last executing test programs: 13m10.785055352s ago: executing program 1 (id=950): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r5, 0xffffffffffffffff, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r5}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) recvmsg$unix(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000006c0)=""/179, 0xb3}], 0x1}, 0x0) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x33fe0}], 0x1}, 0x0) 13m10.688220503s ago: executing program 1 (id=951): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0500000007"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00'}, 0x10) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000500)={&(0x7f0000000340)=""/18, 0x12, 0x0, &(0x7f00000003c0)=""/13, 0xd}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x5}, 0x10, r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x800000, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r2}, 0x10) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000100)={'ipvlan1\x00', 0x600}) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000440)={'vcan0\x00', 0x1000}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000400)={0x0, 0x0}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='0'], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r6, 0x20e, 0x113, 0x0, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000}, 0x50) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000009b000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ffffff80850000007100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r7, 0x0, 0xe, 0x0, &(0x7f00000009c0)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x4004, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 13m7.056624133s ago: executing program 1 (id=978): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x20080, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r2, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3}, 0x0, &(0x7f00000002c0)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r4}, 0x18) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="110000000002"}) 13m6.877097424s ago: executing program 1 (id=970): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f0000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000006c0)=""/179, 0xb3}], 0x1}, 0x0) sendmsg$inet(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x33fe0}], 0x1}, 0x0) 13m6.648598855s ago: executing program 1 (id=971): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x47, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000010000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4cf68d79c8eac253, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r6, r5, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) recvmsg$unix(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000006c0)=""/179, 0xb3}], 0x1}, 0x0) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x33fe0}], 0x1}, 0x0) 13m6.383546476s ago: executing program 1 (id=973): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001800), &(0x7f0000000740), 0x10000075, r0}, 0x38) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r0, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000006c0)}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0xf4240, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000011c0)={0x0, 0xf, &(0x7f0000001580)=ANY=[@ANYRES16=r1, @ANYBLOB="55b61f000d127d45db5dba7e02a806104a1f4d68743639aecc903b1d234f6be0480c05ea2660ff409f967a536f79f192174f84366c33fefd89b4f5b765f7d89a1ee1afda12ba5786723d7d9423a1301eed0a442faf2566ca2c58d16f2904f4c9cd30dca77fff15720982ceac64058c3057d865f680cb3f0aeb5e24ea652ef8677974697aad7df084174ab49ab7e21b47a1c6a345adc28108cab953747fc621dc8f351f9ef0a4d102535920eeebce54030f1b81dfad22aadb88ffd40e42ee19fc6f", @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f00000002c0)='GPL\x00', 0xc, 0x0, 0x0, 0x41000, 0x1, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000001540)={0x4, 0x2}, 0x6, 0x10, &(0x7f00000010c0)={0x5, 0x8, 0x80000000, 0x101}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000001100)=[r0, r0], &(0x7f0000001140)=[{0x4, 0x4, 0xc, 0x8}, {0x1, 0x5, 0xa, 0xa}, {0x3, 0x2, 0x8, 0x7}, {0x5, 0x3, 0x8, 0x6}, {0x400001, 0x2, 0xc, 0xb}, {0x5, 0x2, 0xc3, 0x3}, {0x0, 0x5, 0xf, 0x4}], 0x10, 0x8, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x5, 0x3, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000", @ANYRESHEX=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x7, &(0x7f0000000500)=ANY=[@ANYRES8=r4, @ANYBLOB="0000000000000000b70200000000000085000000860000009500e893d52f13336075463d3deda400"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x1d, &(0x7f0000000740)='c\x9e\xd6iK\xaeLro\xb0p\x00c;\x93\x11\x93\x8e\x1fMy\\\xdd\'\xd73\xdcbR\xbb\xbbYS\xe5\xf4\x03\x83\xf5\xc4|\xeb\x1b\xfe\xe2\x92D\x9a\xa7O#L\xc2\x92\x12\xa3\x19\xe7\x1b=\x90\x92\xd6\xc3\xf0\x9a\xe2\xe9\x155{\x98\x80\xc9\x10\x80\xb0\xd2r\xed\xcaeK\xbf\xc3\xc2o\xf3\x9b;\xc7\x0fR\xaa\x87\x9d\t\xbb\x8d9\xc4\x8fe\xfdi\xc9\x16\x93v\xb5\xbc\x1br\xad\xab\xfc\x98C-\xc8\x00\x00\x00\x00\xc9\x03\x93\x8e4\xbd\xc1\xef\xacJ%\"\xb1\"\xa3rL\xb6\xe4\xbcB?\x8e\xbb\xd7\xb8B\xd1]\xf3\x01`$\x04\x9f_T\\K|\x91TU \x8c\xf9w\xb9\xaf\xbb\x9e\xfa\xd6\xc3 \x1d\xc1\x1b\'\xd5\x01\xf3pc\x12x\t:z\xe0}p\xae\xff\xea\xdf)`\xdc\x05\xab{\xc76\xb1\xf1\xac,\x1e\x18\xa2\xc4\x04\xb0\xb5rVm\xaa\x01\x8ab\r\x9d\xc5t\xf4\xc1\x8b\xf32\xa6\v\xe9t\xe1\xbe\x1a\xeb1r9\xe5_\x1ca+\x17\xe9\xd1.y\x8eTr_\xe7\xa4\x16\xe5\x8c\x05\xb5\x16\x00\xe4\x8f*p\xf5\xf4p\xe9!\x9ah=\xe6\x05\xbb\x8b\xf0[\xa3\xaa\xa2E\xf2I\xbdW\\iA\x8a$\xe5\xd4\xd6s\xb5\xcc\xcf\xde\xcac\x10\xaf\xd3R\xe5\xbd\x12\xdc\x052,\xe1:Cc\xba\x99\t\xc9\xc6\xaa\xc3\x97k\xb3\t\x1e\xe8\xe8cb\xcdX\"\xe0\x1a\xf0\xb9\x01j\xef\xcf2\xc3\xc1\x99\xb9\xff\xe6?\xc6\xae\x87\xa1\xb9p:\v\xf7d\xb0\x97\xc0\xabfo\xb7HQ\f7\rb\xdb\xd2R\x93\xfd\xf9\x02h\xeaR3\\x\xa3K\xacH\xba\x1d\xf2Xq*\xcfH\n\xbb\x8fjMiN'}, 0x30) socketpair(0x1e, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0xfffffffb, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x1ff) setsockopt$sock_attach_bpf(r11, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 12m50.774059601s ago: executing program 32 (id=973): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001800), &(0x7f0000000740), 0x10000075, r0}, 0x38) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r0, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000006c0)}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0xf4240, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000011c0)={0x0, 0xf, &(0x7f0000001580)=ANY=[@ANYRES16=r1, @ANYBLOB="55b61f000d127d45db5dba7e02a806104a1f4d68743639aecc903b1d234f6be0480c05ea2660ff409f967a536f79f192174f84366c33fefd89b4f5b765f7d89a1ee1afda12ba5786723d7d9423a1301eed0a442faf2566ca2c58d16f2904f4c9cd30dca77fff15720982ceac64058c3057d865f680cb3f0aeb5e24ea652ef8677974697aad7df084174ab49ab7e21b47a1c6a345adc28108cab953747fc621dc8f351f9ef0a4d102535920eeebce54030f1b81dfad22aadb88ffd40e42ee19fc6f", @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f00000002c0)='GPL\x00', 0xc, 0x0, 0x0, 0x41000, 0x1, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000001540)={0x4, 0x2}, 0x6, 0x10, &(0x7f00000010c0)={0x5, 0x8, 0x80000000, 0x101}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000001100)=[r0, r0], &(0x7f0000001140)=[{0x4, 0x4, 0xc, 0x8}, {0x1, 0x5, 0xa, 0xa}, {0x3, 0x2, 0x8, 0x7}, {0x5, 0x3, 0x8, 0x6}, {0x400001, 0x2, 0xc, 0xb}, {0x5, 0x2, 0xc3, 0x3}, {0x0, 0x5, 0xf, 0x4}], 0x10, 0x8, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x5, 0x3, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000", @ANYRESHEX=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x7, &(0x7f0000000500)=ANY=[@ANYRES8=r4, @ANYBLOB="0000000000000000b70200000000000085000000860000009500e893d52f13336075463d3deda400"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x1d, &(0x7f0000000740)='c\x9e\xd6iK\xaeLro\xb0p\x00c;\x93\x11\x93\x8e\x1fMy\\\xdd\'\xd73\xdcbR\xbb\xbbYS\xe5\xf4\x03\x83\xf5\xc4|\xeb\x1b\xfe\xe2\x92D\x9a\xa7O#L\xc2\x92\x12\xa3\x19\xe7\x1b=\x90\x92\xd6\xc3\xf0\x9a\xe2\xe9\x155{\x98\x80\xc9\x10\x80\xb0\xd2r\xed\xcaeK\xbf\xc3\xc2o\xf3\x9b;\xc7\x0fR\xaa\x87\x9d\t\xbb\x8d9\xc4\x8fe\xfdi\xc9\x16\x93v\xb5\xbc\x1br\xad\xab\xfc\x98C-\xc8\x00\x00\x00\x00\xc9\x03\x93\x8e4\xbd\xc1\xef\xacJ%\"\xb1\"\xa3rL\xb6\xe4\xbcB?\x8e\xbb\xd7\xb8B\xd1]\xf3\x01`$\x04\x9f_T\\K|\x91TU \x8c\xf9w\xb9\xaf\xbb\x9e\xfa\xd6\xc3 \x1d\xc1\x1b\'\xd5\x01\xf3pc\x12x\t:z\xe0}p\xae\xff\xea\xdf)`\xdc\x05\xab{\xc76\xb1\xf1\xac,\x1e\x18\xa2\xc4\x04\xb0\xb5rVm\xaa\x01\x8ab\r\x9d\xc5t\xf4\xc1\x8b\xf32\xa6\v\xe9t\xe1\xbe\x1a\xeb1r9\xe5_\x1ca+\x17\xe9\xd1.y\x8eTr_\xe7\xa4\x16\xe5\x8c\x05\xb5\x16\x00\xe4\x8f*p\xf5\xf4p\xe9!\x9ah=\xe6\x05\xbb\x8b\xf0[\xa3\xaa\xa2E\xf2I\xbdW\\iA\x8a$\xe5\xd4\xd6s\xb5\xcc\xcf\xde\xcac\x10\xaf\xd3R\xe5\xbd\x12\xdc\x052,\xe1:Cc\xba\x99\t\xc9\xc6\xaa\xc3\x97k\xb3\t\x1e\xe8\xe8cb\xcdX\"\xe0\x1a\xf0\xb9\x01j\xef\xcf2\xc3\xc1\x99\xb9\xff\xe6?\xc6\xae\x87\xa1\xb9p:\v\xf7d\xb0\x97\xc0\xabfo\xb7HQ\f7\rb\xdb\xd2R\x93\xfd\xf9\x02h\xeaR3\\x\xa3K\xacH\xba\x1d\xf2Xq*\xcfH\n\xbb\x8fjMiN'}, 0x30) socketpair(0x1e, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0xfffffffb, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x1ff) setsockopt$sock_attach_bpf(r11, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 10.35511352s ago: executing program 2 (id=6420): bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0}, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 5.956459498s ago: executing program 2 (id=6432): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0x21, 0x3, 0xe, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x16, 0x0, 0x400004, 0x10001, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r5, 0x541b, 0x2000fcc6) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x3, 0x2, 0x85, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f0000000340), &(0x7f0000000240), 0x812, r6}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x9) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={r4}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r6}, &(0x7f0000000200), &(0x7f0000000280)=r3}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r1, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x2b, &(0x7f0000000700)=[{}], 0x8, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0xc1, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="1801000000050000000000000000ea0485000000d0000000"], &(0x7f0000000a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 5.798921308s ago: executing program 4 (id=6433): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000c392a9ac00c1c5b4d25d58689c279700"/30, @ANYRES32=0x0, @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="ebff0000000000e7ffffffffffffff0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = gettid() perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0xfe, 0x0, 0x2, 0x0, 0x1fd, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x8, 0x2, 0x2, 0x0, 0x9, 0x0, 0xfffffffc, 0x0, 0x8000}, r4, 0xc, r3, 0xe) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYRES32, @ANYRES8=r1, @ANYRES32=0x0, @ANYRESDEC=r0], 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0c0000000400000004000000be3a00000000fdff6044047e559151bf745a9d183cb22b2ec5713966473d0023177498fa6b803f4a47d7938bdde11e61bf8da6af83d3da890151b02a3abc77e0c8becc2b8a853f78aec8ffc20c26134f03f4560579fe2399f51436b43cffdaf1621c0742b5ee3c43a6a5571847e9ab6c9a9aa5320be647d474d2214d19ab4ed5546f6093caa984a695642b2d511ff8014d3ceda307c97ed0b06aff563684c39fe4f7f5a377f55cd25131d63dbc22e03ab75d808f23d41ec98262de2161431be29ff3603577337cc9bf277124da4fa5308a20982788c21c3e5f5b8f0c05282a", @ANYRES32=r5, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000ffffffff00"/28], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2c, 0xa, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000007c0)={0x0, 0x80, 0x69, 0x1, 0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x201}, 0x0, 0xffffffbfffffffff, r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000a40)=ANY=[@ANYBLOB="180800001bc81a000000000000000001851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006608000000000101180000000000000000000000000000009500000000000000360a000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a0000000000008500000006000000950000000000000095b6f3e4ab2cb2d70bafbf5f821b8bf80c3364c89726ce0f936a8fd5331b69d120eba1a8e77505a6d320dbced9c225e9b45dd272c724483b98fae055d25b9a7914b4da496f6caa11e9a043754f5c09bd892a28baf9e39d1e3572c3c90d51d5a194f428b257a7fd9b963661848b168c6d20cf3f05056ca25f83fcd5696a345a9e61719c4ac95bba105fa52a8d735ad721f70c3562491264ed879be3b6bc32f80d4b5782f6b3e1b20134c3d0fede1c80c649207c25868044068894c78e3519fa21d77d10dfde8fe53b0fe13e6ce1"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) gettid() perf_event_open(&(0x7f0000000600)={0x3, 0x80, 0xa, 0x0, 0x76, 0x9, 0x0, 0x2a0, 0x80200, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4, @perf_bp={&(0x7f0000000300), 0x2}, 0xa360, 0x4, 0x3, 0x5, 0x4, 0xf81, 0x3, 0x0, 0x7e86, 0x0, 0x8}, 0xffffffffffffffff, 0xf, r3, 0x5) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) r10 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="1e00000007000000080000000300000000100000", @ANYBLOB="5f6d4a3e81dd0eddcbd043edc4a964271ee56f233c4b35aea6ac76f77e1bcfff49854b6d59fe4f2305be90173aa3df0b269cf0", @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRESHEX=r6, @ANYRES32=r10, @ANYRES16=r7, @ANYRESHEX=r2], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0d0000000100000002000000ff03000000000000b6f1222582fff52c0c022dc143d677dac8ee415341d1bb5f6ea794b10ca95e2d224577831339895b27585c062482f1385ab020f2aadefa8af12aedec808ccce0f17b3b9685222c42626f35df1ca27e812aad516aa13fab55eb1bc01c69cd149f6e069760d65e53b05c37aa033191b1604e3253c1589a33987fb97268048b994b1f51a2ca", @ANYRES32=r6, @ANYBLOB='\b\x00'/20, @ANYRES32=0x0, @ANYRES32=r10, @ANYBLOB="02000000030000000300"/28], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB], &(0x7f0000000a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x12800400, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)="efdfb8d1c5f06b37819806ee924d37a5f1b629c8eb3140a5057c2913421c0f2d9b2157f59268741d9df8f461d9a135c79ba7480d1f2caf2e771f5910be19bf0654e8ad2cc4e825c73b8be722512ed4ad6af8dd6290ef370e4a1b4e043246b4cb8b7dd488918d29cb48511e0e20c593d7401341dcca1f950d0b037c485bc25c1f757e1a3e300d62ca7a477e42b5c9a57de792bf03af9edfcd3edb9224e90ab387370fa822290735d14025fff0937977502bd819b7c7964e9ca1128b3bacfbdd11b5627d2b12563742df1ba6dc1021c8b5eac2358f65cc2c39") socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8914, &(0x7f0000000080)) 5.542037199s ago: executing program 3 (id=6435): bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000006114a000000000000500002223ea7b009500740000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x7e) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43451) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000980)=@o_path={&(0x7f00000006c0)='./file0\x00', 0x0, 0x6010}, 0x18) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 5.15057492s ago: executing program 3 (id=6436): bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xd, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43451) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000980)=@o_path={&(0x7f00000006c0)='./file0\x00', 0x0, 0x6010}, 0x18) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000a40)={0x0, &(0x7f0000000600)=""/181, 0x0, 0x0, 0xff, r0}, 0x38) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x5}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'wg2\x00'}) 5.14013954s ago: executing program 0 (id=6437): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x3b}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000002000000008000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0600000004000000008000005c00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000feecffff00000000831600"/28], 0x48) 5.04763734s ago: executing program 0 (id=6438): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 5.04514406s ago: executing program 2 (id=6439): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r0}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000280)) 3.664903153s ago: executing program 2 (id=6440): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0a00000004000000e27f000001000000000000000c92a4802d04a71348ddb50ed4bbcbc35416228db3d5885f3a4a2b98e484c102dfd006f331052d99c0eadf3ed3673887e888f1598e1914064fd35eb24163d9ba072d944c74180667307e221ea3d5cb83b8dbc31f7749b1bdd6cd3f429b25b5c8eab4345fc261aa0678efe9c622cd6ebf4f7cb8d229d17697f1d7d9383ff35a847fb7875d2a9afd12d7d08b24a3d47c8e20b9f1e83e2f540f15b3a0600cfa14f5e6725c3df22ed1d16d399ef6b6588407567ef0be", @ANYRES32, @ANYBLOB="fcffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000100"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000041c5c2a90000000118110000fe6bf99e6735172f2790e058f3bdb0429cd5a9694d86223e1e3f5893934bbe8f77ba98718efd792f11ec0c389cd2ddddf3a198076f3144030174ccf176d4b1974e5a61f359a28d0800000000000000f59d5f2358fa7d22090ac22d6f31377462", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000180)=ANY=[@ANYRESOCT], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1000, @void, @value}, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x17, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="1808000000000000000000745afed0427d8fd2747083a3de006d0000000000000018000000ffff000000000000000000009500"/68], &(0x7f0000000000)='syzkaller\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = perf_event_open$cgroup(&(0x7f0000000300)={0x1, 0x80, 0x2, 0x47, 0x0, 0x6, 0x0, 0x4, 0x10000, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x6, 0x8}, 0x704, 0x8000000000000001, 0xa, 0x4, 0x8, 0x80000001, 0x40, 0x0, 0x2, 0x0, 0xde}, 0xffffffffffffffff, 0x2, r2, 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r4, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f00)={r3, 0xe0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000c80)=[0x0, 0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0, 0x8b, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x95, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="171d0000000000000084be000100000000000000", @ANYRES32, @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x48) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r5, 0x0, 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x13, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b000000000000000000000000800000000000e3", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r7 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r7, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r8, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x2, 0x1, 0x8, 0x0, 0x0, 0x3ff, 0x22a0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext, 0x0, 0x8000, 0x80000001, 0x0, 0x2, 0x5f, 0x8, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xa) sendmsg$tipc(r9, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x1000000) 2.737902834s ago: executing program 0 (id=6441): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 2.735828095s ago: executing program 5 (id=6442): bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0}, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2.729470175s ago: executing program 4 (id=6443): perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x0, 0x0, 0xed}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x6, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000faffffff0000000000004000850000002c0000001800000004000000000000000700000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x27, 0x8, 0x0, &(0x7f0000000280)="ed7e17526b2d6f70", 0x0, 0x1403, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 2.723019294s ago: executing program 0 (id=6444): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x10, &(0x7f0000000d00)=ANY=[@ANYBLOB="18000000020000000000000008000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000200000085000000060000008520000005000000181b0000", @ANYRES32=0x1, @ANYBLOB="0000000000000000185500000d0000f1b200000000000000e806e3d59500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x9, 0xb8, &(0x7f0000000640)=""/184, 0x41100, 0x84, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x4, 0xc, 0xf4, 0x4}, 0x10, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000780)=[{0x2, 0x3, 0x2, 0x8}, {0x5, 0x5, 0x0, 0x6}, {0x2, 0x5, 0xa, 0x3}, {0x1, 0x1, 0xf, 0x6}], 0x10, 0x10001, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xfb, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x3, 0x20000307, &(0x7f0000001280)=ANY=[@ANYBLOB="242800000504e5bc71d415cd60dd57003e90e4bea3ae4a5b1268f6070937f231a0a049ac08cb1c0f927b6076d8e5c06c5d4fe90f6a0141e6d5568db97eeb685876e44d99e492f560ce4f2b25cd31b1a10de61506e1f520e188a26c41963b4a1c4344780434de2e197dc2c6c77d00f3a9a0c3bfa7bb3e2fc021daa85d70df965cd751b08af3f26c123a868d2ad8d21a700cbaf81cdd97b0d5054c88349560a56ac5082a8c3fabfc9ebcf78a3f9bc6c1b6fa717171384507fc52bb649c5f518331ea1ed6b73fd63611d53160b87c3113173a6e3ec66ac72148a7ede8575cbfba430c83419c00d12b7e", @ANYRES32=r1, @ANYRESDEC=r2], 0x0, 0x0, 0x3d, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r3}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000cc0)={r0, 0xe0, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0xa, &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xab, &(0x7f0000000980)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0x1f, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000200)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x11, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@map_idx_val={0x18, 0x5, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x6}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='syzkaller\x00', 0x5d77, 0x0, &(0x7f00000001c0), 0x40f00, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x3, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x1, 0xd2f5, 0x3}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000300)=[r5, r5, r5], &(0x7f00000003c0)=[{0x0, 0x5, 0x1, 0x8}, {0x5, 0x2, 0xd, 0xe}, {0x5, 0x4, 0xf}, {0x0, 0x1, 0x5, 0x9}, {0x1, 0x1, 0x2, 0xa}, {0x4, 0x1, 0xe, 0x4}, {0x5, 0x4, 0x9}, {0x2, 0x4, 0x8, 0xa}, {0x5, 0x1, 0x5, 0x1}], 0x10, 0x3, @void, @value}, 0x94) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) 2.696384245s ago: executing program 3 (id=6445): perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = syz_clone(0x8080400, &(0x7f0000000680)="1ad8e0db7ea5ae70759627e514511cf6fa10e9139332c7c1f8452e31429dd5e572ac118f310e5c4c983adc301fff77f2aba23a8797f25ee9d8b726f3d0b97913f8e347addcb8fb95b5e1480c7508a0821c7935777c83af3858f70088f26b147fafe8098665fd7bc345d453b68c2e76f709964f2697b0fbb6bda358a1a3fee6faa58cee4687f18b8468cea1beff947ff305bf80a50d44fd9bd4a8a3a64c80d7b1cc3960c6abc3a54285327bb3270cfe4e1159a415d0ac379f68595456045d14b57ae2", 0xc2, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000200)="f842c5861fc9f47e54e2d06a77b3") syz_open_procfs$namespace(r4, &(0x7f0000000280)='ns/pid\x00') 2.665550775s ago: executing program 5 (id=6446): bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000006114a000000000000500002223ea7b009500740000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x7e) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43451) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000980)=@o_path={&(0x7f00000006c0)='./file0\x00', 0x0, 0x6010}, 0x18) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.656792434s ago: executing program 0 (id=6447): perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0xf43f, 0x9, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = syz_clone(0x8080400, &(0x7f0000000680)="1ad8e0db7ea5ae70759627e514511cf6fa10e9139332c7c1f8452e31429dd5e572ac118f310e5c4c983adc301fff77f2aba23a8797f25ee9d8b726f3d0b97913f8e347addcb8fb95b5e1480c7508a0821c7935777c83af3858f70088f26b147fafe8098665fd7bc345d453b68c2e76f709964f2697b0fbb6bda358a1a3fee6faa58cee4687f18b8468cea1beff947ff305bf80a50d44fd9bd4a8a3a64c80d7b1cc3960c6abc3a54285327bb3270cfe4e1159a415d0ac379f68595456045d14b57ae2", 0xc2, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000200)="f842c5861fc9f47e54e2d06a77b3") syz_open_procfs$namespace(r4, &(0x7f0000000280)='ns/pid\x00') 2.634599135s ago: executing program 4 (id=6448): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='timer_start\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001180)=ANY=[@ANYBLOB="0a00000005000000020000000300000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000280), 0x75, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x67, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1e00000000000000ef0000000000e0ffffff0000", @ANYRES32=r1, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200000003000000000000000c00"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r5}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000680)=ANY=[@ANYBLOB="0600000004000000008000005c00000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000003fba6a5d6a5628267d2a2941efb32fe12f6ac3d13f1dbc2b6680148719d20dfb1702183686d02dd06bf6f6fa386422cca30d0bc2bcf3205126b38bacd0d5abcae7fcb59f85d72a905e0dc8ef54fd9e5e6206e47e6ba5d7065c69c3645eac061458f87a13d0e85bd064099532e0ade326b43480d07e5093bc54f649877d26d335a445d69d930d4dad183fb7b66481377bd66f8d111e246a69acebcb4c9c99636034c2316e0301bca90d730b0be353e39beb64b2", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000feffffff00"/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008", @ANYRES32=0x0], 0x48) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(0x0, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 2.510634425s ago: executing program 2 (id=6449): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff, @void, @value}, 0x94) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{0x1, 0xffffffffffffffff}, &(0x7f0000000880), &(0x7f00000008c0)=r1}, 0x20) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000940)=0xffffffffffffffff, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1e0000000f0000000100faf7ffffffffffff0000", @ANYRES32=r2, @ANYBLOB="8100"/20, @ANYRES32=0x0, @ANYRES32=r3, @ANYBLOB="0200000002000000010000000600000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4, 0xffffffffffffffff}, 0x0, 0x0, 0x406}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="190000000400000008000000", @ANYBLOB="0000006ae9b3", @ANYRES32, @ANYBLOB], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000f40)=@bloom_filter={0x1e, 0xa, 0x9a, 0x800, 0x804, 0xffffffffffffffff, 0x6, '\x00', 0x0, r3, 0x4, 0x0, 0x0, 0x6, @void, @value, @void, @value}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000fc0)={r4, 0xffffffffffffffff}, 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='task_newtask\x00', r12}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r14 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r13}, 0x8) close(r14) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r15 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="150000000800000002"], 0x50) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0xf, &(0x7f0000000c80)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r15}, {}, {0x7, 0x0, 0xb, 0x2}, {0x85, 0x0, 0x0, 0x51}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0x1c, &(0x7f00000003c0)={r16, 0x0, 0x0}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000a00)={r15, &(0x7f0000000800), 0x0}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001080)=@bpf_ext={0x1c, 0xd, &(0x7f0000000b00)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xd}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}], &(0x7f0000000980)='syzkaller\x00', 0x2, 0x41, &(0x7f0000000b80)=""/65, 0x40f00, 0x3, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000ec0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000f00)={0x1, 0xf, 0xe0, 0x658}, 0x10, 0x1deba, r0, 0x1, &(0x7f0000001000)=[r9, r10, r11, r5, r2, r2], &(0x7f0000001040)=[{0x1, 0x3, 0xb, 0xc}], 0x10, 0x3, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r17 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r17, 0xc004743e, 0x20001400) bpf$PROG_LOAD(0x5, 0x0, 0x0) 2.505929765s ago: executing program 5 (id=6450): bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="21c66ba5cce04c5b1733adba49a2dd0600000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x6}, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e0000008500000050000000"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x4, &(0x7f0000000500)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x22}]}, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={r2, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x80, 0x6, 0x6, 0x8080, r0, 0xff, '\x00', r4, r3, 0x1, 0x1, 0x2, 0x5, @value=r3, @void, @void, @value}, 0x50) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000600)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) r5 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001080)=ANY=[@ANYBLOB="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", @ANYRESHEX=r5], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0xfd9b, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x30}, [@ldst={0x3, 0x3, 0x3, 0xa, 0x0, 0xff00}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 1.724873846s ago: executing program 4 (id=6451): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={0xffffffffffffffff, 0x2000000}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x26e1, 0x0) close(r3) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xee, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="0e0000000400000008", @ANYBLOB="00000013"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r6}, &(0x7f00000008c0), &(0x7f0000000900)=r5}, 0x20) 1.668701396s ago: executing program 4 (id=6452): mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, 0x8, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x12, 0x24, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000780)={{r1, 0xffffffffffffffff}, &(0x7f0000000700), &(0x7f0000000740)=r0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, 0x0, &(0x7f00000005c0)=""/255}, 0x20) 1.601597276s ago: executing program 4 (id=6453): perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = syz_clone(0x8080400, &(0x7f0000000680)="1ad8e0db7ea5ae70759627e514511cf6fa10e9139332c7c1f8452e31429dd5e572ac118f310e5c4c983adc301fff77f2aba23a8797f25ee9d8b726f3d0b97913f8e347addcb8fb95b5e1480c7508a0821c7935777c83af3858f70088f26b147fafe8098665fd7bc345d453b68c2e76f709964f2697b0fbb6bda358a1a3fee6faa58cee4687f18b8468cea1beff947ff305bf80a50d44fd9bd4a8a3a64c80d7b1cc3960c6abc3a54285327bb3270cfe4e1159a415d0ac379f68595456045d14b57ae2", 0xc2, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000200)="f842c5861fc9f47e54e2d06a77b3") syz_open_procfs$namespace(r4, &(0x7f0000000280)='ns/pid\x00') 1.494341477s ago: executing program 5 (id=6454): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 1.483103387s ago: executing program 5 (id=6455): bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xd, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43451) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000980)=@o_path={&(0x7f00000006c0)='./file0\x00', 0x0, 0x6010}, 0x18) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000a40)={0x0, &(0x7f0000000600)=""/181, 0x0, 0x0, 0xff, r0}, 0x38) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x5}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'wg2\x00'}) 1.195147687s ago: executing program 0 (id=6456): bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0}, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1.145533707s ago: executing program 3 (id=6457): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 1.025739948s ago: executing program 3 (id=6458): mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, 0x8, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x12, 0x24, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000780)={{r1, 0xffffffffffffffff}, &(0x7f0000000700), &(0x7f0000000740)=r0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000300), 0x0}, 0x20) 31.59346ms ago: executing program 3 (id=6459): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x6, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000faffffff0000000000004000850000002c0000001800000004000000000000000700000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x27, 0x8, 0x0, &(0x7f0000000280)="ed7e17526b2d6f70", 0x0, 0x1403, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 1.772769ms ago: executing program 2 (id=6460): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x10, &(0x7f0000000d00)=ANY=[@ANYBLOB="18000000020000000000000008000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000200000085000000060000008520000005000000181b0000", @ANYRES32=0x1, @ANYBLOB="0000000000000000185500000d0000f1b200000000000000e806e3d59500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x9, 0xb8, &(0x7f0000000640)=""/184, 0x41100, 0x84, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x4, 0xc, 0xf4, 0x4}, 0x10, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000780)=[{0x2, 0x3, 0x2, 0x8}, {0x5, 0x5, 0x0, 0x6}, {0x2, 0x5, 0xa, 0x3}, {0x1, 0x1, 0xf, 0x6}], 0x10, 0x10001, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xfb, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x3, 