 [ 485.775078][T14862] ? igmpv3_del_delrec+0x740/0x740 [ 485.780025][T14862] ? __local_bh_enable_ip+0x58/0x80 [ 485.785060][T14862] ? __kasan_check_write+0x14/0x20 [ 485.790006][T14862] ? mutex_unlock+0xb2/0x260 [ 485.794432][T14862] ? tun_device_event+0x3ef/0xf80 [ 485.799294][T14862] ? __mutex_lock_slowpath+0x10/0x10 [ 485.804412][T14862] ? macsec_notify+0x101/0x4c0 [ 485.809015][T14862] ? addrconf_link_ready+0xfb/0x1e0 [ 485.814050][T14862] addrconf_notify+0x976/0xe10 [ 485.818651][T14862] raw_notifier_call_chain+0x8c/0xf0 [ 485.823768][T14862] __dev_notify_flags+0x304/0x610 [ 485.828632][T14862] ? __dev_change_flags+0x6e0/0x6e0 [ 485.833665][T14862] ? __dev_change_flags+0x569/0x6e0 [ 485.838699][T14862] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 485.845294][T14862] ? dev_get_flags+0x1e0/0x1e0 [ 485.849894][T14862] ? kstrtouint+0xf6/0x180 [ 485.854149][T14862] dev_change_flags+0xf0/0x1a0 [ 485.858749][T14862] dev_ifsioc+0x177/0x1150 [ 485.863000][T14862] ? dev_ioctl+0xe60/0xe60 [ 485.867253][T14862] ? __mutex_lock_slowpath+0xe/0x10 [ 485.872285][T14862] ? mutex_lock+0x130/0x1e0 [ 485.876626][T14862] ? bit_wait_io_timeout+0x120/0x120 [ 485.881749][T14862] dev_ioctl+0x543/0xe60 [ 485.885827][T14862] sock_do_ioctl+0x26b/0x450 [ 485.890254][T14862] ? has_cap_mac_admin+0x3c0/0x3c0 [ 485.895199][T14862] ? sock_show_fdinfo+0xa0/0xa0 [ 485.899889][T14862] ? selinux_file_ioctl+0x3cc/0x540 [ 485.904921][T14862] sock_ioctl+0x455/0x740 [ 485.909088][T14862] ? sock_poll+0x400/0x400 [ 485.913342][T14862] ? __fget_files+0x2cb/0x330 [ 485.917853][T14862] ? security_file_ioctl+0x84/0xb0 [ 485.922799][T14862] ? sock_poll+0x400/0x400 [ 485.927053][T14862] __se_sys_ioctl+0x114/0x190 [ 485.931567][T14862] __x64_sys_ioctl+0x7b/0x90 [ 485.935994][T14862] x64_sys_call+0x98/0x9a0 [ 485.940245][T14862] do_syscall_64+0x3b/0xb0 [ 485.944499][T14862] ? clear_bhb_loop+0x55/0xb0 [ 485.949011][T14862] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 485.954739][T14862] RIP: 0033:0x7f891db7dff9 [ 485.958995][T14862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 485.978436][T14862] RSP: 002b:00007f891e8b1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 485.986681][T14862] RAX: ffffffffffffffda RBX: 00007f891dd35f80 RCX: 00007f891db7dff9 [ 485.994489][T14862] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 0000000000000006 [ 486.002302][T14862] RBP: 00007f891e8b1090 R08: 0000000000000000 R09: 0000000000000000 [ 486.010114][T14862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 486.017924][T14862] R13: 0000000000000000 R14: 00007f891dd35f80 R15: 00007ffea1879778 [ 486.025740][T14862] [ 486.043154][T14873] device pim6reg1 entered promiscuous mode [ 486.050674][T14870] device pim6reg1 entered promiscuous mode [ 486.251683][T14891] GPL: port 1(erspan0) entered blocking state [ 486.282471][T14891] GPL: port 1(erspan0) entered disabled state [ 486.289575][T14891] device erspan0 entered promiscuous mode [ 486.520968][T14910] device pim6reg1 entered promiscuous mode [ 486.531284][T14915] device pim6reg1 entered promiscuous mode [ 486.585173][T14921] device pim6reg1 entered promiscuous mode [ 487.077983][T14922] device wg2 entered promiscuous mode [ 488.232273][T14987] device pim6reg1 entered promiscuous mode [ 489.292770][T15023] device pim6reg1 entered promiscuous mode [ 489.365886][T15023] FAULT_INJECTION: forcing a failure. [ 489.365886][T15023] name failslab, interval 1, probability 0, space 0, times 0 [ 489.455611][T15023] CPU: 1 PID: 15023 Comm: syz.4.4681 Tainted: G W 6.1.99-syzkaller-00049-g1fe91f863a7f #0 [ 489.466730][T15023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 489.476630][T15023] Call Trace: [ 489.479746][T15023] [ 489.482526][T15023] dump_stack_lvl+0x151/0x1b7 [ 489.487041][T15023] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 489.492339][T15023] ? arch_stack_walk+0xf3/0x140 [ 489.497024][T15023] dump_stack+0x15/0x1b [ 489.501010][T15023] should_fail_ex+0x3d0/0x520 [ 489.505525][T15023] ? fib6_info_alloc+0x33/0xe0 [ 489.510126][T15023] __should_failslab+0xaf/0xf0 [ 489.514725][T15023] should_failslab+0x9/0x20 [ 489.519068][T15023] __kmem_cache_alloc_node+0x3d/0x250 [ 489.524271][T15023] ? __stack_depot_save+0x36/0x480 [ 489.529220][T15023] ? fib6_info_alloc+0x33/0xe0 [ 489.533823][T15023] __kmalloc+0xa3/0x1e0 [ 489.537816][T15023] fib6_info_alloc+0x33/0xe0 [ 489.542241][T15023] ip6_route_info_create+0x50b/0x14c0 [ 489.547444][T15023] ? dev_change_flags+0xf0/0x1a0 [ 489.552220][T15023] ? dev_ifsioc+0x177/0x1150 [ 489.556647][T15023] ? dev_ioctl+0x543/0xe60 [ 489.560901][T15023] ? memcpy+0x56/0x70 [ 489.564719][T15023] addrconf_f6i_alloc+0x215/0x4c0 [ 489.569582][T15023] ? ip6_route_del+0xfe0/0xfe0 [ 489.574181][T15023] ? kasan_save_alloc_info+0x1f/0x30 [ 489.579303][T15023] ? __kasan_kmalloc+0x9c/0xb0 [ 489.583904][T15023] ? kmalloc_trace+0x44/0xa0 [ 489.588327][T15023] ipv6_add_addr+0x450/0xdf0 [ 489.592753][T15023] ? ipv6_generate_stable_address+0x6e0/0x6e0 [ 489.598654][T15023] ? nlmsg_notify+0x15a/0x1c0 [ 489.603170][T15023] addrconf_add_linklocal+0x326/0x9e0 [ 489.608378][T15023] ? inet6_addr_del+0x550/0x550 [ 489.613063][T15023] ? rt6_nh_dump_exceptions+0x650/0x650 [ 489.618444][T15023] ? __kasan_check_write+0x14/0x20 [ 489.623392][T15023] ? fib6_add+0x3168/0x3df0 [ 489.627733][T15023] ? memcpy+0x56/0x70 [ 489.631550][T15023] ? ipv6_generate_eui64+0x7b3/0x1080 [ 489.636759][T15023] addrconf_addr_gen+0x57f/0xcf0 [ 489.641536][T15023] ? addrconf_sysctl_register+0x1a0/0x1a0 [ 489.647085][T15023] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 489.651944][T15023] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 489.656982][T15023] ? __kasan_check_write+0x14/0x20 [ 489.661926][T15023] ? ip6_route_add+0x102/0x130 [ 489.666528][T15023] ? addrconf_add_dev+0x419/0x5f0 [ 489.671475][T15023] ? addrconf_verify_rtnl+0xeb0/0xeb0 [ 489.676687][T15023] ? __kasan_check_read+0x11/0x20 [ 489.681542][T15023] addrconf_init_auto_addrs+0xb96/0x1050 [ 489.687009][T15023] ? addrconf_dad_run+0x610/0x610 [ 489.691871][T15023] ? __local_bh_enable_ip+0x58/0x80 [ 489.696907][T15023] ? _raw_write_unlock_bh+0x32/0x50 [ 489.701941][T15023] ? addrconf_permanent_addr+0xb40/0xba0 [ 489.707410][T15023] ? __kasan_check_write+0x14/0x20 [ 489.712356][T15023] ? addrconf_notify+0xe10/0xe10 [ 489.717128][T15023] ? igmpv3_del_delrec+0x740/0x740 [ 489.722072][T15023] ? __local_bh_enable_ip+0x58/0x80 [ 489.727108][T15023] ? __kasan_check_write+0x14/0x20 [ 489.732053][T15023] ? mutex_unlock+0xb2/0x260 [ 489.736480][T15023] ? tun_device_event+0x3ef/0xf80 [ 489.741342][T15023] ? __mutex_lock_slowpath+0x10/0x10 [ 489.746462][T15023] ? macsec_notify+0x101/0x4c0 [ 489.751065][T15023] ? addrconf_link_ready+0xfb/0x1e0 [ 489.756099][T15023] addrconf_notify+0x976/0xe10 [ 489.760696][T15023] raw_notifier_call_chain+0x8c/0xf0 [ 489.765818][T15023] __dev_notify_flags+0x304/0x610 [ 489.770685][T15023] ? __dev_change_flags+0x6e0/0x6e0 [ 489.775712][T15023] ? __dev_change_flags+0x569/0x6e0 [ 489.780748][T15023] ? dev_get_flags+0x1e0/0x1e0 [ 489.785352][T15023] ? kstrtouint+0xf6/0x180 [ 489.789602][T15023] dev_change_flags+0xf0/0x1a0 [ 489.794203][T15023] dev_ifsioc+0x177/0x1150 [ 489.798454][T15023] ? dev_ioctl+0xe60/0xe60 [ 489.802704][T15023] ? __kasan_check_write+0x14/0x20 [ 489.807651][T15023] ? mutex_lock+0xb1/0x1e0 [ 489.811905][T15023] ? bit_wait_io_timeout+0x120/0x120 [ 489.817029][T15023] dev_ioctl+0x543/0xe60 [ 489.821108][T15023] sock_do_ioctl+0x26b/0x450 [ 489.825532][T15023] ? has_cap_mac_admin+0x3c0/0x3c0 [ 489.830482][T15023] ? sock_show_fdinfo+0xa0/0xa0 [ 489.835169][T15023] ? selinux_file_ioctl+0x3cc/0x540 [ 489.840200][T15023] sock_ioctl+0x455/0x740 [ 489.844366][T15023] ? sock_poll+0x400/0x400 [ 489.848617][T15023] ? __fget_files+0x2cb/0x330 [ 489.853135][T15023] ? security_file_ioctl+0x84/0xb0 [ 489.858081][T15023] ? sock_poll+0x400/0x400 [ 489.862332][T15023] __se_sys_ioctl+0x114/0x190 [ 489.866847][T15023] __x64_sys_ioctl+0x7b/0x90 [ 489.871272][T15023] x64_sys_call+0x98/0x9a0 [ 489.875523][T15023] do_syscall_64+0x3b/0xb0 [ 489.879778][T15023] ? clear_bhb_loop+0x55/0xb0 [ 489.884290][T15023] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 489.890023][T15023] RIP: 0033:0x7f372277dff9 [ 489.894273][T15023] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 489.913716][T15023] RSP: 002b:00007f3723545038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 489.921958][T15023] RAX: ffffffffffffffda RBX: 00007f3722935f80 RCX: 00007f372277dff9 [ 489.929768][T15023] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 000000000000000a [ 489.937580][T15023] RBP: 00007f3723545090 R08: 0000000000000000 R09: 0000000000000000 [ 489.945390][T15023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 489.953204][T15023] R13: 0000000000000000 R14: 00007f3722935f80 R15: 00007ffc5e714f68 [ 489.961023][T15023] [ 493.072777][T15087] device pim6reg1 entered promiscuous mode [ 493.086540][T15087] FAULT_INJECTION: forcing a failure. [ 493.086540][T15087] name failslab, interval 1, probability 0, space 0, times 0 [ 493.225645][T15087] CPU: 0 PID: 15087 Comm: syz.3.4706 Tainted: G W 6.1.99-syzkaller-00049-g1fe91f863a7f #0 [ 493.236760][T15087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 493.246655][T15087] Call Trace: [ 493.249777][T15087] [ 493.252559][T15087] dump_stack_lvl+0x151/0x1b7 [ 493.257070][T15087] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 493.262367][T15087] ? addrconf_f6i_alloc+0x362/0x4c0 [ 493.267402][T15087] dump_stack+0x15/0x1b [ 493.271393][T15087] should_fail_ex+0x3d0/0x520 [ 493.275905][T15087] ? fib6_info_alloc+0x33/0xe0 [ 493.280504][T15087] __should_failslab+0xaf/0xf0 [ 493.285103][T15087] should_failslab+0x9/0x20 [ 493.289442][T15087] __kmem_cache_alloc_node+0x3d/0x250 [ 493.294655][T15087] ? fib6_info_alloc+0x33/0xe0 [ 493.299250][T15087] __kmalloc+0xa3/0x1e0 [ 493.303243][T15087] fib6_info_alloc+0x33/0xe0 [ 493.307675][T15087] ip6_route_info_create+0x50b/0x14c0 [ 493.312881][T15087] ip6_route_add+0x27/0x130 [ 493.317216][T15087] addrconf_add_linklocal+0x5c8/0x9e0 [ 493.322427][T15087] ? inet6_addr_del+0x550/0x550 [ 493.327121][T15087] ? memcpy+0x56/0x70 [ 493.330932][T15087] ? ipv6_generate_eui64+0x7b3/0x1080 [ 493.336141][T15087] addrconf_addr_gen+0x57f/0xcf0 [ 493.340911][T15087] ? addrconf_sysctl_register+0x1a0/0x1a0 [ 493.346467][T15087] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 493.351325][T15087] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 493.356361][T15087] ? __kasan_check_write+0x14/0x20 [ 493.361309][T15087] ? ip6_route_add+0x102/0x130 [ 493.365908][T15087] ? addrconf_add_dev+0x419/0x5f0 [ 493.370772][T15087] ? addrconf_verify_rtnl+0xeb0/0xeb0 [ 493.375982][T15087] ? __kasan_check_read+0x11/0x20 [ 493.380837][T15087] addrconf_init_auto_addrs+0xb96/0x1050 [ 493.386304][T15087] ? addrconf_dad_run+0x610/0x610 [ 493.391163][T15087] ? __local_bh_enable_ip+0x58/0x80 [ 493.396202][T15087] ? _raw_write_unlock_bh+0x32/0x50 [ 493.401233][T15087] ? addrconf_permanent_addr+0xb40/0xba0 [ 493.406702][T15087] ? __kasan_check_write+0x14/0x20 [ 493.411650][T15087] ? addrconf_notify+0xe10/0xe10 [ 493.416423][T15087] ? igmpv3_del_delrec+0x740/0x740 [ 493.421368][T15087] ? __local_bh_enable_ip+0x58/0x80 [ 493.426402][T15087] ? __kasan_check_write+0x14/0x20 [ 493.431348][T15087] ? mutex_unlock+0xb2/0x260 [ 493.435776][T15087] ? tun_device_event+0x3ef/0xf80 [ 493.440639][T15087] ? __mutex_lock_slowpath+0x10/0x10 [ 493.445756][T15087] ? macsec_notify+0x101/0x4c0 [ 493.450358][T15087] ? addrconf_link_ready+0xfb/0x1e0 [ 493.455398][T15087] addrconf_notify+0x976/0xe10 [ 493.460002][T15087] raw_notifier_call_chain+0x8c/0xf0 [ 493.465113][T15087] __dev_notify_flags+0x304/0x610 [ 493.469974][T15087] ? __dev_change_flags+0x6e0/0x6e0 [ 493.475008][T15087] ? __dev_change_flags+0x569/0x6e0 [ 493.480042][T15087] ? dev_get_flags+0x1e0/0x1e0 [ 493.484641][T15087] ? kstrtouint+0xf6/0x180 [ 493.488894][T15087] dev_change_flags+0xf0/0x1a0 [ 493.493495][T15087] dev_ifsioc+0x177/0x1150 [ 493.497747][T15087] ? dev_ioctl+0xe60/0xe60 [ 493.502006][T15087] ? __kasan_check_write+0x14/0x20 [ 493.506950][T15087] ? mutex_lock+0xb1/0x1e0 [ 493.511198][T15087] ? bit_wait_io_timeout+0x120/0x120 [ 493.516323][T15087] dev_ioctl+0x543/0xe60 [ 493.520399][T15087] sock_do_ioctl+0x26b/0x450 [ 493.524825][T15087] ? has_cap_mac_admin+0x3c0/0x3c0 [ 493.529776][T15087] ? sock_show_fdinfo+0xa0/0xa0 [ 493.534462][T15087] ? selinux_file_ioctl+0x3cc/0x540 [ 493.539495][T15087] sock_ioctl+0x455/0x740 [ 493.543660][T15087] ? sock_poll+0x400/0x400 [ 493.547916][T15087] ? __fget_files+0x2cb/0x330 [ 493.552426][T15087] ? security_file_ioctl+0x84/0xb0 [ 493.557373][T15087] ? sock_poll+0x400/0x400 [ 493.561713][T15087] __se_sys_ioctl+0x114/0x190 [ 493.566226][T15087] __x64_sys_ioctl+0x7b/0x90 [ 493.570654][T15087] x64_sys_call+0x98/0x9a0 [ 493.574907][T15087] do_syscall_64+0x3b/0xb0 [ 493.579159][T15087] ? clear_bhb_loop+0x55/0xb0 [ 493.583670][T15087] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 493.589400][T15087] RIP: 0033:0x7fb60337dff9 [ 493.593652][T15087] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 493.613184][T15087] RSP: 002b:00007fb6040d3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 493.621425][T15087] RAX: ffffffffffffffda RBX: 00007fb603535f80 RCX: 00007fb60337dff9 [ 493.629236][T15087] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 000000000000000a [ 493.637047][T15087] RBP: 00007fb6040d3090 R08: 0000000000000000 R09: 0000000000000000 [ 493.644861][T15087] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 493.652674][T15087] R13: 0000000000000000 R14: 00007fb603535f80 R15: 00007fff300f2438 [ 493.660490][T15087] [ 493.669477][T15100] device pim6reg1 entered promiscuous mode [ 493.688336][T15100] FAULT_INJECTION: forcing a failure. [ 493.688336][T15100] name failslab, interval 1, probability 0, space 0, times 0 [ 493.727074][T15100] CPU: 0 PID: 15100 Comm: syz.1.4711 Tainted: G W 6.1.99-syzkaller-00049-g1fe91f863a7f #0 [ 493.738190][T15100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 493.748083][T15100] Call Trace: [ 493.751206][T15100] [ 493.753990][T15100] dump_stack_lvl+0x151/0x1b7 [ 493.758507][T15100] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 493.763793][T15100] ? kasan_quarantine_put+0x34/0x1a0 [ 493.768915][T15100] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 493.774641][T15100] dump_stack+0x15/0x1b [ 493.778637][T15100] should_fail_ex+0x3d0/0x520 [ 493.783149][T15100] ? ipv6_add_addr+0x41b/0xdf0 [ 493.787746][T15100] __should_failslab+0xaf/0xf0 [ 493.792349][T15100] should_failslab+0x9/0x20 [ 493.796686][T15100] __kmem_cache_alloc_node+0x3d/0x250 [ 493.801896][T15100] ? ipv6_add_addr+0x41b/0xdf0 [ 493.806494][T15100] kmalloc_trace+0x2a/0xa0 [ 493.810748][T15100] ipv6_add_addr+0x41b/0xdf0 [ 493.815174][T15100] ? ipv6_generate_stable_address+0x6e0/0x6e0 [ 493.821077][T15100] ? nlmsg_notify+0x15a/0x1c0 [ 493.825590][T15100] addrconf_add_linklocal+0x326/0x9e0 [ 493.830802][T15100] ? inet6_addr_del+0x550/0x550 [ 493.835487][T15100] ? rt6_nh_dump_exceptions+0x650/0x650 [ 493.840866][T15100] ? __kasan_check_write+0x14/0x20 [ 493.845813][T15100] ? fib6_add+0x3168/0x3df0 [ 493.850154][T15100] ? memcpy+0x56/0x70 [ 493.853975][T15100] ? ipv6_generate_eui64+0x7b3/0x1080 [ 493.859179][T15100] addrconf_addr_gen+0x57f/0xcf0 [ 493.863953][T15100] ? addrconf_sysctl_register+0x1a0/0x1a0 [ 493.869506][T15100] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 493.874365][T15100] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 493.879402][T15100] ? __kasan_check_write+0x14/0x20 [ 493.884349][T15100] ? ip6_route_add+0x102/0x130 [ 493.888948][T15100] ? addrconf_add_dev+0x419/0x5f0 [ 493.893809][T15100] ? addrconf_verify_rtnl+0xeb0/0xeb0 [ 493.899026][T15100] ? __kasan_check_read+0x11/0x20 [ 493.903876][T15100] addrconf_init_auto_addrs+0xb96/0x1050 [ 493.909347][T15100] ? addrconf_dad_run+0x610/0x610 [ 493.914206][T15100] ? __local_bh_enable_ip+0x58/0x80 [ 493.919238][T15100] ? _raw_write_unlock_bh+0x32/0x50 [ 493.924271][T15100] ? addrconf_permanent_addr+0xb40/0xba0 [ 493.929744][T15100] ? __kasan_check_write+0x14/0x20 [ 493.934689][T15100] ? addrconf_notify+0xe10/0xe10 [ 493.939463][T15100] ? igmpv3_del_delrec+0x740/0x740 [ 493.944405][T15100] ? __local_bh_enable_ip+0x58/0x80 [ 493.949442][T15100] ? __kasan_check_write+0x14/0x20 [ 493.954387][T15100] ? mutex_unlock+0xb2/0x260 [ 493.958822][T15100] ? tun_device_event+0x3ef/0xf80 [ 493.963673][T15100] ? __mutex_lock_slowpath+0x10/0x10 [ 493.968797][T15100] ? macsec_notify+0x101/0x4c0 [ 493.973396][T15100] ? addrconf_link_ready+0xfb/0x1e0 [ 493.978430][T15100] addrconf_notify+0x976/0xe10 [ 493.983047][T15100] raw_notifier_call_chain+0x8c/0xf0 [ 493.988150][T15100] __dev_notify_flags+0x304/0x610 [ 493.993011][T15100] ? __dev_change_flags+0x6e0/0x6e0 [ 493.998043][T15100] ? __dev_change_flags+0x569/0x6e0 [ 494.003079][T15100] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 494.009676][T15100] ? dev_get_flags+0x1e0/0x1e0 [ 494.014275][T15100] ? __request_module+0x3fa/0x8d0 [ 494.019137][T15100] dev_change_flags+0xf0/0x1a0 [ 494.023736][T15100] dev_ifsioc+0x177/0x1150 [ 494.027989][T15100] ? dev_ioctl+0xe60/0xe60 [ 494.032239][T15100] ? __mutex_lock_slowpath+0xe/0x10 [ 494.037276][T15100] ? mutex_lock+0x130/0x1e0 [ 494.041615][T15100] ? bit_wait_io_timeout+0x120/0x120 [ 494.046737][T15100] ? security_capable+0x87/0xb0 [ 494.051456][T15100] dev_ioctl+0x543/0xe60 [ 494.055502][T15100] sock_do_ioctl+0x26b/0x450 [ 494.059927][T15100] ? has_cap_mac_admin+0x3c0/0x3c0 [ 494.064874][T15100] ? sock_show_fdinfo+0xa0/0xa0 [ 494.069563][T15100] ? selinux_file_ioctl+0x3cc/0x540 [ 494.074596][T15100] sock_ioctl+0x455/0x740 [ 494.078763][T15100] ? sock_poll+0x400/0x400 [ 494.083014][T15100] ? __fget_files+0x2cb/0x330 [ 494.087530][T15100] ? security_file_ioctl+0x84/0xb0 [ 494.092474][T15100] ? sock_poll+0x400/0x400 [ 494.096727][T15100] __se_sys_ioctl+0x114/0x190 [ 494.101243][T15100] __x64_sys_ioctl+0x7b/0x90 [ 494.105667][T15100] x64_sys_call+0x98/0x9a0 [ 494.109920][T15100] do_syscall_64+0x3b/0xb0 [ 494.114172][T15100] ? clear_bhb_loop+0x55/0xb0 [ 494.118686][T15100] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 494.124414][T15100] RIP: 0033:0x7ff5b837dff9 [ 494.128668][T15100] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 494.148109][T15100] RSP: 002b:00007ff5b90d3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 494.156355][T15100] RAX: ffffffffffffffda RBX: 00007ff5b8536058 RCX: 00007ff5b837dff9 [ 494.164164][T15100] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 0000000000000006 [ 494.171981][T15100] RBP: 00007ff5b90d3090 R08: 0000000000000000 R09: 0000000000000000 [ 494.179788][T15100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 494.187600][T15100] R13: 0000000000000000 R14: 00007ff5b8536058 R15: 00007ffd4c760f08 [ 494.195415][T15100] [ 495.207653][T15138] device pim6reg1 entered promiscuous mode [ 496.272863][T15193] device pim6reg1 entered promiscuous mode [ 497.143599][T15219] device pim6reg1 entered promiscuous mode [ 497.168613][T15219] FAULT_INJECTION: forcing a failure. [ 497.168613][T15219] name failslab, interval 1, probability 0, space 0, times 0 [ 497.185338][T15219] CPU: 1 PID: 15219 Comm: syz.4.4756 Tainted: G W 6.1.99-syzkaller-00049-g1fe91f863a7f #0 [ 497.196447][T15219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 497.206344][T15219] Call Trace: [ 497.209464][T15219] [ 497.212242][T15219] dump_stack_lvl+0x151/0x1b7 [ 497.216758][T15219] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 497.222049][T15219] ? addrconf_f6i_alloc+0x362/0x4c0 [ 497.227096][T15219] dump_stack+0x15/0x1b [ 497.231076][T15219] should_fail_ex+0x3d0/0x520 [ 497.235594][T15219] ? fib6_info_alloc+0x33/0xe0 [ 497.240189][T15219] __should_failslab+0xaf/0xf0 [ 497.244794][T15219] should_failslab+0x9/0x20 [ 497.249131][T15219] __kmem_cache_alloc_node+0x3d/0x250 [ 497.254338][T15219] ? fib6_info_alloc+0x33/0xe0 [ 497.258939][T15219] __kmalloc+0xa3/0x1e0 [ 497.262932][T15219] fib6_info_alloc+0x33/0xe0 [ 497.267359][T15219] ip6_route_info_create+0x50b/0x14c0 [ 497.272569][T15219] ip6_route_add+0x27/0x130 [ 497.277164][T15219] addrconf_add_linklocal+0x5c8/0x9e0 [ 497.282372][T15219] ? inet6_addr_del+0x550/0x550 [ 497.287067][T15219] ? memcpy+0x56/0x70 [ 497.290877][T15219] ? ipv6_generate_eui64+0x7b3/0x1080 [ 497.296089][T15219] addrconf_addr_gen+0x57f/0xcf0 [ 497.300859][T15219] ? addrconf_sysctl_register+0x1a0/0x1a0 [ 497.306413][T15219] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 497.311275][T15219] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 497.316312][T15219] ? __kasan_check_write+0x14/0x20 [ 497.321255][T15219] ? ip6_route_add+0x102/0x130 [ 497.325857][T15219] ? addrconf_add_dev+0x419/0x5f0 [ 497.330715][T15219] ? addrconf_verify_rtnl+0xeb0/0xeb0 [ 497.335932][T15219] ? __kasan_check_read+0x11/0x20 [ 497.340783][T15219] addrconf_init_auto_addrs+0xb96/0x1050 [ 497.346254][T15219] ? addrconf_dad_run+0x610/0x610 [ 497.351111][T15219] ? __local_bh_enable_ip+0x58/0x80 [ 497.356145][T15219] ? _raw_write_unlock_bh+0x32/0x50 [ 497.361179][T15219] ? addrconf_permanent_addr+0xb40/0xba0 [ 497.366653][T15219] ? __kasan_check_write+0x14/0x20 [ 497.371604][T15219] ? addrconf_notify+0xe10/0xe10 [ 497.376368][T15219] ? igmpv3_del_delrec+0x740/0x740 [ 497.381317][T15219] ? __local_bh_enable_ip+0x58/0x80 [ 497.386351][T15219] ? __kasan_check_write+0x14/0x20 [ 497.391297][T15219] ? mutex_unlock+0xb2/0x260 [ 497.395723][T15219] ? tun_device_event+0x3ef/0xf80 [ 497.400582][T15219] ? __mutex_lock_slowpath+0x10/0x10 [ 497.405704][T15219] ? macsec_notify+0x101/0x4c0 [ 497.410307][T15219] ? addrconf_link_ready+0xfb/0x1e0 [ 497.415339][T15219] addrconf_notify+0x976/0xe10 [ 497.419941][T15219] raw_notifier_call_chain+0x8c/0xf0 [ 497.425188][T15219] __dev_notify_flags+0x304/0x610 [ 497.430047][T15219] ? __dev_change_flags+0x6e0/0x6e0 [ 497.435078][T15219] ? __dev_change_flags+0x569/0x6e0 [ 497.440114][T15219] ? dev_get_flags+0x1e0/0x1e0 [ 497.444712][T15219] ? kstrtouint+0xf6/0x180 [ 497.448967][T15219] dev_change_flags+0xf0/0x1a0 [ 497.453569][T15219] dev_ifsioc+0x177/0x1150 [ 497.457823][T15219] ? dev_ioctl+0xe60/0xe60 [ 497.462071][T15219] ? __kasan_check_write+0x14/0x20 [ 497.467019][T15219] ? mutex_lock+0xb1/0x1e0 [ 497.471271][T15219] ? bit_wait_io_timeout+0x120/0x120 [ 497.476395][T15219] dev_ioctl+0x543/0xe60 [ 497.480473][T15219] sock_do_ioctl+0x26b/0x450 [ 497.484899][T15219] ? has_cap_mac_admin+0x3c0/0x3c0 [ 497.489845][T15219] ? sock_show_fdinfo+0xa0/0xa0 [ 497.494535][T15219] ? selinux_file_ioctl+0x3cc/0x540 [ 497.499563][T15219] sock_ioctl+0x455/0x740 [ 497.503729][T15219] ? sock_poll+0x400/0x400 [ 497.507980][T15219] ? __fget_files+0x2cb/0x330 [ 497.512495][T15219] ? security_file_ioctl+0x84/0xb0 [ 497.517445][T15219] ? sock_poll+0x400/0x400 [ 497.521694][T15219] __se_sys_ioctl+0x114/0x190 [ 497.526207][T15219] __x64_sys_ioctl+0x7b/0x90 [ 497.530633][T15219] x64_sys_call+0x98/0x9a0 [ 497.534887][T15219] do_syscall_64+0x3b/0xb0 [ 497.539139][T15219] ? clear_bhb_loop+0x55/0xb0 [ 497.543653][T15219] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 497.549380][T15219] RIP: 0033:0x7f372277dff9 [ 497.553635][T15219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 497.573081][T15219] RSP: 002b:00007f3723545038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 497.581321][T15219] RAX: ffffffffffffffda RBX: 00007f3722935f80 RCX: 00007f372277dff9 [ 497.589132][T15219] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 000000000000000a [ 497.596946][T15219] RBP: 00007f3723545090 