0x20000307, &(0x7f0000001280)=ANY=[@ANYBLOB="242800000504e5bc71d415cd60dd57003e90e4bea3ae4a5b1268f6070937f231a0a049ac08cb1c0f927b6076d8e5c06c5d4fe90f6a0141e6d5568db97eeb685876e44d99e492f560ce4f2b25cd31b1a10de61506e1f520e188a26c41963b4a1c4344780434de2e197dc2c6c77d00f3a9a0c3bfa7bb3e2fc021daa85d70df965cd751b08af3f26c123a868d2ad8d21a700cbaf81cdd97b0d5054c88349560a56ac5082a8c3fabfc9ebcf78a3f9bc6c1b6fa717171384507fc52bb649c5f518331ea1ed6b73fd63611d53160b87c3113173a6e3ec66ac72148a7ede8575cbfba430c83419c00d12b7e", @ANYRES32=r1, @ANYRESDEC=r2], 0x0, 0x0, 0x3d, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r3}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000cc0)={r0, 0xe0, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0xa, &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xab, &(0x7f0000000980)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0x1f, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000200)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd020f4c0c8c56147d66527da307bf731fef97861750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3665f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447c2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72e7ead0509d380578673f8b6e74ce23877a6b24db0000000000000003629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d7b90dfae158b94f50adab988dd8e12b1b56073d0d10f7067c881434af5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf77bfc95769a9294df517d90bdc01e73835efd98ad5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b31592479ecf2392548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbe1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5646ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4766e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec859c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f250057931d828ec78e116ae46c4897e2795b6ff92e9a1f63a6ed8fb4f8f3a6ec4e76f8621e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403f02734137ff47257f164391c673b6071b6ad0f05eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb79f5589829b6b0679b5d65a81826fc9b38f791c8f1892b51ad65a89bc84646ebf78f5d5d4804d9abb071fd711b5e7cc163b42a6510b8f5ee6747df0b560eabe0499bf1fef7c18bb9f55effa018679845c6598fb78bf1b8d9d9f04a5f6062c2bbb91952755b3f7c948268cb647d0a0bb1286480615941154a01d23734bcafe3b164474e2f2efa77850686ee4541f3e79efa63545a7ae53d5f0c40cc86473f7eb093980bd0d97bb4750128d9c519984c5f731ea259e71b2f12d67ce12e52c283e74594dfc933e625737ed231d61263721d46daf093f770357cd78fe1431aef52b4a0a933f1a5334ad03f3876fc8a8e187f80318427b4c922075cf829e3cc49d71d52137b48e1fb6b05dd1c7b251a7059f0a4b4f3431f67fc65b75c202e43816e34ff41db85bacd77b25242830b788ae1e00"/2566], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x11, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@map_idx_val={0x18, 0x5, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x6}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='syzkaller\x00', 0x5d77, 0x0, &(0x7f00000001c0), 0x40f00, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x3, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x1, 0xd2f5, 0x3}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000300)=[r5, r5, r5], &(0x7f00000003c0)=[{0x0, 0x5, 0x1, 0x8}, {0x5, 0x2, 0xd, 0xe}, {0x5, 0x4, 0xf}, {0x0, 0x1, 0x5, 0x9}, {0x1, 0x1, 0x2, 0xa}, {0x4, 0x1, 0xe, 0x4}, {0x5, 0x4, 0x9}, {0x2, 0x4, 0x8, 0xa}, {0x5, 0x1, 0x5, 0x1}], 0x10, 0x3, @void, @value}, 0x94) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) 0s ago: executing program 5 (id=6461): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0x21, 0x3, 0xe, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x16, 0x0, 0x400004, 0x10001, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r5, 0x541b, 0x2000fcc6) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x3, 0x2, 0x85, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f0000000340), &(0x7f0000000240), 0x812, r6}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x9) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={r4}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r6}, &(0x7f0000000200), &(0x7f0000000280)=r3}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r1, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x2b, &(0x7f0000000700)=[{}], 0x8, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0xc1, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="1801000000050000000000000000ea0485000000d000000095"], &(0x7f0000000a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) kernel console output (not intermixed with test programs): ? fpregs_assert_state_consistent+0xb6/0xe0 [ 678.570693][T15891] __x64_sys_socketpair+0x9b/0xb0 [ 678.575553][T15891] x64_sys_call+0x19b/0x9a0 [ 678.579896][T15891] do_syscall_64+0x3b/0xb0 [ 678.584142][T15891] ? clear_bhb_loop+0x55/0xb0 [ 678.588664][T15891] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 678.594384][T15891] RIP: 0033:0x7f5b5c17e819 [ 678.598637][T15891] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 678.618082][T15891] RSP: 002b:00007f5b5cfa5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 678.626331][T15891] RAX: ffffffffffffffda RBX: 00007f5b5c335fa0 RCX: 00007f5b5c17e819 [ 678.634136][T15891] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 678.641948][T15891] RBP: 00007f5b5cfa5090 R08: 0000000000000000 R09: 0000000000000000 [ 678.649758][T15891] R10: 0000000020000140 R11: 0000000000000246 R12: 0000000000000001 [ 678.657569][T15891] R13: 0000000000000000 R14: 00007f5b5c335fa0 R15: 00007fff3abd1038 [ 678.665387][T15891] [ 681.371669][T15984] device syzkaller0 entered promiscuous mode [ 682.190329][T16017] device macsec0 left promiscuous mode [ 682.244290][T16020] device macsec0 entered promiscuous mode [ 682.286969][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 682.465696][T16033] device pim6reg1 entered promiscuous mode [ 682.640751][T16037] device syzkaller0 entered promiscuous mode [ 682.873244][T16025] device macsec0 left promiscuous mode [ 683.006847][T16057] device macsec0 entered promiscuous mode [ 683.017805][T16056] device sit0 entered promiscuous mode [ 683.879860][T16085] FAULT_INJECTION: forcing a failure. [ 683.879860][T16085] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 683.952624][T16085] CPU: 0 PID: 16085 Comm: syz.0.4693 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 683.962363][T16085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 683.972254][T16085] Call Trace: [ 683.975378][T16085] [ 683.978153][T16085] dump_stack_lvl+0x151/0x1b7 [ 683.982673][T16085] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 683.987963][T16085] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 683.993948][T16085] dump_stack+0x15/0x1e [ 683.997938][T16085] should_fail_ex+0x3d0/0x520 [ 684.002453][T16085] should_fail+0xb/0x10 [ 684.006443][T16085] should_fail_usercopy+0x1a/0x20 [ 684.011305][T16085] _copy_to_user+0x1e/0x90 [ 684.015566][T16085] generic_map_lookup_batch+0x6ff/0xcc0 [ 684.020943][T16085] ? bpf_map_update_value+0x410/0x410 [ 684.026147][T16085] ? bpf_map_do_batch+0x99/0x630 [ 684.030919][T16085] ? bpf_map_update_value+0x410/0x410 [ 684.036130][T16085] bpf_map_do_batch+0x2e2/0x630 [ 684.040816][T16085] __sys_bpf+0x66b/0x7f0 [ 684.044891][T16085] ? clockevents_program_event+0x22f/0x300 [ 684.050537][T16085] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 684.055746][T16085] ? __sched_clock_gtod_offset+0x100/0x100 [ 684.061384][T16085] ? debug_smp_processor_id+0x17/0x20 [ 684.066593][T16085] __x64_sys_bpf+0x7c/0x90 [ 684.070844][T16085] x64_sys_call+0x87f/0x9a0 [ 684.075181][T16085] do_syscall_64+0x3b/0xb0 [ 684.079437][T16085] ? clear_bhb_loop+0x55/0xb0 [ 684.083948][T16085] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 684.089677][T16085] RIP: 0033:0x7f55a6f7e819 [ 684.093932][T16085] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 684.113370][T16085] RSP: 002b:00007f55a7e3e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 684.121618][T16085] RAX: ffffffffffffffda RBX: 00007f55a7135fa0 RCX: 00007f55a6f7e819 [ 684.129436][T16085] RDX: 0000000000000038 RSI: 00000000200003c0 RDI: 0000000000000018 [ 684.137240][T16085] RBP: 00007f55a7e3e090 R08: 0000000000000000 R09: 0000000000000000 [ 684.145062][T16085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 684.152860][T16085] R13: 0000000000000000 R14: 00007f55a7135fa0 R15: 00007ffc91f06158 [ 684.160676][T16085] [ 684.216002][T16090] device veth0_vlan left promiscuous mode [ 684.257381][T16090] device veth0_vlan entered promiscuous mode [ 686.450257][T16130] device veth1_macvtap entered promiscuous mode [ 686.460068][T16130] device macsec0 entered promiscuous mode [ 686.502911][ T548] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 690.234859][T16186] device macsec0 left promiscuous mode [ 690.302651][T16183] device macsec0 entered promiscuous mode [ 692.139268][T16215] device pim6reg1 entered promiscuous mode [ 692.949399][T16243] device veth1_macvtap left promiscuous mode [ 692.994805][T16243] device macsec0 left promiscuous mode [ 693.063704][T16245] device macsec0 left promiscuous mode [ 693.084967][T16243] device veth1_macvtap entered promiscuous mode [ 693.091325][T16243] device macsec0 entered promiscuous mode [ 693.264309][T16233] device macsec0 entered promiscuous mode [ 695.043225][T16297] device macsec0 left promiscuous mode [ 695.147440][T16298] device macsec0 entered promiscuous mode [ 695.729852][T16305] device macsec0 left promiscuous mode [ 695.835941][T16306] device macsec0 entered promiscuous mode [ 695.847527][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 697.337727][T16346] device syzkaller0 entered promiscuous mode [ 697.800329][T16363] FAULT_INJECTION: forcing a failure. [ 697.800329][T16363] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 697.867799][T16375] device veth1_macvtap left promiscuous mode [ 697.900099][T16363] CPU: 0 PID: 16363 Comm: syz.0.4777 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 697.909835][T16363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 697.919722][T16363] Call Trace: [ 697.922847][T16363] [ 697.925621][T16363] dump_stack_lvl+0x151/0x1b7 [ 697.930134][T16363] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 697.935429][T16363] ? avc_has_extended_perms+0xad7/0x10f0 [ 697.940898][T16363] dump_stack+0x15/0x1e [ 697.944894][T16363] should_fail_ex+0x3d0/0x520 [ 697.949404][T16363] should_fail+0xb/0x10 [ 697.953395][T16363] should_fail_usercopy+0x1a/0x20 [ 697.958257][T16363] _copy_from_user+0x1e/0xc0 [ 697.959248][T16375] device macsec0 left promiscuous mode [ 697.962679][T16363] do_vfs_ioctl+0xa1e/0x29a0 [ 697.972404][T16363] ? cpu_clock_event_read+0x50/0x50 [ 697.977438][T16363] ? kstrtouint_from_user+0x124/0x180 [ 697.982729][T16363] ? __x64_compat_sys_ioctl+0x90/0x90 [ 697.987940][T16363] ? irqentry_exit+0x30/0x40 [ 697.992364][T16363] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 697.998188][T16363] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 698.004178][T16363] ? avc_has_extended_perms+0xa7e/0x10f0 [ 698.009650][T16363] ? has_cap_mac_admin+0x3c0/0x3c0 [ 698.014590][T16363] ? enqueue_hrtimer+0xca/0x250 [ 698.019623][T16363] ? __hrtimer_run_queues+0xa72/0xad0 [ 698.024834][T16363] ? irqentry_exit+0x30/0x40 [ 698.029255][T16363] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 698.034904][T16363] ? selinux_file_ioctl+0x3cc/0x540 [ 698.039933][T16363] ? selinux_file_alloc_security+0x120/0x120 [ 698.045755][T16363] ? __fget_files+0x2c6/0x330 [ 698.050269][T16363] ? __rcu_read_unlock+0x6/0xd0 [ 698.054948][T16363] ? __fget_files+0x2cb/0x330 [ 698.059470][T16363] ? security_file_ioctl+0x84/0xb0 [ 698.064408][T16363] __se_sys_ioctl+0x99/0x190 [ 698.068833][T16363] __x64_sys_ioctl+0x7b/0x90 [ 698.073263][T16363] x64_sys_call+0x98/0x9a0 [ 698.077510][T16363] do_syscall_64+0x3b/0xb0 [ 698.081786][T16363] ? clear_bhb_loop+0x55/0xb0 [ 698.086278][T16363] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 698.092011][T16363] RIP: 0033:0x7f55a6f7e819 [ 698.096256][T16363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 698.115700][T16363] RSP: 002b:00007f55a7e1d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 698.123942][T16363] RAX: ffffffffffffffda RBX: 00007f55a7136080 RCX: 00007f55a6f7e819 [ 698.131754][T16363] RDX: 0000000020000040 RSI: 00000000401c5820 RDI: 0000000000000003 [ 698.139564][T16363] RBP: 00007f55a7e1d090 R08: 0000000000000000 R09: 0000000000000000 [ 698.147468][T16363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 698.155282][T16363] R13: 0000000000000000 R14: 00007f55a7136080 R15: 00007ffc91f06158 [ 698.163358][T16363] [ 698.416275][T16381] ip6_vti0: mtu greater than device maximum [ 699.049418][T16404] device pim6reg1 entered promiscuous mode [ 699.067004][T16404] FAULT_INJECTION: forcing a failure. [ 699.067004][T16404] name failslab, interval 1, probability 0, space 0, times 0 [ 699.226701][T16404] CPU: 1 PID: 16404 Comm: syz.3.4788 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 699.236454][T16404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 699.246324][T16404] Call Trace: [ 699.249454][T16404] [ 699.252227][T16404] dump_stack_lvl+0x151/0x1b7 [ 699.256739][T16404] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 699.262032][T16404] ? rt6_sync_up+0x1f0/0x1f0 [ 699.266478][T16404] ? fib6_del+0x1060/0x1060 [ 699.270798][T16404] dump_stack+0x15/0x1e [ 699.274792][T16404] should_fail_ex+0x3d0/0x520 [ 699.279313][T16404] __should_failslab+0xaf/0xf0 [ 699.283903][T16404] should_failslab+0x9/0x20 [ 699.288245][T16404] kmem_cache_alloc_node+0x42/0x330 [ 699.293278][T16404] ? __alloc_skb+0xcc/0x2d0 [ 699.297617][T16404] ? rt6_sync_up+0x17a/0x1f0 [ 699.302043][T16404] __alloc_skb+0xcc/0x2d0 [ 699.306216][T16404] inet6_ifinfo_notify+0x70/0x110 [ 699.311073][T16404] addrconf_notify+0xae5/0xe10 [ 699.315677][T16404] raw_notifier_call_chain+0x8c/0xf0 [ 699.320792][T16404] __dev_notify_flags+0x304/0x610 [ 699.325652][T16404] ? __dev_change_flags+0x6e0/0x6e0 [ 699.330687][T16404] ? __dev_change_flags+0x569/0x6e0 [ 699.335721][T16404] ? dev_get_flags+0x1e0/0x1e0 [ 699.340321][T16404] ? kstrtouint+0xf6/0x180 [ 699.344574][T16404] dev_change_flags+0xf0/0x1a0 [ 699.349173][T16404] dev_ifsioc+0x177/0x1150 [ 699.353429][T16404] ? dev_ioctl+0xe60/0xe60 [ 699.357679][T16404] ? __kasan_check_write+0x14/0x20 [ 699.362622][T16404] ? mutex_lock+0xb1/0x1e0 [ 699.366877][T16404] ? bit_wait_io_timeout+0x120/0x120 [ 699.371999][T16404] dev_ioctl+0x543/0xe60 [ 699.376077][T16404] sock_do_ioctl+0x26b/0x450 [ 699.380504][T16404] ? has_cap_mac_admin+0x3c0/0x3c0 [ 699.385454][T16404] ? sock_show_fdinfo+0xa0/0xa0 [ 699.390140][T16404] ? selinux_file_ioctl+0x3cc/0x540 [ 699.395171][T16404] sock_ioctl+0x455/0x740 [ 699.399336][T16404] ? sock_poll+0x400/0x400 [ 699.403594][T16404] ? __fget_files+0x2cb/0x330 [ 699.408111][T16404] ? security_file_ioctl+0x84/0xb0 [ 699.413050][T16404] ? sock_poll+0x400/0x400 [ 699.417305][T16404] __se_sys_ioctl+0x114/0x190 [ 699.421825][T16404] __x64_sys_ioctl+0x7b/0x90 [ 699.426244][T16404] x64_sys_call+0x98/0x9a0 [ 699.430504][T16404] do_syscall_64+0x3b/0xb0 [ 699.434750][T16404] ? clear_bhb_loop+0x55/0xb0 [ 699.439267][T16404] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 699.444995][T16404] RIP: 0033:0x7fc7a657e819 [ 699.449249][T16404] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 699.468684][T16404] RSP: 002b:00007fc7a72f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 699.476927][T16404] RAX: ffffffffffffffda RBX: 00007fc7a6735fa0 RCX: 00007fc7a657e819 [ 699.484835][T16404] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000008 [ 699.492639][T16404] RBP: 00007fc7a72f0090 R08: 0000000000000000 R09: 0000000000000000 [ 699.500536][T16404] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 699.508349][T16404] R13: 0000000000000000 R14: 00007fc7a6735fa0 R15: 00007ffeff3424f8 [ 699.516163][T16404] [ 699.597366][T16420] device veth0_vlan left promiscuous mode [ 699.607015][T16420] device veth0_vlan entered promiscuous mode [ 699.677566][T16428] device sit0 left promiscuous mode [ 699.936085][T16436] device sit0 left promiscuous mode [ 700.344762][T16434] device sit0 entered promiscuous mode [ 700.401324][T16432] device sit0 entered promiscuous mode [ 700.465582][T16425] device veth1_macvtap left promiscuous mode [ 700.471430][T16425] device macsec0 left promiscuous mode [ 700.497851][T16442] device veth1_macvtap entered promiscuous mode [ 700.504014][T16442] device macsec0 entered promiscuous mode [ 700.552733][T16449] FAULT_INJECTION: forcing a failure. [ 700.552733][T16449] name