R08: 0000000000000000 R09: 0000000000000000 [ 497.604756][T15219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 497.612566][T15219] R13: 0000000000000000 R14: 00007f3722935f80 R15: 00007ffc5e714f68 [ 497.620384][T15219] [ 497.636891][T15223] device pim6reg1 entered promiscuous mode [ 497.659661][T15231] device pim6reg1 entered promiscuous mode [ 497.998819][T15255] device pim6reg1 entered promiscuous mode [ 498.302415][T15271] device pim6reg1 entered promiscuous mode [ 498.738130][T15294] device pim6reg1 entered promiscuous mode [ 498.848612][T15304] device pim6reg1 entered promiscuous mode [ 498.878385][T15309] device pim6reg1 entered promiscuous mode [ 499.072062][T15324] device pim6reg1 entered promiscuous mode [ 499.161429][T15335] device pim6reg1 entered promiscuous mode [ 499.630272][T15369] device pim6reg1 entered promiscuous mode [ 499.674229][T15376] device pim6reg1 entered promiscuous mode [ 499.681314][T15376] FAULT_INJECTION: forcing a failure. [ 499.681314][T15376] name failslab, interval 1, probability 0, space 0, times 0 [ 499.712758][T15376] CPU: 1 PID: 15376 Comm: syz.2.4813 Tainted: G W 6.1.99-syzkaller-00049-g1fe91f863a7f #0 [ 499.723870][T15376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 499.733766][T15376] Call Trace: [ 499.736889][T15376] [ 499.739665][T15376] dump_stack_lvl+0x151/0x1b7 [ 499.744182][T15376] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 499.749473][T15376] ? rt6_sync_up+0x1f0/0x1f0 [ 499.753899][T15376] ? fib6_del+0x1060/0x1060 [ 499.758243][T15376] dump_stack+0x15/0x1b [ 499.762231][T15376] should_fail_ex+0x3d0/0x520 [ 499.766749][T15376] ? __alloc_skb+0xcc/0x2d0 [ 499.771090][T15376] __should_failslab+0xaf/0xf0 [ 499.775686][T15376] should_failslab+0x9/0x20 [ 499.780026][T15376] kmem_cache_alloc_node+0x3e/0x2d0 [ 499.785059][T15376] ? rt6_sync_up+0x17a/0x1f0 [ 499.789487][T15376] __alloc_skb+0xcc/0x2d0 [ 499.793653][T15376] inet6_ifinfo_notify+0x70/0x110 [ 499.798511][T15376] addrconf_notify+0xae5/0xe10 [ 499.803114][T15376] raw_notifier_call_chain+0x8c/0xf0 [ 499.808232][T15376] __dev_notify_flags+0x304/0x610 [ 499.813092][T15376] ? __dev_change_flags+0x6e0/0x6e0 [ 499.818126][T15376] ? __dev_change_flags+0x569/0x6e0 [ 499.823158][T15376] ? dev_get_flags+0x1e0/0x1e0 [ 499.827758][T15376] ? kstrtouint+0xf6/0x180 [ 499.832012][T15376] dev_change_flags+0xf0/0x1a0 [ 499.836612][T15376] dev_ifsioc+0x177/0x1150 [ 499.840871][T15376] ? dev_ioctl+0xe60/0xe60 [ 499.845129][T15376] ? __kasan_check_write+0x14/0x20 [ 499.850064][T15376] ? mutex_lock+0xb1/0x1e0 [ 499.854315][T15376] ? bit_wait_io_timeout+0x120/0x120 [ 499.859440][T15376] dev_ioctl+0x543/0xe60 [ 499.863517][T15376] sock_do_ioctl+0x26b/0x450 [ 499.867943][T15376] ? has_cap_mac_admin+0x3c0/0x3c0 [ 499.872891][T15376] ? sock_show_fdinfo+0xa0/0xa0 [ 499.877579][T15376] ? selinux_file_ioctl+0x3cc/0x540 [ 499.882610][T15376] sock_ioctl+0x455/0x740 [ 499.886777][T15376] ? sock_poll+0x400/0x400 [ 499.891027][T15376] ? __fget_files+0x2cb/0x330 [ 499.895547][T15376] ? security_file_ioctl+0x84/0xb0 [ 499.900489][T15376] ? sock_poll+0x400/0x400 [ 499.904741][T15376] __se_sys_ioctl+0x114/0x190 [ 499.909258][T15376] __x64_sys_ioctl+0x7b/0x90 [ 499.913682][T15376] x64_sys_call+0x98/0x9a0 [ 499.917934][T15376] do_syscall_64+0x3b/0xb0 [ 499.922187][T15376] ? clear_bhb_loop+0x55/0xb0 [ 499.926702][T15376] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 499.932429][T15376] RIP: 0033:0x7f891db7dff9 [ 499.936684][T15376] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 499.956131][T15376] RSP: 002b:00007f891e8b1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 499.964375][T15376] RAX: ffffffffffffffda RBX: 00007f891dd35f80 RCX: 00007f891db7dff9 [ 499.972182][T15376] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 000000000000000a [ 499.979995][T15376] RBP: 00007f891e8b1090 R08: 0000000000000000 R09: 0000000000000000 [ 499.987803][T15376] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 499.995614][T15376] R13: 0000000000000000 R14: 00007f891dd35f80 R15: 00007ffea1879778 [ 500.003432][T15376] [ 500.303604][T15414] device pim6reg1 entered promiscuous mode [ 500.317476][T15418] FAULT_INJECTION: forcing a failure. [ 500.317476][T15418] name failslab, interval 1, probability 0, space 0, times 0 [ 500.329887][T15418] CPU: 1 PID: 15418 Comm: syz.4.4829 Tainted: G W 6.1.99-syzkaller-00049-g1fe91f863a7f #0 [ 500.340993][T15418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 500.350975][T15418] Call Trace: [ 500.354099][T15418] [ 500.356875][T15418] dump_stack_lvl+0x151/0x1b7 [ 500.361392][T15418] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 500.366684][T15418] ? __sigqueue_alloc+0x130/0x200 [ 500.371545][T15418] dump_stack+0x15/0x1b [ 500.375539][T15418] should_fail_ex+0x3d0/0x520 [ 500.380055][T15418] ? __sigqueue_alloc+0x130/0x200 [ 500.384912][T15418] __should_failslab+0xaf/0xf0 [ 500.389517][T15418] should_failslab+0x9/0x20 [ 500.393850][T15418] kmem_cache_alloc+0x3b/0x2c0 [ 500.398450][T15418] __sigqueue_alloc+0x130/0x200 [ 500.403135][T15418] __send_signal_locked+0x1a3/0xc30 [ 500.408171][T15418] send_signal_locked+0x43a/0x590 [ 500.413031][T15418] do_send_sig_info+0xde/0x230 [ 500.417630][T15418] group_send_sig_info+0x113/0x320 [ 500.422577][T15418] ? __lock_task_sighand+0x100/0x100 [ 500.427700][T15418] ? tracing_record_taskinfo_sched_switch+0x84/0x390 [ 500.434325][T15418] bpf_send_signal_common+0x2d8/0x420 [ 500.439531][T15418] ? trace_raw_output_bpf_trace_printk+0xd0/0xd0 [ 500.445694][T15418] ? pcpu_chunk_refresh_hint+0x802/0x930 [ 500.451159][T15418] bpf_send_signal+0x19/0x20 [ 500.455584][T15418] bpf_prog_c3f41664225ce077+0x1a/0x21 [ 500.460878][T15418] bpf_trace_run10+0x246/0x390 [ 500.465481][T15418] ? bpf_trace_run9+0x390/0x390 [ 500.470164][T15418] ? __alloc_percpu_gfp+0x27/0x30 [ 500.475026][T15418] ? __kasan_check_write+0x14/0x20 [ 500.479975][T15418] ? mutex_unlock+0xb2/0x260 [ 500.484401][T15418] ? __alloc_percpu_gfp+0x27/0x30 [ 500.489260][T15418] __bpf_trace_percpu_alloc_percpu+0x4d/0x60 [ 500.495076][T15418] ? __alloc_percpu_gfp+0x27/0x30 [ 500.499934][T15418] pcpu_alloc+0x12d7/0x1440 [ 500.504278][T15418] __alloc_percpu_gfp+0x27/0x30 [ 500.508962][T15418] bpf_map_alloc_percpu+0xd2/0x2c0 [ 500.513915][T15418] array_map_alloc+0x3ab/0x6d0 [ 500.518510][T15418] map_create+0x44a/0xcf0 [ 500.522676][T15418] __sys_bpf+0x2e6/0x7f0 [ 500.526842][T15418] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 500.532058][T15418] ? __ia32_sys_read+0x90/0x90 [ 500.536653][T15418] ? debug_smp_processor_id+0x17/0x20 [ 500.541855][T15418] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 500.547845][T15418] __x64_sys_bpf+0x7c/0x90 [ 500.552098][T15418] x64_sys_call+0x87f/0x9a0 [ 500.556443][T15418] do_syscall_64+0x3b/0xb0 [ 500.560690][T15418] ? clear_bhb_loop+0x55/0xb0 [ 500.565204][T15418] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 500.570936][T15418] RIP: 0033:0x7f372277dff9 [ 500.575192][T15418] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 500.594626][T15418] RSP: 002b:00007f3723545038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 500.602872][T15418] RAX: ffffffffffffffda RBX: 00007f3722935f80 RCX: 00007f372277dff9 [ 500.610683][T15418] RDX: 0000000000000048 RSI: 0000000020000b00 RDI: 2000000000000000 [ 500.618493][T15418] RBP: 00007f3723545090 R08: 0000000000000000 R09: 0000000000000000 [ 500.626306][T15418] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 500.634117][T15418] R13: 0000000000000000 R14: 00007f3722935f80 R15: 00007ffc5e714f68 [ 500.641937][T15418] [ 500.718123][T15430] device pim6reg1 entered promiscuous mode [ 500.784455][T15444] device pim6reg1 entered promiscuous mode [ 501.707442][T15456] device syzkaller0 entered promiscuous mode [ 501.719839][T15463] device pim6reg1 entered promiscuous mode [ 501.785647][T15463] FAULT_INJECTION: forcing a failure. [ 501.785647][T15463] name failslab, interval 1, probability 0, space 0, times 0 [ 501.855435][T15463] CPU: 0 PID: 15463 Comm: syz.3.4852 Tainted: G W 6.1.99-syzkaller-00049-g1fe91f863a7f #0 [ 501.866548][T15463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 501.876442][T15463] Call Trace: [ 501.879564][T15463] [ 501.882343][T15463] dump_stack_lvl+0x151/0x1b7 [ 501.886856][T15463] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 501.892151][T15463] ? addrconf_f6i_alloc+0x362/0x4c0 [ 501.897185][T15463] dump_stack+0x15/0x1b [ 501.901174][T15463] should_fail_ex+0x3d0/0x520 [ 501.905691][T15463] ? fib6_info_alloc+0x33/0xe0 [ 501.910288][T15463] __should_failslab+0xaf/0xf0 [ 501.914886][T15463] should_failslab+0x9/0x20 [ 501.919226][T15463] __kmem_cache_alloc_node+0x3d/0x250 [ 501.924433][T15463] ? fib6_info_alloc+0x33/0xe0 [ 501.929033][T15463] __kmalloc+0xa3/0x1e0 [ 501.933026][T15463] fib6_info_alloc+0x33/0xe0 [ 501.937452][T15463] ip6_route_info_create+0x50b/0x14c0 [ 501.942662][T15463] ip6_route_add+0x27/0x130 [ 501.947001][T15463] addrconf_add_linklocal+0x5c8/0x9e0 [ 501.952207][T15463] ? inet6_addr_del+0x550/0x550 [ 501.956901][T15463] ? memcpy+0x56/0x70 [ 501.960713][T15463] ? ipv6_generate_eui64+0x7b3/0x1080 [ 501.965923][T15463] addrconf_addr_gen+0x57f/0xcf0 [ 501.970696][T15463] ? addrconf_sysctl_register+0x1a0/0x1a0 [ 501.976250][T15463] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 501.981110][T15463] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 501.986147][T15463] ? __kasan_check_write+0x14/0x20 [ 501.991090][T15463] ? ip6_route_add+0x102/0x130 [ 501.995692][T15463] ? addrconf_add_dev+0x419/0x5f0 [ 502.000552][T15463] ? addrconf_verify_rtnl+0xeb0/0xeb0 [ 502.005763][T15463] ? __kasan_check_read+0x11/0x20 [ 502.010619][T15463] addrconf_init_auto_addrs+0xb96/0x1050 [ 502.016089][T15463] ? addrconf_dad_run+0x610/0x610 [ 502.020946][T15463] ? __local_bh_enable_ip+0x58/0x80 [ 502.025982][T15463] ? _raw_write_unlock_bh+0x32/0x50 [ 502.031015][T15463] ? addrconf_permanent_addr+0xb40/0xba0 [ 502.036484][T15463] ? __kasan_check_write+0x14/0x20 [ 502.041430][T15463] ? addrconf_notify+0xe10/0xe10 [ 502.046203][T15463] ? igmpv3_del_delrec+0x740/0x740 [ 502.051150][T15463] ? __local_bh_enable_ip+0x58/0x80 [ 502.056205][T15463] ? __kasan_check_write+0x14/0x20 [ 502.061131][T15463] ? mutex_unlock+0xb2/0x260 [ 502.065558][T15463] ? tun_device_event+0x3ef/0xf80 [ 502.070421][T15463] ? __mutex_lock_slowpath+0x10/0x10 [ 502.075540][T15463] ? macsec_notify+0x101/0x4c0 [ 502.080145][T15463] ? addrconf_link_ready+0xfb/0x1e0 [ 502.085176][T15463] addrconf_notify+0x976/0xe10 [ 502.089780][T15463] raw_notifier_call_chain+0x8c/0xf0 [ 502.094896][T15463] __dev_notify_flags+0x304/0x610 [ 502.099757][T15463] ? __dev_change_flags+0x6e0/0x6e0 [ 502.104787][T15463] ? __dev_change_flags+0x569/0x6e0 [ 502.109824][T15463] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 502.116421][T15463] ? dev_get_flags+0x1e0/0x1e0 [ 502.121021][T15463] ? __request_module+0x3fa/0x8d0 [ 502.125883][T15463] dev_change_flags+0xf0/0x1a0 [ 502.130483][T15463] dev_ifsioc+0x177/0x1150 [ 502.134741][T15463] ? dev_ioctl+0xe60/0xe60 [ 502.138987][T15463] ? __mutex_lock_slowpath+0xe/0x10 [ 502.144018][T15463] ? mutex_lock+0x130/0x1e0 [ 502.148360][T15463] ? bit_wait_io_timeout+0x120/0x120 [ 502.153479][T15463] ? security_capable+0x87/0xb0 [ 502.158171][T15463] dev_ioctl+0x543/0xe60 [ 502.162249][T15463] sock_do_ioctl+0x26b/0x450 [ 502.166674][T15463] ? has_cap_mac_admin+0x3c0/0x3c0 [ 502.171620][T15463] ? sock_show_fdinfo+0xa0/0xa0 [ 502.176310][T15463] ? selinux_file_ioctl+0x3cc/0x540 [ 502.181342][T15463] sock_ioctl+0x455/0x740 [ 502.185517][T15463] ? sock_poll+0x400/0x400 [ 502.189760][T15463] ? __fget_files+0x2cb/0x330 [ 502.194275][T15463] ? security_file_ioctl+0x84/0xb0 [ 502.199223][T15463] ? sock_poll+0x400/0x400 [ 502.203475][T15463] __se_sys_ioctl+0x114/0x190 [ 