failslab, interval 1, probability 0, space 0, times 0 [ 700.599099][T16449] CPU: 0 PID: 16449 Comm: syz.4.4801 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 700.608831][T16449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 700.618725][T16449] Call Trace: [ 700.621848][T16449] [ 700.624627][T16449] dump_stack_lvl+0x151/0x1b7 [ 700.629134][T16449] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 700.634430][T16449] dump_stack+0x15/0x1e [ 700.638424][T16449] should_fail_ex+0x3d0/0x520 [ 700.642934][T16449] __should_failslab+0xaf/0xf0 [ 700.647534][T16449] ? selinux_sk_alloc_security+0x7d/0x1a0 [ 700.653089][T16449] should_failslab+0x9/0x20 [ 700.657426][T16449] __kmem_cache_alloc_node+0x3d/0x2a0 [ 700.662636][T16449] ? selinux_sk_alloc_security+0x7d/0x1a0 [ 700.668197][T16449] kmalloc_trace+0x2a/0xa0 [ 700.672441][T16449] selinux_sk_alloc_security+0x7d/0x1a0 [ 700.677823][T16449] security_sk_alloc+0x72/0xb0 [ 700.682425][T16449] sk_prot_alloc+0x114/0x330 [ 700.686900][T16449] sk_alloc+0x38/0x440 [ 700.690752][T16449] ? bpf_test_init+0x169/0x190 [ 700.695356][T16449] bpf_prog_test_run_skb+0x384/0x13a0 [ 700.700568][T16449] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 700.706300][T16449] ? __kasan_check_write+0x14/0x20 [ 700.711243][T16449] ? fput+0x15b/0x1b0 [ 700.715058][T16449] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 700.720785][T16449] bpf_prog_test_run+0x3b0/0x630 [ 700.725576][T16449] ? bpf_prog_query+0x260/0x260 [ 700.730250][T16449] ? selinux_bpf+0xd2/0x100 [ 700.734587][T16449] ? security_bpf+0x82/0xb0 [ 700.738926][T16449] __sys_bpf+0x59f/0x7f0 [ 700.743005][T16449] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 700.748214][T16449] ? __ia32_sys_read+0x90/0x90 [ 700.752811][T16449] ? debug_smp_processor_id+0x17/0x20 [ 700.758017][T16449] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 700.763922][T16449] __x64_sys_bpf+0x7c/0x90 [ 700.768173][T16449] x64_sys_call+0x87f/0x9a0 [ 700.772511][T16449] do_syscall_64+0x3b/0xb0 [ 700.776765][T16449] ? clear_bhb_loop+0x55/0xb0 [ 700.781291][T16449] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 700.787008][T16449] RIP: 0033:0x7f5b5c17e819 [ 700.791262][T16449] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 700.810702][T16449] RSP: 002b:00007f5b5cfa5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 700.818945][T16449] RAX: ffffffffffffffda RBX: 00007f5b5c335fa0 RCX: 00007f5b5c17e819 [ 700.826757][T16449] RDX: 0000000000000048 RSI: 00000000200002c0 RDI: 000000000000000a [ 700.834570][T16449] RBP: 00007f5b5cfa5090 R08: 0000000000000000 R09: 0000000000000000 [ 700.842377][T16449] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 700.850188][T16449] R13: 0000000000000000 R14: 00007f5b5c335fa0 R15: 00007fff3abd1038 [ 700.858026][T16449] [ 701.634076][T16482] device sit0 entered promiscuous mode [ 702.517082][T16531] device sit0 left promiscuous mode [ 702.638436][T16531] device sit0 entered promiscuous mode [ 703.101561][T16564] device syzkaller0 entered promiscuous mode [ 704.107228][T16593] FAULT_INJECTION: forcing a failure. [ 704.107228][T16593] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 704.159022][T16593] CPU: 0 PID: 16593 Comm: syz.3.4840 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 704.168751][T16593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 704.178647][T16593] Call Trace: [ 704.181770][T16593] [ 704.184551][T16593] dump_stack_lvl+0x151/0x1b7 [ 704.189064][T16593] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 704.194355][T16593] ? ioctl_has_perm+0x3f0/0x560 [ 704.199041][T16593] dump_stack+0x15/0x1e [ 704.203036][T16593] should_fail_ex+0x3d0/0x520 [ 704.207551][T16593] should_fail+0xb/0x10 [ 704.211538][T16593] should_fail_usercopy+0x1a/0x20 [ 704.216401][T16593] _copy_from_user+0x1e/0xc0 [ 704.220828][T16593] __tun_chr_ioctl+0x28c/0x22d0 [ 704.225604][T16593] ? tun_flow_create+0x320/0x320 [ 704.230376][T16593] ? __fget_files+0x2cb/0x330 [ 704.234892][T16593] tun_chr_ioctl+0x2a/0x40 [ 704.239326][T16593] ? tun_chr_poll+0x670/0x670 [ 704.243824][T16593] __se_sys_ioctl+0x114/0x190 [ 704.248342][T16593] __x64_sys_ioctl+0x7b/0x90 [ 704.252768][T16593] x64_sys_call+0x98/0x9a0 [ 704.257019][T16593] do_syscall_64+0x3b/0xb0 [ 704.261277][T16593] ? clear_bhb_loop+0x55/0xb0 [ 704.265782][T16593] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 704.271520][T16593] RIP: 0033:0x7fc7a657e819 [ 704.275763][T16593] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 704.295817][T16593] RSP: 002b:00007fc7a72cf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 704.304059][T16593] RAX: ffffffffffffffda RBX: 00007fc7a6736080 RCX: 00007fc7a657e819 [ 704.312052][T16593] RDX: 0000000020000100 RSI: 00000000400454d9 RDI: 0000000000000007 [ 704.320377][T16593] RBP: 00007fc7a72cf090 R08: 0000000000000000 R09: 0000000000000000 [ 704.328186][T16593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 704.335998][T16593] R13: 0000000000000001 R14: 00007fc7a6736080 R15: 00007ffeff3424f8 [ 704.343816][T16593] [ 707.237343][ T28] audit: type=1400 audit(1732129472.857:170): avc: denied { create } for pid=16659 comm="syz.3.4858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 708.246710][T16672] device veth1_macvtap left promiscuous mode [ 708.258912][T16672] device macsec0 left promiscuous mode [ 708.362883][T16683] device veth1_macvtap entered promiscuous mode [ 708.369048][T16683] device macsec0 entered promiscuous mode [ 709.421290][T16715] FAULT_INJECTION: forcing a failure. [ 709.421290][T16715] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 709.491589][T16715] CPU: 1 PID: 16715 Comm: syz.0.4873 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 709.501318][T16715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 709.511214][T16715] Call Trace: [ 709.514336][T16715] [ 709.517115][T16715] dump_stack_lvl+0x151/0x1b7 [ 709.521630][T16715] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 709.526921][T16715] ? migrate_enable+0x1cb/0x2b0 [ 709.531609][T16715] dump_stack+0x15/0x1e [ 709.535600][T16715] should_fail_ex+0x3d0/0x520 [ 709.540116][T16715] should_fail+0xb/0x10 [ 709.544107][T16715] should_fail_usercopy+0x1a/0x20 [ 709.548965][T16715] _copy_to_user+0x1e/0x90 [ 709.553218][T16715] generic_map_lookup_batch+0x778/0xcc0 [ 709.558603][T16715] ? bpf_map_update_value+0x410/0x410 [ 709.563810][T16715] ? __fdget+0x1b7/0x240 [ 709.567886][T16715] ? bpf_map_update_value+0x410/0x410 [ 709.573094][T16715] bpf_map_do_batch+0x2e2/0x630 [ 709.577792][T16715] __sys_bpf+0x66b/0x7f0 [ 709.581864][T16715] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 709.587077][T16715] ? __ia32_sys_read+0x90/0x90 [ 709.591670][T16715] ? debug_smp_processor_id+0x17/0x20 [ 709.596878][T16715] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 709.602778][T16715] __x64_sys_bpf+0x7c/0x90 [ 709.607035][T16715] x64_sys_call+0x87f/0x9a0 [ 709.611380][T16715] do_syscall_64+0x3b/0xb0 [ 709.615622][T16715] ? clear_bhb_loop+0x55/0xb0 [ 709.620135][T16715] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 709.625873][T16715] RIP: 0033:0x7f55a6f7e819 [ 709.630118][T16715] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 709.649560][T16715] RSP: 002b:00007f55a7e3e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 709.657801][T16715] RAX: ffffffffffffffda RBX: 00007f55a7135fa0 RCX: 00007f55a6f7e819 [ 709.665615][T16715] RDX: 0000000000000038 RSI: 00000000200004c0 RDI: 0000000000000018 [ 709.673430][T16715] RBP: 00007f55a7e3e090 R08: 0000000000000000 R09: 0000000000000000 [ 709.681233][T16715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 709.689047][T16715] R13: 0000000000000000 R14: 00007f55a7135fa0 R15: 00007ffc91f06158 [ 709.696863][T16715] [ 709.860485][T16730] FAULT_INJECTION: forcing a failure. [ 709.860485][T16730] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 709.886010][T16730] CPU: 0 PID: 16730 Comm: syz.2.4876 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 709.895736][T16730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 709.905641][T16730] Call Trace: [ 709.908753][T16730] [ 709.911531][T16730] dump_stack_lvl+0x151/0x1b7 [ 709.916047][T16730] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 709.921339][T16730] dump_stack+0x15/0x1e [ 709.925338][T16730] should_fail_ex+0x3d0/0x520 [ 709.929844][T16730] should_fail+0xb/0x10 [ 709.933835][T16730] should_fail_usercopy+0x1a/0x20 [ 709.938695][T16730] _copy_from_user+0x1e/0xc0 [ 709.943122][T16730] bpf_test_init+0x12e/0x190 [ 709.947550][T16730] bpf_prog_test_run_skb+0x297/0x13a0 [ 709.952760][T16730] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 709.958486][T16730] ? __kasan_check_write+0x14/0x20 [ 709.963431][T16730] ? fput+0x15b/0x1b0 [ 709.967249][T16730] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 709.972979][T16730] bpf_prog_test_run+0x3b0/0x630 [ 709.977752][T16730] ? bpf_prog_query+0x260/0x260 [ 709.982437][T16730] ? selinux_bpf+0xd2/0x100 [ 709.986780][T16730] ? security_bpf+0x82/0xb0 [ 709.991118][T16730] __sys_bpf+0x59f/0x7f0 [ 709.995199][T16730] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 710.000414][T16730] ? __ia32_sys_read+0x90/0x90 [ 710.005008][T16730] ? debug_smp_processor_id+0x17/0x20 [ 710.010210][T16730] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 710.016113][T16730] __x64_sys_bpf+0x7c/0x90 [ 710.020370][T16730] x64_sys_call+0x87f/0x9a0 [ 710.024708][T16730] do_syscall_64+0x3b/0xb0 [ 710.028960][T16730] ? clear_bhb_loop+0x55/0xb0 [ 710.033474][T16730] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 710.039202][T16730] RIP: 0033:0x7f72e4d7e819 [ 710.043454][T16730] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 710.063501][T16730] RSP: 002b:00007f72e5b8a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 710.071753][T16730] RAX: ffffffffffffffda RBX: 00007f72e4f35fa0 RCX: 00007f72e4d7e819 [ 710.079564][T16730] RDX: 000000000000001e RSI: 0000000020000080 RDI: 000000000000000a [ 710.087382][T16730] RBP: 00007f72e5b8a090 R08: 0000000000000000 R09: 0000000000000000 [ 710.095183][T16730] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 710.102992][T16730] R13: 0000000000000000 R14: 00007f72e4f35fa0 R15: 00007ffde72de978 [ 710.110817][T16730] [ 710.203202][T16734] device syzkaller0 entered promiscuous mode [ 716.399711][T16776] FAULT_INJECTION: forcing a failure. [ 716.399711][T16776] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 716.437749][T16778] device sit0 left promiscuous mode [ 716.471023][T16776] CPU: 0 PID: 16776 Comm: syz.2.4887 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 716.480752][T16776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 716.490638][T16776] Call Trace: [ 716.493766][T16776] [ 716.496538][T16776] dump_stack_lvl+0x151/0x1b7 [ 716.501053][T16776] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 716.506345][T16776] ? __kasan_check_write+0x14/0x20 [ 716.511296][T16776] dump_stack+0x15/0x1e [ 716.515285][T16776] should_fail_ex+0x3d0/0x520 [ 716.519801][T16776] should_fail+0xb/0x10 [ 716.523792][T16776] should_fail_usercopy+0x1a/0x20 [ 716.528653][T16776] _copy_from_user+0x1e/0xc0 [ 716.533077][T16776] copy_msghdr_from_user+0xaa/0x670 [ 716.538111][T16776] ? __kasan_check_write+0x14/0x20 [ 716.543058][T16776] ? proc_fail_nth_write+0x20b/0x290 [ 716.548183][T16776] ? sendmsg_copy_msghdr+0x70/0x70 [ 716.553130][T16776] __sys_recvmsg+0x24b/0x3d0 [ 716.557561][T16776] ? ____sys_recvmsg+0x530/0x530 [ 716.562327][T16776] ? __kasan_check_write+0x14/0x20 [ 716.567275][T16776] ? __ia32_sys_read+0x90/0x90 [ 716.571872][T16776] ? debug_smp_processor_id+0x17/0x20 [ 716.577083][T16776] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 716.583075][T16776] __x64_sys_recvmsg+0x7f/0x90 [ 716.587668][T16776] x64_sys_call+0x171/0x9a0 [ 716.592011][T16776] do_syscall_64+0x3b/0xb0 [ 716.596268][T16776] ? clear_bhb_loop+0x55/0xb0 [ 716.600774][T16776] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 716.606501][T16776] RIP: 0033:0x7f72e4d7e819 [ 716.610762][T16776] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 716.630198][T16776] RSP: 002b:00007f72e5b8a038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 716.638440][T16776] RAX: ffffffffffffffda RBX: 00007f72e4f35fa0 RCX: 00007f72e4d7e819 [ 716.646254][T16776] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000004 [ 716.654062][T16776] RBP: 00007f72e5b8a090 R08: 0000000000000000 R09: 0000000000000000 [ 716.661875][T16776] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 716.669686][T16776] R13: 0000000000000000 R14: 00007f72e4f35fa0 R15: 00007ffde72de978 [ 716.677501][T16776] [ 716.728448][T16778] device sit0 entered promiscuous mode [ 718.608400][T16834] device macsec0 left promiscuous mode [ 718.728960][T16856] device macsec0 entered promiscuous mode [ 718.933718][T16842] device veth1_macvtap entered promiscuous mode [ 719.027521][T16842] device macsec0 entered promiscuous mode [ 719.109262][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 719.799483][T16896] device sit0 left promiscuous mode [ 719.866435][T16896] device sit0 entered promiscuous mode [ 720.418277][T16917] device sit0 left promiscuous mode [ 720.473002][T16917] device sit0 entered promiscuous mode [ 720.733515][T16946] device wg2 entered promiscuous mode [ 721.109733][T16956] device syzkaller0 entered promiscuous mode [ 721.603723][T16965] device veth1_macvtap left promiscuous mode [ 721.749948][T16965] device macsec0 left promiscuous mode [ 721.782090][T16967] device veth1_macvtap left promiscuous mode [ 721.858456][T16967] device macsec0 left promiscuous mode [ 721.957822][T16971] device veth1_macvtap entered promiscuous mode [ 721.963967][T16971] device macsec0 entered promiscuous mode [ 721.972644][T16969] device veth1_macvtap entered promiscuous mode [ 721.979496][T16969] device macsec0 entered promiscuous mode [ 722.689023][T16979] device veth1_macvtap left promiscuous mode [ 722.695668][T16979] device macsec0 left promiscuous mode [ 722.864422][T16990] device veth1_macvtap entered promiscuous mode [ 722.996726][T16990] device macsec0 entered promiscuous mode [ 723.005091][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 723.818934][T17033] FAULT_INJECTION: forcing a failure. [ 723.818934][T17033] name failslab, interval 1, probability 0, space 0, times 0 [ 723.838695][T17028] device wg2 left promiscuous mode [ 723.879943][T17033] CPU: 0 PID: 17033 Comm: syz.5.4965 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 723.889668][T17033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 723.899565][T17033] Call Trace: [ 723.902688][T17033] [ 723.905461][T17033] dump_stack_lvl+0x151/0x1b7 [ 723.909977][T17033] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 723.915272][T17033] dump_stack+0x15/0x1e [ 723.919348][T17033] should_fail_ex+0x3d0/0x520 [ 723.923868][T17033] __should_failslab+0xaf/0xf0 [ 723.928550][T17033] ? kvmalloc_node+0x221/0x640 [ 723.933149][T17033] should_failslab+0x9/0x20 [ 723.937487][T17033] __kmem_cache_alloc_node+0x3d/0x2a0 [ 723.942697][T17033] ? kasan_save_alloc_info+0x1f/0x30 [ 723.947815][T17033] ? kvmalloc_node+0x221/0x640 [ 723.952425][T17033] __kmalloc_node+0xa3/0x1e0 [ 723.956842][T17033] ? is_bpf_text_address+0x172/0x190 [ 723.961962][T17033] kvmalloc_node+0x221/0x640 [ 723.966400][T17033] ? __kernel_text_address+0xd/0x40 [ 723.971423][T17033] ? vm_mmap+0xb0/0xb0 [ 723.975333][T17033] ? arch_stack_walk+0xf3/0x140 [ 723.980018][T17033] ? bpf_test_run_xdp_live+0xd0/0x1f70 [ 723.985312][T17033] bpf_test_run_xdp_live+0x286/0x1f70 [ 723.990518][T17033] ? stack_trace_snprint+0xf0/0xf0 [ 723.995468][T17033] ? __stack_depot_save+0x36/0x480 [ 724.000420][T17033] ? kasan_set_track+0x60/0x70 [ 724.005010][T17033] ? kasan_set_track+0x4b/0x70 [ 724.009610][T17033] ? kasan_save_alloc_info+0x1f/0x30 [ 724.014730][T17033] ? __kasan_kmalloc+0x9c/0xb0 [ 724.019329][T17033] ? __kmalloc+0xb4/0x1e0 [ 724.023499][T17033] ? bpf_prog_test_run_xdp+0x414/0x1130 [ 724.028878][T17033] ? xdp_convert_md_to_buff+0x360/0x360 [ 724.034266][T17033] ? x64_sys_call+0x87f/0x9a0 [ 724.038774][T17033] ? do_syscall_64+0x3b/0xb0 [ 724.043202][T17033] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 724.049112][T17033] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 724.055187][T17033] ? __kasan_check_write+0x14/0x20 [ 724.060133][T17033] ? _copy_from_user+0x90/0xc0 [ 724.064726][T17033] ? bpf_test_init+0x169/0x190 [ 724.069328][T17033] ? xdp_convert_md_to_buff+0x5d/0x360 [ 724.074618][T17033] bpf_prog_test_run_xdp+0x7d1/0x1130 [ 724.079837][T17033] ? dev_put+0x80/0x80 [ 724.083734][T17033] ? __kasan_check_write+0x14/0x20 [ 724.088678][T17033] ? fput+0x15b/0x1b0 [ 724.092497][T17033] ? dev_put+0x80/0x80 [ 724.096407][T17033] bpf_prog_test_run+0x3b0/0x630 [ 724.101177][T17033] ? bpf_prog_query+0x260/0x260 [ 724.105862][T17033] ? selinux_bpf+0xd2/0x100 [ 724.110201][T17033] ? security_bpf+0x82/0xb0 [ 724.114542][T17033] __sys_bpf+0x59f/0x7f0 [ 724.118620][T17033] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 724.123828][T17033] ? __ia32_sys_read+0x90/0x90 [ 724.128427][T17033] ? debug_smp_processor_id+0x17/0x20 [ 724.133632][T17033] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 724.139536][T17033] __x64_sys_bpf+0x7c/0x90 [ 724.143788][T17033] x64_sys_call+0x87f/0x9a0 [ 724.148126][T17033] do_syscall_64+0x3b/0xb0 [ 724.152378][T17033] ? clear_bhb_loop+0x55/0xb0 [ 724.156892][T17033] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 724.162622][T17033] RIP: 0033:0x7f738b77e819 [ 724.167055][T17033] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 724.186490][T17033] RSP: 002b:00007f738c567038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 724.194736][T17033] RAX: ffffffffffffffda RBX: 00007f738b935fa0 RCX: 00007f738b77e819 [ 724.202544][T17033] RDX: 0000000000000050 RSI: 0000000020000000 RDI: 000000000000000a [ 724.210356][T17033] RBP: 00007f738c567090 R08: 0000000000000000 R09: 0000000000000000 [ 724.218166][T17033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 724.225983][T17033] R13: 0000000000000000 R14: 00007f738b935fa0 R15: 00007fffa5a921f8 [ 724.233794][T17033] [ 724.241144][T17035] device wg2 entered promiscuous mode [ 724.990387][T17068] device pim6reg1 left promiscuous mode [ 726.594635][T17130] device veth1_macvtap left promiscuous mode [ 726.647393][T17130] device macsec0 left promiscuous mode [ 726.770338][T17124] device veth1_macvtap left promiscuous mode [ 726.782535][T17124] device macsec0 left promiscuous mode [ 726.870858][T17128] device veth1_macvtap entered promiscuous mode [ 726.877462][T17128] device macsec0 entered promiscuous mode [ 726.885861][T17132] device macsec0 left promiscuous mode [ 726.892702][T17134] device macsec0 entered promiscuous mode [ 726.909833][T17112] device veth1_macvtap entered promiscuous mode [ 726.916996][T17112] device macsec0 entered promiscuous mode [ 726.933749][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 726.960020][T17139] device sit0 left promiscuous mode [ 727.134856][T17139] device sit0 entered promiscuous mode [ 728.964647][T17177] device pim6reg1 entered promiscuous mode [ 733.085442][T17200] device veth1_macvtap left promiscuous mode [ 733.151558][T17200] device macsec0 left promiscuous mode [ 733.157838][T17204] device veth1_macvtap entered promiscuous mode [ 733.163996][T17204] device macsec0 entered promiscuous mode [ 733.528852][T17216] device syzkaller0 entered promiscuous mode [ 734.744713][T17249] device veth1_macvtap left promiscuous mode [ 734.752209][T17249] device macsec0 left promiscuous mode [ 734.853244][T17291] device veth1_macvtap entered promiscuous mode [ 734.869219][T17291] device macsec0 entered promiscuous mode [ 734.902394][T17294] device pim6reg1 entered promiscuous mode [ 734.961209][T17306] device sit0 left promiscuous mode [ 735.020177][T17306] device sit0 entered promiscuous mode [ 736.326515][T17309] device sit0 left promiscuous mode [ 736.426720][T17315] device sit0 entered promiscuous mode [ 737.132531][T17346] device veth1_macvtap left promiscuous mode [ 737.249357][T17346] device macsec0 left promiscuous mode [ 737.500688][T17364] device veth1_macvtap entered promiscuous mode [ 737.506860][T17364] device macsec0 entered promiscuous mode [ 747.842856][T17429] device sit0 left promiscuous mode [ 748.006333][T17430] device sit0 entered promiscuous mode [ 748.790075][T17411] device veth1_macvtap left promiscuous mode [ 748.800620][T17411] device macsec0 left promiscuous mode [ 748.868972][T17434] device veth1_macvtap entered promiscuous mode [ 748.885672][T17434] device macsec0 entered promiscuous mode [ 749.305783][T17446] device sit0 left promiscuous mode [ 749.652376][T17457] device sit0 left promiscuous mode [ 749.832800][T17460] device sit0 entered promiscuous mode [ 751.264202][T17492] device veth1_macvtap left promiscuous mode [ 751.276680][T17492] device macsec0 left promiscuous mode [ 751.355907][T17511] device veth1_macvtap entered promiscuous mode [ 751.407513][T17511] device macsec0 entered promiscuous mode [ 751.640256][T17519] FAULT_INJECTION: forcing a failure. [ 751.640256][T17519] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 751.674407][T17519] CPU: 0 PID: 17519 Comm: syz.4.5102 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 751.684228][T17519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 751.694121][T17519] Call Trace: [ 751.697244][T17519] [ 751.700029][T17519] dump_stack_lvl+0x151/0x1b7 [ 751.704544][T17519] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 751.709832][T17519] dump_stack+0x15/0x1e [ 751.713822][T17519] should_fail_ex+0x3d0/0x520 [ 751.718338][T17519] should_fail+0xb/0x10 [ 751.722326][T17519] should_fail_usercopy+0x1a/0x20 [ 751.727185][T17519] _copy_from_user+0x1e/0xc0 [ 751.731618][T17519] get_user_ifreq+0xd5/0x230 [ 751.736045][T17519] sock_do_ioctl+0x1a7/0x450 [ 751.740471][T17519] ? has_cap_mac_admin+0x3c0/0x3c0 [ 751.745422][T17519] ? sock_show_fdinfo+0xa0/0xa0 [ 751.750110][T17519] ? selinux_file_ioctl+0x3cc/0x540 [ 751.755144][T17519] sock_ioctl+0x455/0x740 [ 751.759308][T17519] ? sock_poll+0x400/0x400 [ 751.763554][T17519] ? __fget_files+0x2cb/0x330 [ 751.768158][T17519] ? security_file_ioctl+0x84/0xb0 [ 751.773101][T17519] ? sock_poll+0x400/0x400 [ 751.777355][T17519] __se_sys_ioctl+0x114/0x190 [ 751.781870][T17519] __x64_sys_ioctl+0x7b/0x90 [ 751.786293][T17519] x64_sys_call+0x98/0x9a0 [ 751.790544][T17519] do_syscall_64+0x3b/0xb0 [ 751.794798][T17519] ? clear_bhb_loop+0x55/0xb0 [ 751.799341][T17519] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 751.805036][T17519] RIP: 0033:0x7f5b5c17e819 [ 751.809292][T17519] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 751.828732][T17519] RSP: 002b:00007f5b5cfa5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 751.836978][T17519] RAX: ffffffffffffffda RBX: 00007f5b5c335fa0 RCX: 00007f5b5c17e819 [ 751.844785][T17519] RDX: 0000000020002280 RSI: 0000000000008943 RDI: 0000000000000006 [ 751.852597][T17519] RBP: 00007f5b5cfa5090 R08: 0000000000000000 R09: 0000000000000000 [ 751.860407][T17519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 751.868221][T17519] R13: 0000000000000000 R14: 00007f5b5c335fa0 R15: 00007fff3abd1038 [ 751.876035][T17519] [ 752.122319][ T28] audit: type=1400 audit(1732129517.737:171): avc: denied { create } for pid=17533 comm="syz.5.5106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 752.193731][T17544] FAULT_INJECTION: forcing a failure. [ 752.193731][T17544] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 752.295646][T17544] CPU: 0 PID: 17544 Comm: syz.0.5107 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 752.305393][T17544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 752.315273][T17544] Call Trace: [ 752.318394][T17544] [ 752.321175][T17544] dump_stack_lvl+0x151/0x1b7 [ 752.325691][T17544] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 752.330987][T17544] ? _parse_integer+0x2a/0x40 [ 752.335497][T17544] dump_stack+0x15/0x1e [ 752.339486][T17544] should_fail_ex+0x3d0/0x520 [ 752.344000][T17544] should_fail+0xb/0x10 [ 752.347992][T17544] should_fail_usercopy+0x1a/0x20 [ 752.352850][T17544] _copy_from_user+0x1e/0xc0 [ 752.357284][T17544] iovec_from_user+0xc7/0x320 [ 752.361877][T17544] ? kasan_set_track+0x4b/0x70 [ 752.366475][T17544] ? kasan_save_free_info+0x2b/0x40 [ 752.371515][T17544] __import_iovec+0x70/0x430 [ 752.375940][T17544] import_iovec+0xe5/0x120 [ 752.380204][T17544] copy_msghdr_from_user+0x527/0x670 [ 752.385321][T17544] ? sendmsg_copy_msghdr+0x70/0x70 [ 752.390262][T17544] __sys_sendmsg+0x236/0x390 [ 752.394692][T17544] ? ____sys_sendmsg+0x9a0/0x9a0 [ 752.399467][T17544] ? __kasan_check_write+0x14/0x20 [ 752.404413][T17544] ? mutex_unlock+0xb2/0x260 [ 752.408836][T17544] ? __kasan_check_write+0x14/0x20 [ 752.413786][T17544] ? __ia32_sys_read+0x90/0x90 [ 752.418380][T17544] ? debug_smp_processor_id+0x17/0x20 [ 752.423592][T17544] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 752.429494][T17544] __x64_sys_sendmsg+0x7f/0x90 [ 752.434091][T17544] x64_sys_call+0x16a/0x9a0 [ 752.438426][T17544] do_syscall_64+0x3b/0xb0 [ 752.442687][T17544] ? clear_bhb_loop+0x55/0xb0 [ 752.447195][T17544] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 752.452922][T17544] RIP: 0033:0x7f55a6f7e819 [ 752.457173][T17544] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 752.476615][T17544] RSP: 002b:00007f55a7e1d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 752.484862][T17544] RAX: ffffffffffffffda RBX: 00007f55a7136080 RCX: 00007f55a6f7e819 [ 752.492674][T17544] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000007 [ 752.500482][T17544] RBP: 00007f55a7e1d090 R08: 0000000000000000 R09: 0000000000000000 [ 752.508295][T17544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 752.516107][T17544] R13: 0000000000000000 R14: 00007f55a7136080 R15: 00007ffc91f06158 [ 752.523924][T17544] [ 753.160765][T17558] device sit0 entered promiscuous mode [ 755.543771][T17614] device sit0 left promiscuous mode [ 755.557414][T17613] device sit0 left promiscuous mode [ 755.573730][T17606] tun0: tun_chr_ioctl cmd 1074025692 [ 755.580097][T17618] device sit0 entered promiscuous mode [ 755.609865][T17619] device sit0 entered promiscuous mode [ 757.002759][ T28] audit: type=1400 audit(1732129522.607:172): avc: denied { setattr } for pid=17677 comm="syz.5.5158" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 757.065107][T17680] bridge0: port 1(bridge_slave_0) entered disabled state [ 757.208888][T17686] device wg2 entered promiscuous mode [ 757.372993][T17708] syz.0.5168[17708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 757.373059][T17708] syz.0.5168[17708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 757.391113][T17708] device pim6reg1 entered promiscuous mode [ 758.337369][T17738] FAULT_INJECTION: forcing a failure. [ 758.337369][T17738] name failslab, interval 1, probability 0, space 0, times 0 [ 758.430565][T17738] CPU: 0 PID: 17738 Comm: syz.5.5178 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 758.440291][T17738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 758.450187][T17738] Call Trace: [ 758.453305][T17738] [ 758.456084][T17738] dump_stack_lvl+0x151/0x1b7 [ 758.460600][T17738] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 758.465979][T17738] ? rwsem_write_trylock+0x153/0x340 [ 758.471096][T17738] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 758.477349][T17738] dump_stack+0x15/0x1e [ 758.481338][T17738] should_fail_ex+0x3d0/0x520 [ 758.485855][T17738] ? anon_vma_fork+0xee/0x4d0 [ 758.490368][T17738] __should_failslab+0xaf/0xf0 [ 758.494968][T17738] should_failslab+0x9/0x20 [ 758.499305][T17738] kmem_cache_alloc+0x3b/0x320 [ 758.503908][T17738] anon_vma_fork+0xee/0x4d0 [ 758.508245][T17738] ? vm_area_dup+0x1e0/0x290 [ 758.512673][T17738] copy_mm+0xdcb/0x1bc0 [ 758.516667][T17738] ? copy_signal+0x650/0x650 [ 758.521098][T17738] ? _raw_spin_lock+0xa4/0x1b0 [ 758.525693][T17738] ? __init_rwsem+0x130/0x240 [ 758.530201][T17738] ? copy_signal+0x503/0x650 [ 758.534632][T17738] copy_process+0x12b6/0x3530 [ 758.539144][T17738] ? __kasan_check_write+0x14/0x20 [ 758.544087][T17738] ? proc_fail_nth_write+0x20b/0x290 [ 758.549222][T17738] ? idle_dummy+0x10/0x10 [ 758.553374][T17738] ? vfs_write+0x952/0xed0 [ 758.557626][T17738] ? __kasan_slab_free+0x11/0x20 [ 758.562404][T17738] kernel_clone+0x229/0x890 [ 758.566740][T17738] ? __kasan_check_write+0x14/0x20 [ 758.571689][T17738] ? mutex_unlock+0xb2/0x260 [ 758.576125][T17738] ? create_io_thread+0x180/0x180 [ 758.581005][T17738] __x64_sys_clone+0x231/0x280 [ 758.585580][T17738] ? __do_sys_vfork+0x110/0x110 [ 758.590264][T17738] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 758.596171][T17738] ? exit_to_user_mode_prepare+0x39/0xa0 [ 758.601635][T17738] x64_sys_call+0x1b0/0x9a0 [ 758.605972][T17738] do_syscall_64+0x3b/0xb0 [ 758.610222][T17738] ? clear_bhb_loop+0x55/0xb0 [ 758.614735][T17738] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 758.620467][T17738] RIP: 0033:0x7f738b77e819 [ 758.624721][T17738] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 758.644166][T17738] RSP: 002b:00007f738c566fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 758.652402][T17738] RAX: ffffffffffffffda RBX: 00007f738b935fa0 RCX: 00007f738b77e819 [ 758.660216][T17738] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 758.668025][T17738] RBP: 00007f738c567090 R08: 0000000000000000 R09: 0000000000000000 [ 758.675836][T17738] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 758.683649][T17738] R13: 0000000000000000 R14: 00007f738b935fa0 R15: 00007fffa5a921f8 [ 758.691469][T17738] [ 758.956990][T17764] FAULT_INJECTION: forcing a failure. [ 758.956990][T17764] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 758.970018][T17764] CPU: 1 PID: 17764 Comm: syz.2.5187 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 758.979720][T17764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 758.989615][T17764] Call Trace: [ 758.992744][T17764] [ 758.995520][T17764] dump_stack_lvl+0x151/0x1b7 [ 759.000034][T17764] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 759.005325][T17764] ? kvmalloc_node+0x26c/0x640 [ 759.009926][T17764] dump_stack+0x15/0x1e [ 759.013918][T17764] should_fail_ex+0x3d0/0x520 [ 759.018432][T17764] should_fail+0xb/0x10 [ 759.022424][T17764] should_fail_usercopy+0x1a/0x20 [ 759.027285][T17764] _copy_from_user+0x1e/0xc0 [ 759.031711][T17764] btf_new_fd+0x31a/0x7c0 [ 759.035875][T17764] bpf_btf_load+0x6f/0x90 [ 759.040042][T17764] __sys_bpf+0x586/0x7f0 [ 759.044125][T17764] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 759.049346][T17764] ? __ia32_sys_read+0x90/0x90 [ 759.053933][T17764] ? debug_smp_processor_id+0x17/0x20 [ 759.059136][T17764] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 759.065039][T17764] __x64_sys_bpf+0x7c/0x90 [ 759.069300][T17764] x64_sys_call+0x87f/0x9a0 [ 759.073628][T17764] do_syscall_64+0x3b/0xb0 [ 759.077884][T17764] ? clear_bhb_loop+0x55/0xb0 [ 759.082397][T17764] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 759.088125][T17764] RIP: 0033:0x7f72e4d7e819 [ 759.092376][T17764] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 759.111823][T17764] RSP: 002b:00007f72e5b8a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 759.120062][T17764] RAX: ffffffffffffffda RBX: 00007f72e4f35fa0 RCX: 00007f72e4d7e819 [ 759.127874][T17764] RDX: 0000000000000028 RSI: 0000000020000000 RDI: 0000000000000012 [ 759.135691][T17764] RBP: 00007f72e5b8a090 R08: 0000000000000000 R09: 0000000000000000 [ 759.143496][T17764] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 759.151304][T17764] R13: 0000000000000001 R14: 00007f72e4f35fa0 R15: 00007ffde72de978 [ 759.159128][T17764] [ 759.258990][T17774] device sit0 left promiscuous mode [ 759.377403][T17774] device sit0 entered promiscuous mode [ 759.887436][T17788] device sit0 left promiscuous mode [ 760.064155][T17784] device veth0_vlan left promiscuous mode [ 760.085843][T17784] device veth0_vlan entered promiscuous mode [ 760.138167][T17790] device sit0 entered promiscuous mode [ 763.238560][T17869] device sit0 left promiscuous mode [ 763.421863][T17872] device veth1_macvtap left promiscuous mode [ 763.519277][T17872] device macsec0 left promiscuous mode [ 763.851690][T17871] device sit0 entered promiscuous mode [ 768.261757][T17943] device veth1_macvtap left promiscuous mode [ 768.339730][T17943] device macsec0 left promiscuous mode [ 768.407763][T17950] device sit0 left promiscuous mode [ 768.559104][T17948] device veth1_macvtap entered promiscuous mode [ 768.566099][T17948] device macsec0 entered promiscuous mode [ 768.581640][T17946] device sit0 entered promiscuous mode [ 768.591166][T17959] FAULT_INJECTION: forcing a failure. [ 768.591166][T17959] name failslab, interval 1, probability 0, space 0, times 0 [ 768.608762][T17959] CPU: 0 PID: 17959 Comm: syz.2.5236 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 768.618483][T17959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 768.628383][T17959] Call Trace: [ 768.631505][T17959] [ 768.634282][T17959] dump_stack_lvl+0x151/0x1b7 [ 