502.207989][T15463] __x64_sys_ioctl+0x7b/0x90 [ 502.212412][T15463] x64_sys_call+0x98/0x9a0 [ 502.216667][T15463] do_syscall_64+0x3b/0xb0 [ 502.220918][T15463] ? clear_bhb_loop+0x55/0xb0 [ 502.225431][T15463] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 502.231159][T15463] RIP: 0033:0x7fb60337dff9 [ 502.235415][T15463] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 502.254856][T15463] RSP: 002b:00007fb6040b2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 502.263100][T15463] RAX: ffffffffffffffda RBX: 00007fb603536058 RCX: 00007fb60337dff9 [ 502.270910][T15463] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 000000000000000a [ 502.278723][T15463] RBP: 00007fb6040b2090 R08: 0000000000000000 R09: 0000000000000000 [ 502.286538][T15463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 502.294350][T15463] R13: 0000000000000000 R14: 00007fb603536058 R15: 00007fff300f2438 [ 502.302164][T15463] [ 503.153129][T15481] device pim6reg1 entered promiscuous mode [ 504.121177][T15504] bridge0: port 1(bridge_slave_0) entered blocking state [ 504.129278][T15504] bridge0: port 1(bridge_slave_0) entered disabled state [ 504.136636][T15504] device bridge_slave_0 entered promiscuous mode [ 504.153240][T15504] bridge0: port 2(bridge_slave_1) entered blocking state [ 504.160103][T15504] bridge0: port 2(bridge_slave_1) entered disabled state [ 504.167364][T15504] device bridge_slave_1 entered promiscuous mode [ 504.183904][T15507] bridge0: port 1(bridge_slave_0) entered blocking state [ 504.190908][T15507] bridge0: port 1(bridge_slave_0) entered disabled state [ 504.198433][T15507] device bridge_slave_0 entered promiscuous mode [ 504.206088][T15507] bridge0: port 2(bridge_slave_1) entered blocking state [ 504.212926][T15507] bridge0: port 2(bridge_slave_1) entered disabled state [ 504.220456][T15507] device bridge_slave_1 entered promiscuous mode [ 504.240195][T15521] device pim6reg1 entered promiscuous mode [ 504.267679][T15508] bridge0: port 1(bridge_slave_0) entered blocking state [ 504.274533][T15508] bridge0: port 1(bridge_slave_0) entered disabled state [ 504.284149][T15508] device bridge_slave_0 entered promiscuous mode [ 504.304870][T15508] bridge0: port 2(bridge_slave_1) entered blocking state [ 504.311777][T15508] bridge0: port 2(bridge_slave_1) entered disabled state [ 504.319431][T15508] device bridge_slave_1 entered promiscuous mode [ 504.413542][ T380] device erspan0 left promiscuous mode [ 504.418845][ T380] GPL: port 1(erspan0) entered disabled state [ 504.426813][ T380] device erspan0 left promiscuous mode [ 504.432091][ T380] GPL: port 1(erspan0) entered disabled state [ 504.440098][ T380] device erspan0 left promiscuous mode [ 504.445373][ T380] GPL: port 1(erspan0) entered disabled state [ 504.504412][T15508] bridge0: port 2(bridge_slave_1) entered blocking state [ 504.511283][T15508] bridge0: port 2(bridge_slave_1) entered forwarding state [ 504.518385][T15508] bridge0: port 1(bridge_slave_0) entered blocking state [ 504.525159][T15508] bridge0: port 1(bridge_slave_0) entered forwarding state [ 504.540503][T15504] bridge0: port 2(bridge_slave_1) entered blocking state [ 504.547363][T15504] bridge0: port 2(bridge_slave_1) entered forwarding state [ 504.554433][T15504] bridge0: port 1(bridge_slave_0) entered blocking state [ 504.561252][T15504] bridge0: port 1(bridge_slave_0) entered forwarding state [ 504.612528][T15507] bridge0: port 2(bridge_slave_1) entered blocking state [ 504.619387][T15507] bridge0: port 2(bridge_slave_1) entered forwarding state [ 504.626464][T15507] bridge0: port 1(bridge_slave_0) entered blocking state [ 504.633257][T15507] bridge0: port 1(bridge_slave_0) entered forwarding state [ 504.664497][ T6] bridge0: port 1(bridge_slave_0) entered disabled state [ 504.672099][ T6] bridge0: port 2(bridge_slave_1) entered disabled state [ 504.682038][ T6] bridge0: port 1(bridge_slave_0) entered disabled state [ 504.689282][ T6] bridge0: port 2(bridge_slave_1) entered disabled state [ 504.696390][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 504.703835][ T6] bridge0: port 1(bridge_slave_0) entered disabled state [ 504.711196][ T6] bridge0: port 2(bridge_slave_1) entered disabled state [ 504.736094][ T380] device team_slave_1 left promiscuous mode [ 504.741855][ T380] bridge0: port 3(team_slave_1) entered disabled state [ 504.749988][ T380] device bridge_slave_1 left promiscuous mode [ 504.755967][ T380] bridge0: port 2(bridge_slave_1) entered disabled state [ 504.763367][ T380] device bridge_slave_0 left promiscuous mode [ 504.770486][ T380] bridge0: port 1(bridge_slave_0) entered disabled state [ 504.779147][ T380] device bridge_slave_1 left promiscuous mode [ 504.785080][ T380] bridge0: port 2(bridge_slave_1) entered disabled state [ 504.793076][ T380] device bridge_slave_0 left promiscuous mode [ 504.799252][ T380] bridge0: port 1(bridge_slave_0) entered disabled state [ 504.807775][ T380] device bridge_slave_1 left promiscuous mode [ 504.813735][ T380] bridge0: port 2(bridge_slave_1) entered disabled state [ 504.822322][ T380] device bridge_slave_0 left promiscuous mode [ 504.828347][ T380] bridge0: port 1(bridge_slave_0) entered disabled state [ 504.837247][ T380] device veth1_macvtap left promiscuous mode [ 504.843156][ T380] device veth0_vlan left promiscuous mode [ 504.849355][ T380] device veth1_macvtap left promiscuous mode [ 504.855177][ T380] device veth0_vlan left promiscuous mode [ 504.861730][ T380] device veth1_macvtap left promiscuous mode [ 504.867691][ T380] device veth0_vlan left promiscuous mode [ 505.207042][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 505.214335][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 505.222989][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 505.230917][T14363] bridge0: port 1(bridge_slave_0) entered blocking state [ 505.237752][T14363] bridge0: port 1(bridge_slave_0) entered forwarding state [ 505.246061][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 505.254044][T14363] bridge0: port 2(bridge_slave_1) entered blocking state [ 505.260893][T14363] bridge0: port 2(bridge_slave_1) entered forwarding state [ 505.268027][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 505.275909][T14363] bridge0: port 1(bridge_slave_0) entered blocking state [ 505.282727][T14363] bridge0: port 1(bridge_slave_0) entered forwarding state [ 505.289934][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 505.297862][T14363] bridge0: port 2(bridge_slave_1) entered blocking state [ 505.304674][T14363] bridge0: port 2(bridge_slave_1) entered forwarding state [ 505.311861][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 505.319784][T14363] bridge0: port 1(bridge_slave_0) entered blocking state [ 505.326615][T14363] bridge0: port 1(bridge_slave_0) entered forwarding state [ 505.333961][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 505.341919][T14363] bridge0: port 2(bridge_slave_1) entered blocking state [ 505.348750][T14363] bridge0: port 2(bridge_slave_1) entered forwarding state [ 505.376498][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 505.384351][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 505.392139][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 505.399993][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 505.407784][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 505.416040][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 505.438231][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 505.446158][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 505.453832][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 505.462224][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 505.470015][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 505.477779][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 505.485474][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 505.493519][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 505.507057][T15508] device veth0_vlan entered promiscuous mode [ 505.514316][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 505.522579][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 505.530719][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 505.538441][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 505.546153][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 505.553725][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 505.562797][T15504] device veth0_vlan entered promiscuous mode [ 505.570766][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 505.578001][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 505.585138][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 505.592610][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 505.605507][T15508] device veth1_macvtap entered promiscuous mode [ 505.618055][T15507] device veth0_vlan entered promiscuous mode [ 505.626037][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 505.633931][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 505.642319][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 505.649781][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 505.657922][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 505.666128][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 505.673701][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 505.685573][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 505.692845][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 505.700318][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 505.708856][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 505.721126][T15507] device veth1_macvtap entered promiscuous mode [ 505.729639][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 505.737649][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 505.745804][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 505.753652][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 505.761617][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 505.769304][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 505.777262][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 505.801903][T15504] device veth1_macvtap entered promiscuous mode [ 505.823736][T15555] device syzkaller0 entered promiscuous mode [ 505.833623][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 505.842020][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 505.850144][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 505.866264][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 505.874449][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 505.893024][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 505.904743][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 505.913543][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 505.922586][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 505.987143][T15563] device pim6reg1 entered promiscuous mode [ 506.187481][T15573] device pim6reg1 entered promiscuous mode [ 506.488072][T15595] device pim6reg1 entered promiscuous mode [ 506.503322][T15608] device veth0_vlan left promiscuous mode [ 506.509353][T15608] device veth0_vlan entered promiscuous mode [ 506.715763][T15621] device pim6reg1 entered promiscuous mode [ 507.258826][T15652] device pim6reg1 entered promiscuous mode [ 507.396090][T15660] device pim6reg1 entered promiscuous mode [ 507.457702][T15665] device pim6reg1 entered promiscuous mode [ 507.622052][T15673] device pim6reg1 entered promiscuous mode [ 508.150090][T15682] device pim6reg1 entered promiscuous mode [ 508.343094][T15690] device pim6reg1 entered promiscuous mode [ 509.003870][T15730] device pim6reg1 entered promiscuous mode [ 509.111842][T15721] bridge0: port 1(bridge_slave_0) entered blocking state [ 509.147422][T15721] bridge0: port 1(bridge_slave_0) entered disabled state [ 