768.638797][T17959] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 768.644088][T17959] ? kasan_set_track+0x60/0x70 [ 768.648692][T17959] ? kmalloc_trace+0x44/0xa0 [ 768.653115][T17959] ? dup_fd+0x5f5/0x960 [ 768.657105][T17959] ? copy_files+0xe6/0x200 [ 768.661359][T17959] ? copy_process+0x11e9/0x3530 [ 768.666046][T17959] ? __x64_sys_clone+0x231/0x280 [ 768.670823][T17959] dump_stack+0x15/0x1e [ 768.674813][T17959] should_fail_ex+0x3d0/0x520 [ 768.679325][T17959] __should_failslab+0xaf/0xf0 [ 768.683924][T17959] ? kvmalloc_node+0x221/0x640 [ 768.688523][T17959] should_failslab+0x9/0x20 [ 768.692864][T17959] __kmem_cache_alloc_node+0x3d/0x2a0 [ 768.698073][T17959] ? kvmalloc_node+0x221/0x640 [ 768.702671][T17959] __kmalloc_node+0xa3/0x1e0 [ 768.707097][T17959] kvmalloc_node+0x221/0x640 [ 768.711526][T17959] ? vm_mmap+0xb0/0xb0 [ 768.715428][T17959] ? kasan_save_alloc_info+0x1f/0x30 [ 768.720551][T17959] ? __kasan_kmalloc+0x9c/0xb0 [ 768.725150][T17959] ? kmalloc_trace+0x44/0xa0 [ 768.729578][T17959] alloc_fdtable+0xeb/0x2a0 [ 768.733916][T17959] dup_fd+0x5f5/0x960 [ 768.737735][T17959] ? memset+0x35/0x40 [ 768.741566][T17959] copy_files+0xe6/0x200 [ 768.745634][T17959] ? dup_task_struct+0x7d0/0x7d0 [ 768.750409][T17959] ? security_task_alloc+0xf9/0x130 [ 768.755441][T17959] copy_process+0x11e9/0x3530 [ 768.759955][T17959] ? __kasan_check_write+0x14/0x20 [ 768.764900][T17959] ? proc_fail_nth_write+0x20b/0x290 [ 768.770025][T17959] ? idle_dummy+0x10/0x10 [ 768.774187][T17959] ? vfs_write+0x952/0xed0 [ 768.778439][T17959] ? __kasan_slab_free+0x11/0x20 [ 768.783220][T17959] kernel_clone+0x229/0x890 [ 768.787553][T17959] ? __kasan_check_write+0x14/0x20 [ 768.792499][T17959] ? mutex_unlock+0xb2/0x260 [ 768.796929][T17959] ? create_io_thread+0x180/0x180 [ 768.801791][T17959] __x64_sys_clone+0x231/0x280 [ 768.806390][T17959] ? __do_sys_vfork+0x110/0x110 [ 768.811082][T17959] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 768.816977][T17959] ? exit_to_user_mode_prepare+0x39/0xa0 [ 768.822443][T17959] x64_sys_call+0x1b0/0x9a0 [ 768.826781][T17959] do_syscall_64+0x3b/0xb0 [ 768.831036][T17959] ? clear_bhb_loop+0x55/0xb0 [ 768.835550][T17959] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 768.841283][T17959] RIP: 0033:0x7f72e4d7e819 [ 768.845529][T17959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 768.864970][T17959] RSP: 002b:00007f72e5b89fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 768.873216][T17959] RAX: ffffffffffffffda RBX: 00007f72e4f35fa0 RCX: 00007f72e4d7e819 [ 768.881027][T17959] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000024001000 [ 768.888839][T17959] RBP: 00007f72e5b8a090 R08: 0000000000000000 R09: 0000000000000000 [ 768.896650][T17959] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 768.904462][T17959] R13: 0000000000000000 R14: 00007f72e4f35fa0 R15: 00007ffde72de978 [ 768.912279][T17959] [ 769.148477][T17966] device sit0 left promiscuous mode [ 769.265089][T17966] device sit0 entered promiscuous mode [ 769.561417][T17976] device syzkaller0 entered promiscuous mode [ 769.913780][T17974] device veth1_macvtap left promiscuous mode [ 770.022330][T17974] device macsec0 left promiscuous mode [ 770.303960][T17988] device veth1_macvtap entered promiscuous mode [ 770.310173][T17988] device macsec0 entered promiscuous mode [ 771.364208][T18030] device sit0 left promiscuous mode [ 771.424391][T18034] device sit0 left promiscuous mode [ 771.498631][T18035] device sit0 entered promiscuous mode [ 772.360648][T18054] device pim6reg1 entered promiscuous mode [ 772.796423][T18081] device wg2 left promiscuous mode [ 772.963016][T18075] device bridge_slave_1 left promiscuous mode [ 772.997554][T18075] bridge0: port 2(bridge_slave_1) entered disabled state [ 773.037933][T18075] device bridge_slave_0 left promiscuous mode [ 773.059611][T18075] bridge0: port 1(bridge_slave_0) entered disabled state [ 773.266338][T18079] device pim6reg1 entered promiscuous mode [ 773.281198][T18091] device pim6reg1 entered promiscuous mode [ 773.361175][T18082] device veth1_macvtap entered promiscuous mode [ 773.371180][T18082] device macsec0 entered promiscuous mode [ 773.425600][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 775.384566][T18110] device macsec0 left promiscuous mode [ 775.570981][T18127] device macsec0 entered promiscuous mode [ 775.677789][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 775.947618][T18144] device syzkaller0 entered promiscuous mode [ 778.397483][T18195] device sit0 entered promiscuous mode [ 779.155974][T18193] device veth0_vlan left promiscuous mode [ 779.167298][T18193] device veth0_vlan entered promiscuous mode [ 779.304833][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 779.312784][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 779.320783][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 779.376626][T18229] device sit0 left promiscuous mode [ 779.423945][T18229] device sit0 entered promiscuous mode [ 780.449966][T18277] device sit0 left promiscuous mode [ 780.916450][T18284] device sit0 left promiscuous mode [ 781.003144][T18292] FAULT_INJECTION: forcing a failure. [ 781.003144][T18292] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 781.046640][T18283] device sit0 entered promiscuous mode [ 781.224801][T18292] CPU: 0 PID: 18292 Comm: syz.5.5336 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 781.234534][T18292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 781.244431][T18292] Call Trace: [ 781.247552][T18292] [ 781.250328][T18292] dump_stack_lvl+0x151/0x1b7 [ 781.254841][T18292] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 781.260137][T18292] ? avc_denied+0x1b0/0x1b0 [ 781.264477][T18292] dump_stack+0x15/0x1e [ 781.268467][T18292] should_fail_ex+0x3d0/0x520 [ 781.272980][T18292] should_fail+0xb/0x10 [ 781.276972][T18292] should_fail_usercopy+0x1a/0x20 [ 781.281832][T18292] _copy_from_user+0x1e/0xc0 [ 781.286259][T18292] sk_setsockopt+0x2cf/0x3160 [ 781.290774][T18292] ? sockopt_capable+0x60/0x60 [ 781.295373][T18292] ? selinux_socket_setsockopt+0x260/0x360 [ 781.301020][T18292] ? __fget_files+0x2cb/0x330 [ 781.305529][T18292] sock_setsockopt+0x59/0x70 [ 781.309956][T18292] __sys_setsockopt+0x423/0x8b0 [ 781.314638][T18292] ? fput+0x15b/0x1b0 [ 781.318461][T18292] ? __ia32_sys_recv+0xb0/0xb0 [ 781.323064][T18292] ? debug_smp_processor_id+0x17/0x20 [ 781.328269][T18292] __x64_sys_setsockopt+0xbf/0xd0 [ 781.333128][T18292] x64_sys_call+0x1a2/0x9a0 [ 781.337467][T18292] do_syscall_64+0x3b/0xb0 [ 781.341718][T18292] ? clear_bhb_loop+0x55/0xb0 [ 781.346232][T18292] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 781.351962][T18292] RIP: 0033:0x7f738b77e819 [ 781.356213][T18292] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 781.375657][T18292] RSP: 002b:00007f738c567038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 781.383902][T18292] RAX: ffffffffffffffda RBX: 00007f738b935fa0 RCX: 00007f738b77e819 [ 781.391713][T18292] RDX: 0000000000000041 RSI: 0000000000000001 RDI: 0000000000000009 [ 781.399524][T18292] RBP: 00007f738c567090 R08: 0000000000000004 R09: 0000000000000000 [ 781.407335][T18292] R10: 0000000020000080 R11: 0000000000000246 R12: 0000000000000001 [ 781.415145][T18292] R13: 0000000000000000 R14: 00007f738b935fa0 R15: 00007fffa5a921f8 [ 781.422961][T18292] [ 781.528209][T18285] device sit0 entered promiscuous mode [ 781.772053][T18312] device sit0 left promiscuous mode [ 781.791565][T18316] device sit0 entered promiscuous mode [ 782.747804][T18319] device sit0 left promiscuous mode [ 782.765237][T18320] device sit0 entered promiscuous mode [ 785.053316][T18328] device veth1_macvtap left promiscuous mode [ 785.060458][T18328] device macsec0 left promiscuous mode [ 785.111646][T18334] device veth1_macvtap entered promiscuous mode [ 785.120189][T18334] device macsec0 entered promiscuous mode [ 788.221042][T18375] device sit0 left promiscuous mode [ 788.281483][T18375] device sit0 entered promiscuous mode [ 788.843303][T18395] device sit0 left promiscuous mode [ 789.043106][T18395] device sit0 entered promiscuous mode [ 789.772867][T18421] device sit0 left promiscuous mode [ 789.819509][T18421] device sit0 entered promiscuous mode [ 793.928637][T18456] device syzkaller0 entered promiscuous mode [ 794.233309][T18483] device sit0 left promiscuous mode [ 794.400175][T18480] device sit0 entered promiscuous mode [ 795.179739][T18487] device veth1_macvtap left promiscuous mode [ 795.185697][T18487] device macsec0 left promiscuous mode [ 795.228042][T18490] device veth1_macvtap entered promiscuous mode [ 795.280328][T18490] device macsec0 entered promiscuous mode [ 795.330427][T18501] device sit0 left promiscuous mode [ 795.455336][T18504] device sit0 entered promiscuous mode [ 795.472786][T18520] FAULT_INJECTION: forcing a failure. [ 795.472786][T18520] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 795.589862][T18520] CPU: 0 PID: 18520 Comm: syz.0.5406 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 795.599688][T18520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 795.609575][T18520] Call Trace: [ 795.612704][T18520] [ 795.615478][T18520] dump_stack_lvl+0x151/0x1b7 [ 795.619994][T18520] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 795.625287][T18520] ? kvmalloc_node+0x26c/0x640 [ 795.629888][T18520] dump_stack+0x15/0x1e [ 795.633875][T18520] should_fail_ex+0x3d0/0x520 [ 795.638391][T18520] should_fail+0xb/0x10 [ 795.642383][T18520] should_fail_usercopy+0x1a/0x20 [ 795.647242][T18520] _copy_from_user+0x1e/0xc0 [ 795.651676][T18520] btf_new_fd+0x31a/0x7c0 [ 795.655838][T18520] bpf_btf_load+0x6f/0x90 [ 795.660007][T18520] __sys_bpf+0x586/0x7f0 [ 795.664084][T18520] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 795.669291][T18520] ? __ia32_sys_read+0x90/0x90 [ 795.673888][T18520] ? debug_smp_processor_id+0x17/0x20 [ 795.679094][T18520] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 795.685001][T18520] __x64_sys_bpf+0x7c/0x90 [ 795.689251][T18520] x64_sys_call+0x87f/0x9a0 [ 795.693588][T18520] do_syscall_64+0x3b/0xb0 [ 795.697842][T18520] ? clear_bhb_loop+0x55/0xb0 [ 795.702354][T18520] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 795.708088][T18520] RIP: 0033:0x7f55a6f7e819 [ 795.712332][T18520] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 795.731775][T18520] RSP: 002b:00007f55a7e3e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 795.740019][T18520] RAX: ffffffffffffffda RBX: 00007f55a7135fa0 RCX: 00007f55a6f7e819 [ 795.747832][T18520] RDX: 0000000000000028 RSI: 0000000020000000 RDI: 0000000000000012 [ 795.755644][T18520] RBP: 00007f55a7e3e090 R08: 0000000000000000 R09: 0000000000000000 [ 795.763452][T18520] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 795.771267][T18520] R13: 0000000000000000 R14: 00007f55a7135fa0 R15: 00007ffc91f06158 [ 795.779079][T18520] [ 796.011669][T18531] tap0: tun_chr_ioctl cmd 1074025692 [ 796.344021][T18550] device pim6reg1 entered promiscuous mode [ 799.251127][T18554] device veth1_macvtap left promiscuous mode [ 799.285254][T18554] device macsec0 left promiscuous mode [ 799.292439][T18556] device veth1_macvtap entered promiscuous mode [ 799.313312][T18556] device macsec0 entered promiscuous mode [ 799.681564][T18579] bond_slave_1: mtu less than device minimum [ 800.539749][T18600] device pim6reg1 entered promiscuous mode [ 800.915974][T18604] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 801.360226][T18604] device syzkaller0 entered promiscuous mode [ 801.516589][T18611] device veth1_macvtap left promiscuous mode [ 801.528653][T18611] device macsec0 left promiscuous mode [ 801.606944][T18620] device veth1_macvtap entered promiscuous mode [ 801.629544][T18620] device macsec0 entered promiscuous mode [ 801.645094][T18621] device sit0 left promiscuous mode [ 801.788092][T18626] device sit0 left promiscuous mode [ 801.814719][T18627] device sit0 entered promiscuous mode [ 802.562939][T18628] device sit0 entered promiscuous mode [ 803.803537][T18688] tun0: tun_chr_ioctl cmd 2148553947 [ 803.865471][T18688] device veth0_vlan left promiscuous mode [ 803.975054][T18688] device veth0_vlan entered promiscuous mode [ 804.058475][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 804.072919][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 804.138714][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 804.351941][T18701] device syzkaller0 entered promiscuous mode [ 804.463881][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 804.491471][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 804.498382][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 804.555185][T18707] device veth1_macvtap left promiscuous mode [ 804.563497][T18707] device macsec0 left promiscuous mode [ 804.634663][T18711] device veth1_macvtap entered promiscuous mode [ 804.643104][T18711] device macsec0 entered promiscuous mode [ 804.673596][T18715] device sit0 left promiscuous mode [ 804.698711][T18717] device sit0 left promiscuous mode [ 804.746129][T18715] device sit0 entered promiscuous mode [ 804.775689][T18724] device pim6reg1 left promiscuous mode [ 804.795241][T18717] device sit0 entered promiscuous mode [ 804.795444][T18726] FAULT_INJECTION: forcing a failure. [ 804.795444][T18726] name failslab, interval 1, probability 0, space 0, times 0 [ 804.814389][T18726] CPU: 0 PID: 18726 Comm: syz.3.5469 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 804.824109][T18726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 804.834002][T18726] Call Trace: [ 804.837125][T18726] [ 804.839901][T18726] dump_stack_lvl+0x151/0x1b7 [ 804.844412][T18726] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 804.850056][T18726] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 804.855348][T18726] ? __wake_up_klogd+0xd5/0x110 [ 804.860042][T18726] dump_stack+0x15/0x1e [ 804.864026][T18726] should_fail_ex+0x3d0/0x520 [ 804.868542][T18726] __should_failslab+0xaf/0xf0 [ 804.873142][T18726] should_failslab+0x9/0x20 [ 804.877478][T18726] slab_pre_alloc_hook+0x2e/0x1b0 [ 804.882342][T18726] kmem_cache_alloc_lru+0x49/0x270 [ 804.887288][T18726] ? new_inode_pseudo+0x85/0x1d0 [ 804.892063][T18726] new_inode_pseudo+0x85/0x1d0 [ 804.896663][T18726] __ns_get_path+0x16a/0x480 [ 804.901088][T18726] ? _raw_spin_unlock+0x4c/0x70 [ 804.905775][T18726] ns_get_path+0x57/0x90 [ 804.909853][T18726] proc_ns_get_link+0xf5/0x1f0 [ 804.914453][T18726] ? proc_ns_instantiate+0x100/0x100 [ 804.919574][T18726] ? security_inode_follow_link+0xbc/0x100 [ 804.925215][T18726] ? proc_ns_instantiate+0x100/0x100 [ 804.930336][T18726] pick_link+0x708/0xe90 [ 804.934418][T18726] step_into+0xca2/0x1090 [ 804.938584][T18726] ? _raw_spin_unlock+0x4c/0x70 [ 804.943268][T18726] ? set_root+0x400/0x400 [ 804.947446][T18726] ? __kasan_check_write+0x14/0x20 [ 804.952379][T18726] ? pid_revalidate+0x145/0x1b0 [ 804.957069][T18726] path_openat+0x1752/0x2d60 [ 804.961494][T18726] ? kasan_save_alloc_info+0x1f/0x30 [ 804.966700][T18726] ? slab_post_alloc_hook+0x53/0x2c0 [ 804.971827][T18726] ? getname+0x19/0x20 [ 804.975728][T18726] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 804.981631][T18726] ? do_filp_open+0x480/0x480 [ 804.986146][T18726] do_filp_open+0x230/0x480 [ 804.990481][T18726] ? vfs_tmpfile+0x480/0x480 [ 804.994913][T18726] ? alloc_fd+0x4fe/0x5a0 [ 804.999077][T18726] do_sys_openat2+0x151/0x870 [ 805.003587][T18726] ? __fput+0x619/0x870 [ 805.007581][T18726] ? do_sys_open+0x220/0x220 [ 805.012007][T18726] ? blkcg_maybe_throttle_current+0x17d/0xa00 [ 805.017911][T18726] ? __this_cpu_preempt_check+0x13/0x20 [ 805.023291][T18726] __x64_sys_openat+0x243/0x290 [ 805.027978][T18726] ? __ia32_sys_open+0x270/0x270 [ 805.032752][T18726] ? switch_fpu_return+0xe/0x10 [ 805.037440][T18726] ? exit_to_user_mode_prepare+0x7e/0xa0 [ 805.042911][T18726] x64_sys_call+0x6bf/0x9a0 [ 805.047249][T18726] do_syscall_64+0x3b/0xb0 [ 805.051495][T18726] ? clear_bhb_loop+0x55/0xb0 [ 805.056008][T18726] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 805.061739][T18726] RIP: 0033:0x7fc7a657d1b0 [ 805.065991][T18726] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 19 8f 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 6c 8f 02 00 8b 44 [ 805.085431][T18726] RSP: 002b:00007fc7a72eff10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 805.093677][T18726] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fc7a657d1b0 [ 805.101497][T18726] RDX: 0000000000000000 RSI: 00007fc7a72effa0 RDI: 00000000ffffff9c [ 805.109299][T18726] RBP: 00007fc7a72effa0 R08: 0000000000000000 R09: 0000000000000000 [ 805.117108][T18726] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 805.124929][T18726] R13: 0000000000000000 R14: 00007fc7a6735fa0 R15: 00007ffeff3424f8 [ 805.132740][T18726] [ 806.135173][T18772] device veth1_macvtap left promiscuous mode [ 806.149193][T18772] device macsec0 left promiscuous mode [ 806.205723][T18751] device veth1_macvtap entered promiscuous mode [ 806.215790][T18751] device macsec0 entered promiscuous mode [ 806.360101][T18777] device veth1_macvtap left promiscuous mode [ 806.366240][T18777] device macsec0 left promiscuous mode [ 807.216702][T18813] device veth1_macvtap left promiscuous mode [ 807.228052][T18813] device macsec0 left promiscuous mode [ 807.356393][T18813] device veth1_macvtap entered promiscuous mode [ 807.369698][T18813] device macsec0 entered promiscuous mode [ 807.413904][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 807.528773][T18844] syz.2.5506[18844] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 807.528845][T18844] syz.2.5506[18844] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 807.629440][T18845] device syzkaller0 entered promiscuous mode [ 808.599356][T18876] device veth1_macvtap left promiscuous mode [ 808.605846][T18876] device macsec0 left promiscuous mode [ 808.712925][T18881] device veth1_macvtap entered promiscuous mode [ 808.719125][T18881] device macsec0 entered promiscuous mode [ 808.902156][T18896] device syzkaller0 entered promiscuous mode [ 811.874523][T18929] device sit0 left promiscuous mode [ 811.946585][T18923] device veth0_vlan left promiscuous mode [ 811.976482][T18923] device veth0_vlan entered promiscuous mode [ 812.042943][T18929] device sit0 entered promiscuous mode [ 812.113229][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 812.127656][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 812.143078][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 812.163200][T18933] device veth1_macvtap left promiscuous mode [ 812.172534][T18933] device macsec0 left promiscuous mode [ 812.251701][T18937] device veth1_macvtap entered promiscuous mode [ 812.258313][T18937] device macsec0 entered promiscuous mode [ 812.382835][T18966] device sit0 left promiscuous mode [ 812.464069][T18966] device sit0 entered promiscuous mode [ 813.590950][T18983] device veth1_macvtap left promiscuous mode [ 813.910859][T18996] device veth1_macvtap entered promiscuous mode [ 813.937186][T18996] device macsec0 entered promiscuous mode [ 814.016815][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 814.257857][T19011] device sit0 left promiscuous mode [ 814.316911][T19016] device sit0 entered promiscuous mode [ 815.408529][T19034] device veth1_macvtap left promiscuous mode [ 815.513258][T19034] device macsec0 left promiscuous mode [ 816.310852][T19061] device sit0 left promiscuous mode [ 816.395299][T19067] device sit0 entered promiscuous mode [ 816.934499][T19059] device veth1_macvtap entered promiscuous mode [ 816.980341][T19059] device macsec0 entered promiscuous mode [ 817.108944][T19081] device pim6reg1 entered promiscuous mode [ 817.158320][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 817.511719][T19114] device sit0 left promiscuous mode [ 817.626505][T19111] device macsec0 left promiscuous mode [ 818.136669][T19118] device macsec0 entered promiscuous mode [ 818.301599][T19117] device sit0 entered promiscuous mode [ 821.890701][T19133] device sit0 left promiscuous mode [ 821.956305][T19131] device syzkaller0 entered promiscuous mode [ 822.096117][T19133] device sit0 entered promiscuous mode [ 823.208849][T19137] device veth1_macvtap left promiscuous mode [ 823.227904][T19137] device macsec0 left promiscuous mode [ 823.291477][T19149] device veth1_macvtap entered promiscuous mode [ 823.348690][T19149] device macsec0 entered promiscuous mode [ 823.919612][T19180] device pim6reg1 entered promiscuous mode [ 826.046798][T19214] device sit0 left promiscuous mode [ 826.065506][T19210] device sit0 left promiscuous mode [ 826.110541][T19214] device sit0 entered promiscuous mode [ 827.025689][T19221] device sit0 entered promiscuous mode [ 827.125308][T19234] device sit0 left promiscuous mode [ 827.151652][T19236] device sit0 left promiscuous mode [ 827.194623][T19234] device sit0 entered promiscuous mode [ 827.223297][T19236] device sit0 entered promiscuous mode [ 828.445404][T19266] bridge0: port 2(bridge_slave_1) entered disabled state [ 828.453003][T19266] bridge0: port 1(bridge_slave_0) entered disabled state [ 828.511654][T19272] device macsec0 left promiscuous mode [ 828.566138][T19266] bridge0: port 2(bridge_slave_1) entered blocking state [ 828.573308][T19266] bridge0: port 2(bridge_slave_1) entered forwarding state [ 828.582194][T19266] bridge0: port 1(bridge_slave_0) entered blocking state [ 828.589267][T19266] bridge0: port 1(bridge_slave_0) entered forwarding state [ 828.603641][T19266] device bridge0 entered promiscuous mode [ 828.631048][T19272] device macsec0 entered promiscuous mode [ 828.705453][T19287] FAULT_INJECTION: forcing a failure. [ 828.705453][T19287] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 828.726812][T19287] CPU: 0 PID: 19287 Comm: syz.5.5646 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 828.736540][T19287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 828.746431][T19287] Call Trace: [ 828.749555][T19287] [ 828.752332][T19287] dump_stack_lvl+0x151/0x1b7 [ 828.756844][T19287] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 828.762138][T19287] ? kstrtoull+0x1cd/0x2e0 [ 828.766402][T19287] ? _parse_integer+0x40/0x40 [ 828.770908][T19287] dump_stack+0x15/0x1e [ 828.774899][T19287] should_fail_ex+0x3d0/0x520 [ 828.779413][T19287] should_fail+0xb/0x10 [ 828.783406][T19287] should_fail_usercopy+0x1a/0x20 [ 828.788272][T19287] _copy_from_user+0x1e/0xc0 [ 828.792689][T19287] iovec_from_user+0xc7/0x320 [ 828.797206][T19287] __import_iovec+0x70/0x430 [ 828.801638][T19287] ? kstrtouint_from_user+0x124/0x180 [ 828.806854][T19287] import_iovec+0xe5/0x120 [ 828.811096][T19287] copy_msghdr_from_user+0x527/0x670 [ 828.816212][T19287] ? __kasan_check_write+0x14/0x20 [ 828.821160][T19287] ? sendmsg_copy_msghdr+0x70/0x70 [ 828.826110][T19287] __sys_recvmsg+0x24b/0x3d0 [ 828.830540][T19287] ? ____sys_recvmsg+0x530/0x530 [ 828.835312][T19287] ? __kasan_check_write+0x14/0x20 [ 828.840254][T19287] ? __ia32_sys_read+0x90/0x90 [ 828.844851][T19287] ? debug_smp_processor_id+0x17/0x20 [ 828.850057][T19287] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 828.855964][T19287] __x64_sys_recvmsg+0x7f/0x90 [ 828.860563][T19287] x64_sys_call+0x171/0x9a0 [ 828.864900][T19287] do_syscall_64+0x3b/0xb0 [ 828.869155][T19287] ? clear_bhb_loop+0x55/0xb0 [ 828.873667][T19287] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 828.879393][T19287] RIP: 0033:0x7f738b77e819 [ 828.883646][T19287] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 828.903087][T19287] RSP: 002b:00007f738c567038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 828.911340][T19287] RAX: ffffffffffffffda RBX: 00007f738b935fa0 RCX: 00007f738b77e819 [ 828.919143][T19287] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000006 [ 828.926955][T19287] RBP: 00007f738c567090 R08: 0000000000000000 R09: 0000000000000000 [ 828.934765][T19287] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 828.942585][T19287] R13: 0000000000000000 R14: 00007f738b935fa0 R15: 00007fffa5a921f8 [ 828.950394][T19287] [ 829.356096][T19304] device sit0 left promiscuous mode [ 829.773529][T19314] device sit0 entered promiscuous mode [ 830.400424][T19334] device veth1_macvtap left promiscuous mode [ 830.411676][T19334] device macsec0 left promiscuous mode [ 830.522219][T19337] device veth1_macvtap entered promiscuous mode [ 830.528941][T19337] device macsec0 entered promiscuous mode [ 830.807530][T19363] device veth1_macvtap left promiscuous mode [ 831.012913][T19375] device sit0 left promiscuous mode [ 831.069869][T19376] device sit0 entered promiscuous mode [ 831.302447][T19377] syz.2.5670[19377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 831.306750][T19377] syz.2.5670[19377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 832.939841][T19416] device veth0_vlan left promiscuous mode [ 833.108958][T19416] device veth0_vlan entered promiscuous mode [ 835.204015][T19473] device sit0 left promiscuous mode [ 835.245763][T19474] device sit0 entered promiscuous mode [ 836.089813][T19502] device sit0 left promiscuous mode [ 836.296232][T19503] device sit0 entered promiscuous mode [ 838.995044][T19555] device sit0 left promiscuous mode [ 839.119991][T19556] device sit0 entered promiscuous mode [ 839.652555][T19563] device macsec0 left promiscuous mode [ 841.105890][T19625] device pim6reg1 entered promiscuous mode [ 841.352222][T19638] syz.2.5752[19638] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 841.352309][T19638] syz.2.5752[19638] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 841.366941][T19634] device macsec0 entered promiscuous mode [ 841.496010][ T548] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 841.566891][T19639] syz.2.5752[19639] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 841.566968][T19639] syz.2.5752[19639] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 841.986071][T19641] netpci0: tun_chr_ioctl cmd 1074025677 [ 842.291126][T19641] netpci0: linktype set to 769 [ 842.587021][T19677] syzkaller0: create flow: hash 3855930321 index 3 [ 842.674518][T19675] device syzkaller0 entered promiscuous mode [ 842.720741][ T329] syzkaller0: tun_net_xmit 48 [ 842.726005][T19674] syzkaller0: delete flow: hash 3855930321 index 3 [ 842.938481][T19661] device wg2 entered promiscuous mode [ 842.997798][T19688] device macsec0 left promiscuous mode [ 843.207720][T19688] device macsec0 entered promiscuous mode [ 843.406598][T19717] device sit0 left promiscuous mode [ 843.468560][T19717] device sit0 entered promiscuous mode [ 844.272372][T19729] device macsec0 left promiscuous mode [ 844.373210][T19729] device veth1_macvtap entered promiscuous mode [ 844.380954][T19729] device macsec0 entered promiscuous mode [ 844.417604][T12386] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 848.447744][T19799] device pim6reg1 entered promiscuous mode [ 849.307261][T19819] device sit0 left promiscuous mode [ 849.413315][T19820] device sit0 entered promiscuous mode [ 850.848425][T19841] device pim6reg1 entered promiscuous mode [ 850.867827][T19837] device macsec0 left promiscuous mode [ 850.954163][T19837] device veth1_macvtap entered promiscuous mode [ 850.972574][T19837] device macsec0 entered promiscuous mode [ 851.050369][ T548] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 851.237355][T19851] FAULT_INJECTION: forcing a failure. [ 851.237355][T19851] name failslab, interval 1, probability 0, space 0, times 0 [ 851.259597][T19851] CPU: 1 PID: 19851 Comm: syz.3.5816 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 851.269408][T19851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 851.279303][T19851] Call Trace: [ 851.282422][T19851] [ 851.285201][T19851] dump_stack_lvl+0x151/0x1b7 [ 851.289718][T19851] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 851.295014][T19851] dump_stack+0x15/0x1e [ 851.299001][T19851] should_fail_ex+0x3d0/0x520 [ 851.303518][T19851] __should_failslab+0xaf/0xf0 [ 851.308115][T19851] should_failslab+0x9/0x20 [ 851.312452][T19851] kmem_cache_alloc_node+0x42/0x330 [ 851.317486][T19851] ? __alloc_skb+0xcc/0x2d0 [ 851.321830][T19851] __alloc_skb+0xcc/0x2d0 [ 851.325994][T19851] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 851.331122][T19851] rtnetlink_event+0xf3/0x1b0 [ 851.335628][T19851] raw_notifier_call_chain+0x8c/0xf0 [ 851.340750][T19851] dev_change_tx_queue_len+0x1d9/0x350 [ 851.346043][T19851] ? dev_set_mtu+0x180/0x180 [ 851.350469][T19851] ? dev_ifsioc+0x460/0x1150 [ 851.354892][T19851] ? dev_ifsioc+0x478/0x1150 [ 851.359324][T19851] dev_ifsioc+0x483/0x1150 [ 851.363576][T19851] ? dev_ioctl+0xe60/0xe60 [ 851.367828][T19851] ? __kasan_check_write+0x14/0x20 [ 851.372771][T19851] ? mutex_lock+0xb1/0x1e0 [ 851.377026][T19851] ? bit_wait_io_timeout+0x120/0x120 [ 851.382149][T19851] dev_ioctl+0x543/0xe60 [ 851.386233][T19851] sock_do_ioctl+0x26b/0x450 [ 851.390651][T19851] ? has_cap_mac_admin+0x3c0/0x3c0 [ 851.395608][T19851] ? sock_show_fdinfo+0xa0/0xa0 [ 851.400290][T19851] ? selinux_file_ioctl+0x3cc/0x540 [ 851.405320][T19851] sock_ioctl+0x455/0x740 [ 851.409492][T19851] ? sock_poll+0x400/0x400 [ 851.413836][T19851] ? __fget_files+0x2cb/0x330 [ 851.418350][T19851] ? security_file_ioctl+0x84/0xb0 [ 851.423294][T19851] ? sock_poll+0x400/0x400 [ 851.427548][T19851] __se_sys_ioctl+0x114/0x190 [ 851.432061][T19851] __x64_sys_ioctl+0x7b/0x90 [ 851.436604][T19851] x64_sys_call+0x98/0x9a0 [ 851.440854][T19851] do_syscall_64+0x3b/0xb0 [ 851.445201][T19851] ? clear_bhb_loop+0x55/0xb0 [ 851.449712][T19851] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 851.455433][T19851] RIP: 0033:0x7fc7a657e819 [ 851.459757][T19851] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 851.479249][T19851] RSP: 002b:00007fc7a72f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 851.487495][T19851] RAX: ffffffffffffffda RBX: 00007fc7a6735fa0 RCX: 00007fc7a657e819 [ 851.495304][T19851] RDX: 0000000020002280 RSI: 0000000000008943 RDI: 0000000000000004 [ 851.503116][T19851] RBP: 00007fc7a72f0090 R08: 0000000000000000 R09: 0000000000000000 [ 851.510924][T19851] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 851.518733][T19851] R13: 0000000000000000 R14: 00007fc7a6735fa0 R15: 00007ffeff3424f8 [ 851.526551][T19851] [ 852.867760][T19904] device pim6reg1 entered promiscuous mode [ 853.063755][T19914] device syzkaller0 entered promiscuous mode [ 853.319118][T19927] FAULT_INJECTION: forcing a failure. [ 853.319118][T19927] name failslab, interval 1, probability 0, space 0, times 0 [ 853.380392][T19927] CPU: 0 PID: 19927 Comm: syz.0.5837 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 853.390231][T19927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 853.400121][T19927] Call Trace: [ 853.403248][T19927] [ 853.406024][T19927] dump_stack_lvl+0x151/0x1b7 [ 853.410536][T19927] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 853.415829][T19927] ? sysvec_irq_work+0x52/0xb0 [ 853.420516][T19927] ? asm_sysvec_irq_work+0x1b/0x20 [ 853.425465][T19927] dump_stack+0x15/0x1e [ 853.429455][T19927] should_fail_ex+0x3d0/0x520 [ 853.433971][T19927] __should_failslab+0xaf/0xf0 [ 853.438572][T19927] should_failslab+0x9/0x20 [ 853.442908][T19927] slab_pre_alloc_hook+0x2e/0x1b0 [ 853.447773][T19927] kmem_cache_alloc_lru+0x49/0x270 [ 853.452717][T19927] ? __d_alloc+0x34/0x700 [ 853.456884][T19927] __d_alloc+0x34/0x700 [ 853.460877][T19927] d_alloc_pseudo+0x1d/0x70 [ 853.465214][T19927] alloc_file_pseudo+0x131/0x2f0 [ 853.469992][T19927] ? alloc_empty_file_noaccount+0x80/0x80 [ 853.475546][T19927] anon_inode_getfile+0xa7/0x180 [ 853.480321][T19927] __se_sys_perf_event_open+0x1006/0x3d60 [ 853.485871][T19927] ? __lock_task_sighand+0xa1/0x100 [ 853.490906][T19927] ? clockevents_program_event+0x22f/0x300 [ 853.496546][T19927] ? dev_map_lookup_elem+0x68/0x100 [ 853.501581][T19927] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 853.507054][T19927] ? debug_smp_processor_id+0x17/0x20 [ 853.512256][T19927] ? perf_trace_sys_enter+0x30/0x140 [ 853.517379][T19927] __x64_sys_perf_event_open+0xbf/0xd0 [ 853.522670][T19927] x64_sys_call+0x7de/0x9a0 [ 853.527013][T19927] do_syscall_64+0x3b/0xb0 [ 853.531263][T19927] ? clear_bhb_loop+0x55/0xb0 [ 853.535777][T19927] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 853.541592][T19927] RIP: 0033:0x7f55a6f7e819 [ 853.545959][T19927] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 853.565485][T19927] RSP: 002b:00007f55a7e1d038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 853.573729][T19927] RAX: ffffffffffffffda RBX: 00007f55a7136080 RCX: 00007f55a6f7e819 [ 853.581547][T19927] RDX: ffefffffffffffff RSI: 0000000000000000 RDI: 0000000020000700 [ 853.589352][T19927] RBP: 00007f55a7e1d090 R08: 0000000000000000 R09: 0000000000000000 [ 853.597165][T19927] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 853.604975][T19927] R13: 0000000000000000 R14: 00007f55a7136080 R15: 00007ffc91f06158 [ 853.612793][T19927] [ 853.769311][T19937] device sit0 left promiscuous mode [ 853.888982][T19940] device sit0 entered promiscuous mode [ 857.755397][T19972] device veth1_macvtap left promiscuous mode [ 857.773988][T19972] device macsec0 left promiscuous mode [ 857.847585][T19979] device veth1_macvtap left