509.186017][T15721] device bridge_slave_0 entered promiscuous mode [ 509.251091][T15721] bridge0: port 2(bridge_slave_1) entered blocking state [ 509.257988][T15721] bridge0: port 2(bridge_slave_1) entered disabled state [ 509.265879][T15721] device bridge_slave_1 entered promiscuous mode [ 509.377069][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 509.399273][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 509.728157][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 509.745851][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 509.753833][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 509.760693][ T294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 509.946818][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 509.994128][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 510.057074][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 510.063945][ T294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 510.162822][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 510.315818][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 510.323786][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 510.331970][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 510.363181][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 510.391359][T15721] device veth0_vlan entered promiscuous mode [ 510.401920][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 510.426230][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 510.434321][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 510.486991][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 510.501115][T15721] device veth1_macvtap entered promiscuous mode [ 510.510467][T15785] device pim6reg1 entered promiscuous mode [ 510.545211][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 510.665765][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 510.673180][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 510.744500][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 510.752497][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 510.760015][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 510.768298][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 510.776467][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 510.784405][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 510.850583][T15796] device pim6reg1 entered promiscuous mode [ 511.020135][T15807] device veth1_macvtap left promiscuous mode [ 511.364457][T15822] device pim6reg1 entered promiscuous mode [ 512.581455][T15854] device pim6reg1 entered promiscuous mode [ 516.420274][T15987] device syzkaller0 entered promiscuous mode [ 516.496424][T15990] bond_slave_1: mtu less than device minimum [ 516.638937][T16004] device sit0 entered promiscuous mode [ 518.694776][T16056] device pim6reg1 entered promiscuous mode [ 518.932808][T16070] device sit0 entered promiscuous mode [ 519.384598][T16089] device syzkaller0 entered promiscuous mode [ 520.218629][T16121] device pim6reg1 entered promiscuous mode [ 520.881856][T16138] device syzkaller0 entered promiscuous mode [ 521.042677][T16149] device sit0 left promiscuous mode [ 522.008662][T16180] device pim6reg1 entered promiscuous mode [ 522.343806][T16145] bridge0: port 1(bridge_slave_0) entered blocking state [ 522.354616][T16145] bridge0: port 1(bridge_slave_0) entered disabled state [ 522.414220][T16145] device bridge_slave_0 entered promiscuous mode [ 522.522787][T16145] bridge0: port 2(bridge_slave_1) entered blocking state [ 522.647454][T16145] bridge0: port 2(bridge_slave_1) entered disabled state [ 522.663303][T16145] device bridge_slave_1 entered promiscuous mode [ 522.763545][T16206] device veth0_vlan left promiscuous mode [ 522.889096][T16206] device veth0_vlan entered promiscuous mode [ 523.044629][T16224] device pim6reg1 entered promiscuous mode [ 523.092941][T16225] device pim6reg1 entered promiscuous mode [ 523.109230][ T43] device erspan0 left promiscuous mode [ 523.114564][ T43] GPL: port 1(erspan0) entered disabled state [ 523.309281][T16231] device pim6reg1 entered promiscuous mode [ 523.361832][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 523.380710][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 523.487955][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 523.496707][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 523.504679][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 523.511542][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 523.571533][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 523.621713][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 523.681301][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 523.688177][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 523.719475][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 523.735176][T16145] device veth0_vlan entered promiscuous mode [ 523.741927][T16245] FAULT_INJECTION: forcing a failure. [ 523.741927][T16245] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 523.748832][T16145] device veth1_macvtap entered promiscuous mode [ 523.761264][T16245] CPU: 0 PID: 16245 Comm: syz.4.5118 Tainted: G W 6.1.99-syzkaller-00049-g1fe91f863a7f #0 [ 523.772357][T16245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 523.782252][T16245] Call Trace: [ 523.785375][T16245] [ 523.788153][T16245] dump_stack_lvl+0x151/0x1b7 [ 523.792668][T16245] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 523.797962][T16245] dump_stack+0x15/0x1b [ 523.801953][T16245] should_fail_ex+0x3d0/0x520 [ 523.806467][T16245] should_fail+0xb/0x10 [ 523.810457][T16245] should_fail_usercopy+0x1a/0x20 [ 523.815320][T16245] _copy_from_user+0x1e/0xc0 [ 523.819747][T16245] get_user_ifreq+0xd5/0x230 [ 523.824173][T16245] sock_do_ioctl+0x1a7/0x450 [ 523.828599][T16245] ? has_cap_mac_admin+0x3c0/0x3c0 [ 523.833547][T16245] ? sock_show_fdinfo+0xa0/0xa0 [ 523.838234][T16245] ? selinux_file_ioctl+0x3cc/0x540 [ 523.843267][T16245] sock_ioctl+0x455/0x740 [ 523.847432][T16245] ? sock_poll+0x400/0x400 [ 523.851685][T16245] ? __fget_files+0x2cb/0x330 [ 523.856201][T16245] ? security_file_ioctl+0x84/0xb0 [ 523.861144][T16245] ? sock_poll+0x400/0x400 [ 523.865399][T16245] __se_sys_ioctl+0x114/0x190 [ 523.869912][T16245] __x64_sys_ioctl+0x7b/0x90 [ 523.874339][T16245] x64_sys_call+0x98/0x9a0 [ 523.878590][T16245] do_syscall_64+0x3b/0xb0 [ 523.882845][T16245] ? clear_bhb_loop+0x55/0xb0 [ 523.887358][T16245] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 523.893086][T16245] RIP: 0033:0x7f083317dff9 [ 523.897342][T16245] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 523.916781][T16245] RSP: 002b:00007f0833f0b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 523.925027][T16245] RAX: ffffffffffffffda RBX: 00007f0833336058 RCX: 00007f083317dff9 [ 523.932836][T16245] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 0000000000000008 [ 523.940645][T16245] RBP: 00007f0833f0b090 R08: 0000000000000000 R09: 0000000000000000 [ 523.948456][T16245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 523.956268][T16245] R13: 0000000000000000 R14: 00007f0833336058 R15: 00007ffd52cc2068 [ 523.964082][T16245] [ 523.967967][ T43] device bridge_slave_1 left promiscuous mode [ 523.973892][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 523.981962][ T43] device bridge_slave_0 left promiscuous mode [ 523.988041][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 523.995783][ T43] device veth1_macvtap left promiscuous mode [ 524.001687][ T43] device veth0_vlan left promiscuous mode [ 524.139746][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 524.148052][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 524.156169][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 524.163397][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 524.170892][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 524.179063][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 524.186604][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 524.206815][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 524.214917][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 524.223057][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 524.231289][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 524.292604][T16258] device pim6reg1 entered promiscuous mode [ 524.477077][T16271] device pim6reg1 entered promiscuous mode [ 525.080465][T16283] FAULT_INJECTION: forcing a failure. [ 525.080465][T16283] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 525.130799][T16288] FAULT_INJECTION: forcing a failure. [ 525.130799][T16288] name failslab, interval 1, probability 0, space 0, times 0 [ 525.175785][T16283] CPU: 1 PID: 16283 Comm: syz.3.5133 Tainted: G W 6.1.99-syzkaller-00049-g1fe91f863a7f #0 [ 525.186902][T16283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 525.196797][T16283] Call Trace: [ 525.199917][T16283] [ 525.202697][T16283] dump_stack_lvl+0x151/0x1b7 [ 525.207212][T16283] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 525.212506][T16283] dump_stack+0x15/0x1b [ 525.216499][T16283] should_fail_ex+0x3d0/0x520 [ 525.221008][T16283] should_fail+0xb/0x10 [ 525.224999][T16283] should_fail_usercopy+0x1a/0x20 [ 525.229861][T16283] _copy_to_user+0x1e/0x90 [ 525.234112][T16283] simple_read_from_buffer+0xc7/0x150 [ 525.239326][T16283] proc_fail_nth_read+0x1a3/0x210 [ 525.244181][T16283] ? proc_fault_inject_write+0x390/0x390 [ 525.249649][T16283] ? fsnotify_perm+0x269/0x5b0 [ 525.254251][T16283] ? security_file_permission+0x86/0xb0 [ 525.259633][T16283] ? proc_fault_inject_write+0x390/0x390 [ 525.265106][T16283] vfs_read+0x26c/0xae0 [ 525.269096][T16283] ? kernel_read+0x1f0/0x1f0 [ 525.273522][T16283] ? mutex_lock+0xb1/0x1e0 [ 525.277772][T16283] ? bit_wait_io_timeout+0x120/0x120 [ 525.282895][T16283] ? __fdget_pos+0x2e2/0x390 [ 525.287319][T16283] ? ksys_read+0x77/0x2c0 [ 525.291490][T16283] ksys_read+0x199/0x2c0 [ 525.295570][T16283] ? vfs_write+0xed0/0xed0 [ 525.299817][T16283] ? debug_smp_processor_id+0x17/0x20 [ 525.305024][T16283] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 525.310928][T16283] __x64_sys_read+0x7b/0x90 [ 525.315266][T16283] x64_sys_call+0x28/0x9a0 [ 525.319521][T16283] do_syscall_64+0x3b/0xb0 [ 525.323771][T16283] ? clear_bhb_loop+0x55/0xb0 [ 525.328286][T16283] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 525.334014][T16283] RIP: 0033:0x7f73cf17ca3c [ 525.338276][T16283] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 525.357711][T16283] RSP: 002b:00007f73cfee3030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 525.365956][T16283] RAX: ffffffffffffffda RBX: 00007f73cf335f80 RCX: 00007f73cf17ca3c [ 525.373763][T16283] RDX: 000000000000000f RSI: 00007f73cfee30a0 RDI: 0000000000000008 [ 525.381574][T16283] RBP: 00007f73cfee3090 R08: 0000000000000000 R09: 0000000000000000 [ 525.389387][T16283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 525.397199][T16283] R13: 0000000000000000 R14: 00007f73cf335f80 R15: 00007ffd74c676e8 [ 525.405015][T16283] [ 525.407874][T16288] CPU: 0 PID: 16288 Comm: syz.0.5134 Tainted: G W 6.1.99-syzkaller-00049-g1fe91f863a7f #0 [ 525.419097][T16288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 525.428994][T16288] Call Trace: [ 525.432115][T16288] [ 525.434895][T16288] dump_stack_lvl+0x151/0x1b7 [ 525.439409][T16288] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 525.444704][T16288] ? avc_has_perm_noaudit+0x430/0x430 [ 525.449910][T16288] dump_stack+0x15/0x1b [ 525.454002][T16288] should_fail_ex+0x3d0/0x520 [ 525.458513][T16288] ? __request_module+0x28c/0x8d0 [ 525.463373][T16288] __should_failslab+0xaf/0xf0 [ 525.467975][T16288] should_failslab+0x9/0x20 [ 525.472311][T16288] __kmem_cache_alloc_node+0x3d/0x250 [ 525.477523][T16288] ? __request_module+0x28c/0x8d0 [ 525.482384][T16288] kmalloc_trace+0x2a/0xa0 [ 525.486632][T16288] ? dev_load+0x5b/0xb0 [ 525.490627][T16288] __request_module+0x28c/0x8d0 [ 525.495313][T16288] ? capable+0x78/0xe0 [ 525.499218][T16288] ? _trace_android_vh_delayacct_wpcopy_end+0x120/0x120 [ 525.505995][T16288] ? security_capable+0x87/0xb0 [ 525.510677][T16288] dev_load+0x5b/0xb0 [ 525.514514][T16288] dev_ioctl+0x52c/0xe60 [ 525.518578][T16288] sock_do_ioctl+0x26b/0x450 [ 525.523000][T16288] ? has_cap_mac_admin+0x3c0/0x3c0 [ 525.527952][T16288] ? sock_show_fdinfo+0xa0/0xa0 [ 525.532641][T16288] ? selinux_file_ioctl+0x3cc/0x540 [ 525.537670][T16288] sock_ioctl+0x455/0x740 [ 525.541833][T16288] ? sock_poll+0x400/0x400 [ 525.546089][T16288] ? __fget_files+0x2cb/0x330 [ 525.550611][T16288] ? security_file_ioctl+0x84/0xb0 [ 525.555550][T16288] ? sock_poll+0x400/0x400 [ 525.559799][T16288] __se_sys_ioctl+0x114/0x190 [ 525.564314][T16288] __x64_sys_ioctl+0x7b/0x90 [ 525.568740][T16288] x64_sys_call+0x98/0x9a0 [ 525.572992][T16288] do_syscall_64+0x3b/0xb0 [ 525.577244][T16288] ? clear_bhb_loop+0x55/0xb0 [ 525.581759][T16288] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 525.587485][T16288] RIP: 0033:0x7f3b2977dff9 [ 525.591740][T16288] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 525.611185][T16288] RSP: 002b:00007f3b2a56e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 525.619428][T16288] RAX: ffffffffffffffda RBX: 00007f3b29936058 RCX: 00007f3b2977dff9 [ 525.627237][T16288] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 0000000000000008 [ 525.635049][T16288] RBP: 00007f3b2a56e090 R08: 0000000000000000 R09: 0000000000000000 [ 525.642861][T16288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 525.650671][T16288] R13: 0000000000000000 R14: 00007f3b29936058 R15: 00007fffeae008e8 [ 525.658490][T16288] [ 525.708398][T15507] syz-executor (15507) used greatest stack depth: 20040 bytes left [ 525.716557][T16288] device pim6reg1 entered promiscuous mode [ 525.741079][T16301] device pim6reg1 entered promiscuous mode [ 525.847415][T16315] device pim6reg1 entered promiscuous mode [ 526.566819][T16355] device pim6reg1 entered promiscuous mode [ 526.838490][T16361] device pim6reg1 entered promiscuous mode [ 526.923225][T16365] device pim6reg1 entered promiscuous mode [ 527.223655][T16395] FAULT_INJECTION: forcing a failure. [ 527.223655][T16395] name failslab, interval 1, probability 0, space 0, times 0 [ 527.428523][T16395] CPU: 1 PID: 16395 Comm: syz.2.5172 Tainted: G W 6.1.99-syzkaller-00049-g1fe91f863a7f #0 [ 527.439644][T16395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 527.449537][T16395] Call Trace: [ 527.452657][T16395] [ 527.455437][T16395] dump_stack_lvl+0x151/0x1b7 [ 527.459949][T16395] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 527.465248][T16395] dump_stack+0x15/0x1b [ 527.469238][T16395] should_fail_ex+0x3d0/0x520 [ 527.473749][T16395] ? call_usermodehelper_setup+0x8f/0x220 [ 527.479305][T16395] __should_failslab+0xaf/0xf0 [ 527.483904][T16395] should_failslab+0x9/0x20 [ 527.488246][T16395] __kmem_cache_alloc_node+0x3d/0x250 [ 527.493452][T16395] ? call_usermodehelper_setup+0x8f/0x220 [ 527.499007][T16395] kmalloc_trace+0x2a/0xa0 [ 527.503258][T16395] call_usermodehelper_setup+0x8f/0x220 [ 527.508639][T16395] ? __request_module+0x8d0/0x8d0 [ 527.513500][T16395] __request_module+0x37d/0x8d0 [ 527.518186][T16395] ? capable+0x78/0xe0 [ 527.522094][T16395] ? _trace_android_vh_delayacct_wpcopy_end+0x120/0x120 [ 527.528876][T16395] ? security_capable+0x87/0xb0 [ 527.533552][T16395] dev_load+0x5b/0xb0 [ 527.537370][T16395] dev_ioctl+0x52c/0xe60 [ 527.541449][T16395] sock_do_ioctl+0x26b/0x450 [ 527.545874][T16395] ? has_cap_mac_admin+0x3c0/0x3c0 [ 527.550824][T16395] ? sock_show_fdinfo+0xa0/0xa0 [ 527.555515][T16395] ? selinux_file_ioctl+0x3cc/0x540 [ 527.560543][T16395] sock_ioctl+0x455/0x740 [ 527.564710][T16395] ? sock_poll+0x400/0x400 [ 527.568960][T16395] ? __fget_files+0x2cb/0x330 [ 527.573480][T16395] ? security_file_ioctl+0x84/0xb0 [ 527.578422][T16395] ? sock_poll+0x400/0x400 [ 527.582674][T16395] __se_sys_ioctl+0x114/0x190 [ 527.587191][T16395] __x64_sys_ioctl+0x7b/0x90 [ 527.591613][T16395] x64_sys_call+0x98/0x9a0 [ 527.595865][T16395] do_syscall_64+0x3b/0xb0 [ 527.600120][T16395] ? clear_bhb_loop+0x55/0xb0 [ 527.604631][T16395] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 527.610366][T16395] RIP: 0033:0x7f891db7dff9 [ 527.614613][T16395] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 527.634056][T16395] RSP: 002b:00007f891e890038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 527.642300][T16395] RAX: ffffffffffffffda RBX: 00007f891dd36058 RCX: 00007f891db7dff9 [ 527.650112][T16395] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 0000000000000008 [ 527.657924][T16395] RBP: 00007f891e890090 R08: 0000000000000000 R09: 0000000000000000 [ 527.665736][T16395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 527.673545][T16395] R13: 0000000000000000 R14: 00007f891dd36058 R15: 00007ffea1879778 [ 527.681371][T16395] [ 527.849489][ T324] device bridge_slave_1 left promiscuous mode [ 527.855467][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 527.862750][ T324] device bridge_slave_0 left promiscuous mode [ 527.868920][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 527.876937][ T324] device veth1_macvtap left promiscuous mode [ 527.882834][ T324] device veth0_vlan left promiscuous mode [ 527.968163][T16388] device veth0_vlan left promiscuous mode [ 527.976157][T16388] device veth0_vlan entered promiscuous mode [ 527.996670][T16395] device pim6reg1 entered promiscuous mode [ 528.008169][T16407] device pim6reg1 entered promiscuous mode [ 528.014558][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 528.025358][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 528.035673][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 528.103507][T16414] device syzkaller0 entered promiscuous mode [ 528.294630][T16426] device pim6reg1 entered promiscuous mode [ 528.505056][T16453] device pim6reg1 entered promiscuous mode [ 529.141108][T16465] device pim6reg1 entered promiscuous mode [ 529.273499][T16475] device veth0_vlan left promiscuous mode [ 529.350461][T16475] device veth0_vlan entered promiscuous mode [ 529.508028][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 529.546926][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 529.554251][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 530.134252][T16493] device pim6reg1 entered promiscuous mode [ 530.216765][T16508] device pim6reg1 entered promiscuous mode [ 530.362416][T16517] : renamed from veth0_vlan [ 531.637656][T16551] device pim6reg1 entered promiscuous mode [ 531.648123][T16560] device pim6reg1 entered promiscuous mode [ 531.779471][T16563] device pim6reg1 entered promiscuous mode [ 532.441265][T16591] syz.3.5234[16591] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 532.441337][T16591] syz.3.5234[16591] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 532.528510][T16596] device pim6reg1 entered promiscuous mode [ 532.774865][T16608] device pim6reg1 entered promiscuous mode [ 534.470996][T16647] device pim6reg1 entered promiscuous mode [ 535.009084][T16661] device pim6reg1 entered promiscuous mode [ 535.145969][T16667] bridge0: port 2(bridge_slave_1) entered disabled state [ 535.152973][T16667] bridge0: port 1(bridge_slave_0) entered disabled state [ 535.277940][T16671] device pim6reg1 entered promiscuous mode [ 535.763805][T16672] device bridge_slave_1 left promiscuous mode [ 535.836049][T16672] bridge0: port 2(bridge_slave_1) entered disabled state [ 535.912612][T16672] device bridge_slave_0 left promiscuous mode [ 535.996749][T16672] bridge0: port 1(bridge_slave_0) entered disabled state [ 536.841294][T16706] device pim6reg1 entered promiscuous mode [ 537.288333][T16732] device pim6reg1 entered promiscuous mode [ 538.727538][T16769] device pim6reg1 entered promiscuous mode [ 538.764319][T16779] device pim6reg1 entered promiscuous mode [ 539.462556][T16817] device pim6reg1 entered promiscuous mode [ 541.427857][T16900] bond_slave_1: mtu less than device minimum [ 541.720401][T16920] syz.4.5335[16920] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 541.720470][T16920] syz.4.5335[16920] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 541.835098][T16920] syz.4.5335[16920] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 541.886389][T16920] syz.4.5335[16920] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 541.921982][T16935] device pim6reg1 entered promiscuous mode [ 542.280688][T16949] device pim6reg1 entered promiscuous mode [ 542.605883][T16971] device pim6reg1 entered promiscuous mode [ 543.366956][T16982] device veth0_vlan left promiscuous mode [ 543.575884][T16982] device veth0_vlan entered promiscuous mode [ 543.984921][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 544.004088][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 544.078551][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 544.128727][T17006] device veth0_vlan left promiscuous mode [ 544.154019][T17006] device veth0_vlan entered promiscuous mode [ 544.203420][T17017] device pim6reg1 entered promiscuous mode [ 544.852283][T17045] syz.4.5371[17045] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 544.852350][T17045] syz.4.5371[17045] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 545.610212][T17061] device pim6reg1 entered promiscuous mode [ 545.656938][T17062] device pim6reg1 entered promiscuous mode [ 546.506555][T17088] device veth0_vlan left promiscuous mode [ 546.581280][T17088] device veth0_vlan entered promiscuous mode [ 547.450230][T17102] device pim6reg1 entered promiscuous mode [ 549.420598][T17145] device pim6reg1 entered promiscuous mode [ 551.946958][T17227] device pim6reg1 entered promiscuous mode [ 552.753721][T17243] device pim6reg1 entered promiscuous mode [ 553.735299][T17272] device pim6reg1 entered promiscuous mode [ 555.074982][T17313] device pim6reg1 entered promiscuous mode [ 555.389018][T17326] vlan0: mtu greater than device maximum [ 556.385559][T17356] device pim6reg1 entered promiscuous mode [ 558.520843][T17399] device pim6reg1 entered promiscuous mode [ 559.622786][T17436] device wg2 left promiscuous mode [ 559.638586][T17438] device wg2 entered promiscuous mode [ 560.488751][T17457] device pim6reg1 entered promiscuous mode [ 561.589859][T17487] device pim6reg1 entered promiscuous mode [ 563.568707][T17540] device pim6reg1 entered promiscuous mode [ 563.847202][T17547] device sit0 entered promiscuous mode [ 565.523547][T17607] device veth1_macvtap left promiscuous mode [ 566.168399][T17626] syz.2.5543[17626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 566.168539][T17626] syz.2.5543[17626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 567.273140][T17678] syz.4.5558[17678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 567.356493][T17678] syz.4.5558[17678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 568.318378][T17706] device pim6reg1 entered promiscuous mode [ 568.822117][T17724] syz.4.5576[17724] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 568.823117][T17724] syz.4.5576[17724] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 569.205180][T17753] device pim6reg1 entered promiscuous mode [ 569.395178][T17757] @ÿ: renamed from veth0_vlan [ 569.746621][T17779] syz.3.5591[17779] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 569.746708][T17779] syz.3.5591[17779] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 570.195663][T17800] device pim6reg1 entered promiscuous mode [ 570.277509][T17802] device pim6reg1 entered promiscuous mode [ 570.522312][T17814] device veth0_vlan left promiscuous mode [ 570.538322][T17814] device veth0_vlan entered promiscuous mode [ 570.616793][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 570.624786][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 570.720334][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 571.583864][T17837] device syzkaller0 entered promiscuous mode [ 571.603950][T17836] syz.1.5610[17836] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 571.604088][T17836] syz.1.5610[17836] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 571.869204][T17846] device pim6reg1 entered promiscuous mode [ 572.057901][T17850] device pim6reg1 entered promiscuous mode [ 573.822033][T17886] device pim6reg1 entered promiscuous mode [ 573.885902][T17891] device pim6reg1 entered promiscuous mode [ 573.956625][T17903] device pim6reg1 entered promiscuous mode [ 573.986161][T17905] syz.2.5630[17905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 573.986291][T17905] syz.2.5630[17905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 574.352556][T17942] FAULT_INJECTION: forcing a failure. [ 574.352556][T17942] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 574.356357][T17938] device pim6reg1 entered promiscuous mode [ 574.363847][T17942] CPU: 1 PID: 17942 Comm: syz.1.5642 Tainted: G W 6.1.99-syzkaller-00049-g1fe91f863a7f #0 [ 574.377580][T17940] device pim6reg1 entered promiscuous mode [ 574.382244][T17942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 574.408894][T17942] Call Trace: [ 574.412013][T17942] [ 574.414794][T17942] dump_stack_lvl+0x151/0x1b7 [ 574.419306][T17942] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 574.424600][T17942] ? vfs_write+0x952/0xed0 [ 574.428851][T17942] ? __kasan_slab_free+0x11/0x20 [ 574.433629][T17942] dump_stack+0x15/0x1b [ 574.437618][T17942] should_fail_ex+0x3d0/0x520 [ 574.442133][T17942] should_fail+0xb/0x10 [ 574.446125][T17942] should_fail_usercopy+0x1a/0x20 [ 574.450986][T17942] _copy_from_user+0x1e/0xc0 [ 574.455409][T17942] __sys_bpf+0x23b/0x7f0 [ 574.459490][T17942] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 574.464700][T17942] ? __ia32_sys_read+0x90/0x90 [ 574.469298][T17942] ? debug_smp_processor_id+0x17/0x20 [ 574.474506][T17942] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 574.480406][T17942] __x64_sys_bpf+0x7c/0x90 [ 574.484660][T17942] x64_sys_call+0x87f/0x9a0 [ 574.488998][T17942] do_syscall_64+0x3b/0xb0 [ 574.493249][T17942] ? clear_bhb_loop+0x55/0xb0 [ 574.497764][T17942] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 574.503509][T17942] RIP: 0033:0x7fa68a37dff9 [ 574.507748][T17942] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 574.527187][T17942] RSP: 002b:00007fa68b17b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 574.535432][T17942] RAX: ffffffffffffffda RBX: 00007fa68a535f80 RCX: 00007fa68a37dff9 [ 574.543245][T17942] RDX: 0000000000000048 RSI: 0000000020001000 RDI: e4ffffff00000000 [ 574.551057][T17942] RBP: 00007fa68b17b090 R08: 0000000000000000 R09: 0000000000000000 [ 574.558866][T17942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 574.566679][T17942] R13: 0000000000000000 R14: 00007fa68a535f80 R15: 00007ffc3afd4638 [ 574.574495][T17942] [ 575.312815][T17945] bridge0: port 1(bridge_slave_0) entered blocking state [ 575.319802][T17945] bridge0: port 1(bridge_slave_0) entered disabled state [ 575.328313][T17945] device bridge_slave_0 entered promiscuous mode [ 575.369806][T17945] bridge0: port 2(bridge_slave_1) entered blocking state [ 575.487443][T17945] bridge0: port 2(bridge_slave_1) entered disabled state [ 575.494585][T17945] device bridge_slave_1 entered promiscuous mode [ 576.016744][T17975] syz.4.5653[17975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 576.025949][T17975] syz.4.5653[17975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 576.148344][T17981] device pim6reg1 entered promiscuous mode [ 576.220695][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 576.228971][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 576.247369][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 576.353721][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 576.413509][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 576.420393][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 576.427907][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 576.436084][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 576.444066][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 576.450912][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 576.531944][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 576.560063][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 576.715489][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 576.747560][T17945] device veth0_vlan entered promiscuous mode [ 576.760586][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 576.771960][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 576.785843][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 576.800456][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 576.816311][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 576.823628][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 576.841901][T17945] device veth1_macvtap entered promiscuous mode [ 576.851103][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 576.859433][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 576.868278][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 576.893221][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 576.901460][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 576.914296][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 576.981518][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 577.364202][T18021] syz.3.5665[18021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 577.364277][T18021] syz.3.5665[18021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 577.877653][T18028] device pim6reg1 entered promiscuous mode [ 580.235157][T18070] device pim6reg1 entered promiscuous mode [ 581.918383][T18109] device pim6reg1 entered promiscuous mode [ 583.311102][T18146] syz.2.5716[18146] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 583.311241][T18146] syz.2.5716[18146] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 585.326516][T18205] syz.4.5724[18205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 585.352548][T18205] syz.4.5724[18205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 586.597116][T18240] bridge0: port 1(bridge_slave_0) entered blocking state [ 586.625266][T18240] bridge0: port 1(bridge_slave_0) entered disabled state [ 586.632579][T18240] device bridge_slave_0 entered promiscuous mode [ 586.640183][T18240] bridge0: port 2(bridge_slave_1) entered blocking state [ 586.647056][T18240] bridge0: port 2(bridge_slave_1) entered disabled state [ 586.654308][T18240] device bridge_slave_1 entered promiscuous mode [ 586.863028][T18262] bond_slave_1: mtu less than device minimum [ 586.902929][T18267] syz.4.5739[18267] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 586.903002][T18267] syz.4.5739[18267] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 586.908889][T18240] bridge0: port 2(bridge_slave_1) entered blocking state [ 586.932248][T18240] bridge0: port 2(bridge_slave_1) entered forwarding state [ 586.939375][T18240] bridge0: port 1(bridge_slave_0) entered blocking state [ 586.946152][T18240] bridge0: port 1(bridge_slave_0) entered forwarding state [ 587.220289][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 587.230349][ T39] bridge0: port 1(bridge_slave_0) entered disabled state [ 587.258587][ T39] bridge0: port 2(bridge_slave_1) entered disabled state [ 587.594630][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 587.667020][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 587.673876][ T294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 587.746081][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 587.754099][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 587.760962][ T294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 587.963510][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 588.030689][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 588.440818][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 588.455835][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 588.487178][T18240] device veth0_vlan entered promiscuous mode [ 588.506743][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 588.514503][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 588.528725][T18240] device veth1_macvtap entered promiscuous mode [ 588.550509][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 588.558329][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 588.568005][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 588.578118][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 588.588197][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 588.627733][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 588.645917][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 588.654081][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 588.672993][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 588.718785][T18300] device pim6reg1 entered promiscuous mode [ 589.876770][T18339] device pim6reg1 entered promiscuous mode [ 589.912453][T18343] device pim6reg1 entered promiscuous mode [ 590.485235][T18359] device sit0 entered promiscuous mode [ 591.248337][T18402] device syzkaller0 entered promiscuous mode [ 591.272489][T18410] syz.4.5788[18410] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 591.272557][T18410] syz.4.5788[18410] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 591.284162][T18411] syz.4.5788[18411] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 591.297998][T18411] syz.4.5788[18411] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 591.312794][T18410] syz.4.5788[18410] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 591.326468][T18410] syz.4.5788[18410] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 592.534004][T18456] device veth0_vlan left promiscuous mode [ 592.622982][T18456] device veth0_vlan entered promiscuous mode [ 609.327983][T18532] bridge0: port 1(bridge_slave_0) entered blocking state [ 609.334834][T18532] bridge0: port 1(bridge_slave_0) entered disabled state [ 609.342524][T18532] device bridge_slave_0 entered promiscuous mode [ 609.363391][T18532] bridge0: port 2(bridge_slave_1) entered blocking state [ 609.370257][T18532] bridge0: port 2(bridge_slave_1) entered disabled state [ 609.377455][T18532] device bridge_slave_1 entered promiscuous mode [ 609.425748][T18533] bridge0: port 1(bridge_slave_0) entered blocking state [ 609.432599][T18533] bridge0: port 1(bridge_slave_0) entered disabled state [ 609.440101][T18533] device bridge_slave_0 entered promiscuous mode [ 609.451852][T18534] bridge0: port 1(bridge_slave_0) entered blocking state [ 609.458784][T18534] bridge0: port 1(bridge_slave_0) entered disabled state [ 609.465899][T18534] device bridge_slave_0 entered promiscuous mode [ 609.472522][T18534] bridge0: port 2(bridge_slave_1) entered blocking state [ 609.479399][T18534] bridge0: port 2(bridge_slave_1) entered disabled state [ 609.486703][T18534] device bridge_slave_1 entered promiscuous mode [ 609.497847][T18533] bridge0: port 2(bridge_slave_1) entered blocking state [ 609.504679][T18533] bridge0: port 2(bridge_slave_1) entered disabled state [ 609.512413][T18533] device bridge_slave_1 entered promiscuous mode [ 609.584054][T18539] bridge0: port 1(bridge_slave_0) entered blocking state [ 609.591467][T18539] bridge0: port 1(bridge_slave_0) entered disabled state [ 609.598730][T18539] device bridge_slave_0 entered promiscuous mode [ 609.615882][T18535] bridge0: port 1(bridge_slave_0) entered blocking state [ 609.622726][T18535] bridge0: port 1(bridge_slave_0) entered disabled state [ 609.630026][T18535] device bridge_slave_0 entered promiscuous mode [ 609.636560][T18539] bridge0: port 2(bridge_slave_1) entered blocking state [ 609.643376][T18539] bridge0: port 2(bridge_slave_1) entered disabled state [ 609.650836][T18539] device bridge_slave_1 entered promiscuous mode [ 609.664075][T18535] bridge0: port 2(bridge_slave_1) entered blocking state [ 609.671066][T18535] bridge0: port 2(bridge_slave_1) entered disabled state [ 609.678255][T18535] device bridge_slave_1 entered promiscuous mode [ 609.774993][T18532] bridge0: port 2(bridge_slave_1) entered blocking state [ 609.781948][T18532] bridge0: port 2(bridge_slave_1) entered forwarding state [ 609.789042][T18532] bridge0: port 1(bridge_slave_0) entered blocking state [ 609.795832][T18532] bridge0: port 1(bridge_slave_0) entered forwarding state [ 609.862392][T18534] bridge0: port 2(bridge_slave_1) entered blocking state [ 609.869256][T18534] bridge0: port 2(bridge_slave_1) entered forwarding state [ 609.876348][T18534] bridge0: port 1(bridge_slave_0) entered blocking state [ 609.883129][T18534] bridge0: port 1(bridge_slave_0) entered forwarding state [ 609.998467][T18539] bridge0: port 2(bridge_slave_1) entered blocking state [ 610.005316][T18539] bridge0: port 2(bridge_slave_1) entered forwarding state [ 610.012411][T18539] bridge0: port 1(bridge_slave_0) entered blocking state [ 610.019230][T18539] bridge0: port 1(bridge_slave_0) entered forwarding state [ 610.029591][T18533] bridge0: port 2(bridge_slave_1) entered blocking state [ 610.036440][T18533] bridge0: port 2(bridge_slave_1) entered forwarding state [ 610.043532][T18533] bridge0: port 1(bridge_slave_0) entered blocking state [ 610.050333][T18533] bridge0: port 1(bridge_slave_0) entered forwarding state [ 610.069587][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 610.077000][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 610.085068][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 610.093200][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 610.100483][ T294] bridge0: port 1(bridge_slave_0) entered disabled state [ 610.107752][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 610.115768][ T294] bridge0: port 2(bridge_slave_1) entered disabled state [ 610.122740][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 610.131724][ T294] bridge0: port 1(bridge_slave_0) entered disabled state [ 610.138702][ T294] bridge0: port 2(bridge_slave_1) entered disabled state [ 610.175792][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 610.183889][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 610.192744][T14363] bridge0: port 1(bridge_slave_0) entered blocking state [ 610.199601][T14363] bridge0: port 1(bridge_slave_0) entered forwarding state [ 610.206940][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 610.214835][T14363] bridge0: port 2(bridge_slave_1) entered blocking state [ 610.221589][T14363] bridge0: port 2(bridge_slave_1) entered forwarding state [ 610.228924][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 610.260570][T18532] device veth0_vlan entered promiscuous mode [ 610.267725][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 610.276988][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 610.285040][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 610.292926][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 610.300143][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 610.308284][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 610.316258][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 610.323081][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 610.330304][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 610.338277][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 610.345098][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 610.352277][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 610.360060][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 610.367851][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 610.375716][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 610.394265][T18532] device veth1_macvtap entered promiscuous mode [ 610.407744][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 610.414994][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 610.422385][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 610.430348][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 610.439108][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 610.446594][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 610.454628][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 610.462629][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 610.469616][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 610.476932][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 610.484982][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 610.493236][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 610.500080][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 610.507218][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 610.514926][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 610.533942][T18539] device veth0_vlan entered promiscuous mode [ 610.549079][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 610.557346][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 610.565103][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 610.572474][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 610.579721][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 610.589310][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 610.597067][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 610.604720][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 610.612768][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 610.620811][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 610.628843][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 610.636867][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 610.659133][T18539] device veth1_macvtap entered promiscuous mode [ 610.675648][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 610.683727][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 610.691681][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 610.699649][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 610.706993][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 610.714862][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 610.722729][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 610.730439][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 610.738660][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 610.746341][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 610.754361][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 610.762516][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 610.770654][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 610.781699][T18534] device veth0_vlan entered promiscuous mode [ 610.792750][T18535] device veth0_vlan entered promiscuous mode [ 610.800065][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 610.814240][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 610.823518][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 610.831182][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 610.850643][T18535] device veth1_macvtap entered promiscuous mode [ 610.859119][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 610.867678][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 610.876469][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 610.884506][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 610.892556][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 610.911184][T18534] device veth1_macvtap entered promiscuous mode [ 610.930836][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 610.938958][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 610.950760][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 610.959774][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 610.970731][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 610.978841][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 610.987142][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 610.997026][T18533] device veth0_vlan entered promiscuous mode [ 611.034777][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 611.047508][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 611.055316][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 611.115744][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 611.123933][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 611.175852][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 611.184137][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 611.214819][T14363] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 611.224029][T18533] device veth1_macvtap entered promiscuous mode [ 611.246058][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 611.280682][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 611.305282][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 611.324192][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 611.332878][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 611.846121][ T8] device bridge_slave_1 left promiscuous mode [ 611.852040][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 611.859348][ T8] device bridge_slave_0 left promiscuous mode [ 611.865246][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 611.872996][ T8] device bridge_slave_1 left promiscuous mode [ 611.878977][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 611.886766][ T8] device bridge_slave_0 left promiscuous mode [ 611.892666][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 611.900569][ T8] device veth1_macvtap left promiscuous mode [ 611.906431][ T8] device veth0_vlan left promiscuous mode [ 611.912174][ T8] device veth1_macvtap left promiscuous mode [ 611.918028][ T8] device veth0_vlan left promiscuous mode [ 613.196800][ T8] device bridge_slave_1 left promiscuous mode [ 613.202725][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 613.210077][ T8] device bridge_slave_0 left promiscuous mode [ 613.216072][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 613.223497][ T8] device bridge_slave_1 left promiscuous mode [ 613.229465][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 613.236610][ T8] device bridge_slave_0 left promiscuous mode [ 613.242502][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 613.250296][ T8] device bridge_slave_1 left promiscuous mode [ 613.256486][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 613.263718][ T8] device bridge_slave_0 left promiscuous mode [ 613.269820][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 613.277493][ T8] device bridge_slave_1 left promiscuous mode [ 613.283381][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 613.290690][ T8] device bridge_slave_0 left promiscuous mode [ 613.296743][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 613.304242][ T8] device bridge_slave_1 left promiscuous mode [ 613.310314][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 613.317520][ T8] device bridge_slave_0 left promiscuous mode [ 613.323414][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 613.331850][ T8] device veth1_macvtap left promiscuous mode [ 613.337734][ T8] device veth0_vlan left promiscuous mode [ 613.343494][ T8] device veth1_macvtap left promiscuous mode [ 613.349371][ T8] device veth0_vlan left promiscuous mode [ 613.355090][ T8] device veth1_macvtap left promiscuous mode [ 613.360929][ T8] device veth0_vlan left promiscuous mode [ 613.366859][ T8] device veth1_macvtap left promiscuous mode [ 613.372655][ T8] device veth0_vlan left promiscuous mode [ 613.378703][ T8] device veth1_macvtap left promiscuous mode [ 613.384517][ T8] device veth0_vlan left promiscuous mode