promiscuous mode [ 857.870081][T19979] device macsec0 left promiscuous mode [ 857.928111][T19982] device veth1_macvtap entered promiscuous mode [ 857.934895][T19982] device macsec0 entered promiscuous mode [ 858.552464][T19996] device veth1_macvtap left promiscuous mode [ 858.596657][T19996] device macsec0 left promiscuous mode [ 858.680486][T20006] device veth1_macvtap entered promiscuous mode [ 858.687217][T20006] device macsec0 entered promiscuous mode [ 859.307770][T20038] device veth1_macvtap left promiscuous mode [ 859.388845][T20038] device macsec0 left promiscuous mode [ 862.806697][T20101] device sit0 left promiscuous mode [ 862.903060][T20104] device sit0 entered promiscuous mode [ 863.614489][T20093] bridge0: port 1(bridge_slave_0) entered blocking state [ 863.647394][T20093] bridge0: port 1(bridge_slave_0) entered disabled state [ 863.712046][T20093] device bridge_slave_0 entered promiscuous mode [ 863.759869][T20093] bridge0: port 2(bridge_slave_1) entered blocking state [ 863.769045][T20093] bridge0: port 2(bridge_slave_1) entered disabled state [ 863.776483][T20093] device bridge_slave_1 entered promiscuous mode [ 863.803369][T20134] device sit0 left promiscuous mode [ 863.818960][T20134] device sit0 entered promiscuous mode [ 864.073317][T20093] bridge0: port 2(bridge_slave_1) entered blocking state [ 864.080235][T20093] bridge0: port 2(bridge_slave_1) entered forwarding state [ 864.087322][T20093] bridge0: port 1(bridge_slave_0) entered blocking state [ 864.094076][T20093] bridge0: port 1(bridge_slave_0) entered forwarding state [ 864.198036][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 864.210244][ T799] bridge0: port 2(bridge_slave_1) entered disabled state [ 864.218144][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 864.225440][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 864.278748][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 864.353376][ T799] bridge0: port 2(bridge_slave_1) entered blocking state [ 864.360268][ T799] bridge0: port 2(bridge_slave_1) entered forwarding state [ 864.478713][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 864.543750][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 866.114620][T20093] device veth0_vlan entered promiscuous mode [ 866.192778][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 866.231322][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 866.262949][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 866.277021][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 866.417968][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 866.451480][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 866.482552][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 866.549121][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 866.558341][T20093] device veth1_macvtap entered promiscuous mode [ 866.588653][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 866.599517][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 866.614637][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 866.623679][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 866.631980][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 866.673953][T20185] device sit0 left promiscuous mode [ 866.741972][T20185] device sit0 entered promiscuous mode [ 869.151047][ T548] device veth0_vlan left promiscuous mode [ 869.840469][T20236] device veth1_macvtap left promiscuous mode [ 869.916717][T20236] device macsec0 left promiscuous mode [ 870.034092][T20237] device veth1_macvtap entered promiscuous mode [ 870.046931][T20237] device macsec0 entered promiscuous mode [ 870.196318][T20234] device veth1_macvtap left promiscuous mode [ 870.322498][T20244] device veth1_macvtap entered promiscuous mode [ 870.343643][T20244] device macsec0 entered promiscuous mode [ 870.507359][T20241] bridge0: port 1(bridge_slave_0) entered blocking state [ 870.548758][T20241] bridge0: port 1(bridge_slave_0) entered disabled state [ 870.594339][T20241] device bridge_slave_0 entered promiscuous mode [ 870.709885][T20241] bridge0: port 2(bridge_slave_1) entered blocking state [ 870.760334][T20241] bridge0: port 2(bridge_slave_1) entered disabled state [ 870.767673][T20241] device bridge_slave_1 entered promiscuous mode [ 870.779075][T20246] device veth1_macvtap entered promiscuous mode [ 870.786251][T20246] device macsec0 entered promiscuous mode [ 870.903900][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 871.575162][ T548] device team_slave_1 left promiscuous mode [ 871.641149][ T548] bridge0: port 3(team_slave_1) entered disabled state [ 871.760711][ T548] device bridge_slave_1 left promiscuous mode [ 871.772895][ T548] bridge0: port 2(bridge_slave_1) entered disabled state [ 871.781730][ T548] bridge0: port 1(bridge_slave_0) entered disabled state [ 871.790190][ T548] device veth1_macvtap left promiscuous mode [ 871.796101][ T548] device veth0_vlan left promiscuous mode [ 872.000339][T20268] device sit0 entered promiscuous mode [ 872.034580][T20267] device veth1_macvtap left promiscuous mode [ 872.041768][T20267] device macsec0 left promiscuous mode [ 872.194187][T20273] device veth1_macvtap entered promiscuous mode [ 872.229512][T20273] device macsec0 entered promiscuous mode [ 873.469315][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 873.484767][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 873.548305][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 873.598487][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 873.647199][ T799] bridge0: port 1(bridge_slave_0) entered blocking state [ 873.654084][ T799] bridge0: port 1(bridge_slave_0) entered forwarding state [ 873.662372][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 875.065547][T20241] device veth0_vlan entered promiscuous mode [ 876.023373][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 876.032075][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 876.040141][ T799] bridge0: port 2(bridge_slave_1) entered blocking state [ 876.047018][ T799] bridge0: port 2(bridge_slave_1) entered forwarding state [ 876.055704][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 876.064233][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 876.595859][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 876.621907][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 876.633403][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 876.649479][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 876.657869][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 876.665678][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 876.673847][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 876.681467][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 876.698881][T20241] device veth1_macvtap entered promiscuous mode [ 876.708430][T20314] device sit0 left promiscuous mode [ 876.947989][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 876.958425][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 877.029752][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 877.056425][T20317] device sit0 entered promiscuous mode [ 877.234136][T20332] FAULT_INJECTION: forcing a failure. [ 877.234136][T20332] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 877.433852][T20332] CPU: 0 PID: 20332 Comm: syz.5.5958 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 877.443588][T20332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 877.453477][T20332] Call Trace: [ 877.456605][T20332] [ 877.459381][T20332] dump_stack_lvl+0x151/0x1b7 [ 877.463899][T20332] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 877.469188][T20332] ? kvmalloc_node+0x26c/0x640 [ 877.473787][T20332] dump_stack+0x15/0x1e [ 877.477786][T20332] should_fail_ex+0x3d0/0x520 [ 877.482292][T20332] should_fail+0xb/0x10 [ 877.486283][T20332] should_fail_usercopy+0x1a/0x20 [ 877.491147][T20332] _copy_from_user+0x1e/0xc0 [ 877.495570][T20332] btf_new_fd+0x31a/0x7c0 [ 877.499740][T20332] bpf_btf_load+0x6f/0x90 [ 877.503903][T20332] __sys_bpf+0x586/0x7f0 [ 877.507985][T20332] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 877.513199][T20332] ? __ia32_sys_read+0x90/0x90 [ 877.517801][T20332] ? debug_smp_processor_id+0x17/0x20 [ 877.522999][T20332] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 877.528903][T20332] __x64_sys_bpf+0x7c/0x90 [ 877.533154][T20332] x64_sys_call+0x87f/0x9a0 [ 877.537492][T20332] do_syscall_64+0x3b/0xb0 [ 877.541744][T20332] ? clear_bhb_loop+0x55/0xb0 [ 877.546259][T20332] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 877.551986][T20332] RIP: 0033:0x7f738b77e819 [ 877.556237][T20332] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 877.575683][T20332] RSP: 002b:00007f738c546038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 877.583925][T20332] RAX: ffffffffffffffda RBX: 00007f738b936080 RCX: 00007f738b77e819 [ 877.591744][T20332] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 877.599561][T20332] RBP: 00007f738c546090 R08: 0000000000000000 R09: 0000000000000000 [ 877.607358][T20332] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 877.615178][T20332] R13: 0000000000000000 R14: 00007f738b936080 R15: 00007fffa5a921f8 [ 877.622987][T20332] [ 877.689618][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 877.739089][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 877.836784][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 877.866930][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 877.988577][T20335] device sit0 entered promiscuous mode [ 878.266990][T20340] device sit0 left promiscuous mode [ 878.280245][T20345] device sit0 entered promiscuous mode [ 878.693080][T20344] device veth1_macvtap left promiscuous mode [ 878.703328][T20344] device macsec0 left promiscuous mode [ 878.761424][T20350] device veth1_macvtap entered promiscuous mode [ 878.768609][T20350] device macsec0 entered promiscuous mode [ 880.302267][T20385] device veth1_macvtap left promiscuous mode [ 880.310493][T20385] device macsec0 left promiscuous mode [ 880.399150][T20387] device veth1_macvtap entered promiscuous mode [ 880.405260][T20387] device macsec0 entered promiscuous mode [ 880.429172][T20393] device sit0 left promiscuous mode [ 880.499196][T20397] syz.5.5976[20397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 880.499270][T20397] syz.5.5976[20397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 880.796574][T20397] device sit0 left promiscuous mode [ 880.856605][T20403] device sit0 left promiscuous mode [ 880.948387][T20397] device sit0 entered promiscuous mode [ 881.345191][T20403] device sit0 entered promiscuous mode [ 886.072695][T20422] device sit0 left promiscuous mode [ 886.106675][T20419] device sit0 entered promiscuous mode [ 886.340407][T20425] device sit0 entered promiscuous mode [ 886.356503][T20429] device veth1_macvtap left promiscuous mode [ 886.369655][T20430] device veth1_macvtap entered promiscuous mode [ 886.376080][T20430] device macsec0 entered promiscuous mode [ 886.511643][T20442] device sit0 left promiscuous mode [ 886.700552][T20445] device sit0 entered promiscuous mode [ 887.201635][T20463] device sit0 left promiscuous mode [ 887.321319][T20467] device sit0 entered promiscuous mode [ 887.645331][T20469] device sit0 left promiscuous mode [ 887.951027][T20472] device sit0 entered promiscuous mode [ 888.089784][T20459] bridge0: port 1(bridge_slave_0) entered blocking state [ 888.103319][T20459] bridge0: port 1(bridge_slave_0) entered disabled state [ 888.110982][T20459] device bridge_slave_0 entered promiscuous mode [ 888.125159][T20459] bridge0: port 2(bridge_slave_1) entered blocking state [ 888.132193][T20459] bridge0: port 2(bridge_slave_1) entered disabled state [ 888.139838][T20459] device bridge_slave_1 entered promiscuous mode [ 888.380332][T20493] device veth1_macvtap left promiscuous mode [ 888.389883][T20493] device macsec0 left promiscuous mode [ 888.537595][T20496] device veth1_macvtap entered promiscuous mode [ 888.544567][T20496] device macsec0 entered promiscuous mode [ 888.930839][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 888.953659][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 889.315413][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 889.346261][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 889.524062][ T799] bridge0: port 1(bridge_slave_0) entered blocking state [ 889.530952][ T799] bridge0: port 1(bridge_slave_0) entered forwarding state [ 889.733482][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 889.820840][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 889.902985][ T799] bridge0: port 2(bridge_slave_1) entered blocking state [ 889.909875][ T799] bridge0: port 2(bridge_slave_1) entered forwarding state [ 890.020758][ T548] device veth0_vlan left promiscuous mode [ 890.099969][T20507] device veth1_macvtap left promiscuous mode [ 890.105801][T20507] device macsec0 left promiscuous mode [ 890.154119][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 890.183747][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 890.193843][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 890.202143][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 890.210458][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 890.220084][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 890.228405][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 890.242078][T20459] device veth0_vlan entered promiscuous mode [ 890.255044][T20459] device veth1_macvtap entered promiscuous mode [ 890.298361][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 890.440657][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 890.592596][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 890.726039][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 890.744577][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 890.752526][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 890.760813][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 890.769409][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 890.777874][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 890.919520][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 891.047061][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 892.018389][T20542] device veth1_macvtap left promiscuous mode [ 892.034851][T20542] device macsec0 left promiscuous mode [ 892.245640][T20550] device veth1_macvtap entered promiscuous mode [ 892.251961][T20550] device macsec0 entered promiscuous mode [ 892.387131][T20553] device veth1_macvtap left promiscuous mode [ 892.741818][T20555] device veth1_macvtap entered promiscuous mode [ 892.787442][T20555] device macsec0 entered promiscuous mode [ 893.318826][T20572] device sit0 left promiscuous mode [ 893.558026][T20572] device sit0 entered promiscuous mode [ 893.872822][T20570] device veth1_macvtap left promiscuous mode [ 893.899251][T20570] device macsec0 left promiscuous mode [ 894.198048][T20586] device veth1_macvtap entered promiscuous mode [ 894.204206][T20586] device macsec0 entered promiscuous mode [ 898.279796][T20633] FAULT_INJECTION: forcing a failure. [ 898.279796][T20633] name failslab, interval 1, probability 0, space 0, times 0 [ 898.298625][T20633] CPU: 1 PID: 20633 Comm: syz.4.6037 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 898.308523][T20633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 898.318421][T20633] Call Trace: [ 898.321970][T20633] [ 898.324752][T20633] dump_stack_lvl+0x151/0x1b7 [ 898.329264][T20633] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 898.334560][T20633] ? avc_denied+0x1b0/0x1b0 [ 898.338898][T20633] dump_stack+0x15/0x1e [ 898.342887][T20633] should_fail_ex+0x3d0/0x520 [ 898.347412][T20633] __should_failslab+0xaf/0xf0 [ 898.352005][T20633] ? qdisc_alloc+0x7a/0x780 [ 898.356340][T20633] should_failslab+0x9/0x20 [ 898.360681][T20633] __kmem_cache_alloc_node+0x3d/0x2a0 [ 898.365894][T20633] ? __down_common+0x690/0x690 [ 898.370497][T20633] ? qdisc_alloc+0x7a/0x780 [ 898.374831][T20633] __kmalloc_node+0xa3/0x1e0 [ 898.379257][T20633] ? __kasan_check_write+0x14/0x20 [ 898.384206][T20633] qdisc_alloc+0x7a/0x780 [ 898.388369][T20633] ? tun_device_event+0x3e5/0xf80 [ 898.393231][T20633] ? try_module_get+0x12a/0x290 [ 898.397915][T20633] qdisc_create_dflt+0x6b/0x3e0 [ 898.402603][T20633] ? _raw_spin_lock+0xa4/0x1b0 [ 898.407208][T20633] dev_activate+0x2fd/0x1130 [ 898.411634][T20633] __dev_open+0x3c7/0x4e0 [ 898.415799][T20633] ? dev_open+0x260/0x260 [ 898.419964][T20633] ? _raw_spin_unlock_bh+0x50/0x60 [ 898.424907][T20633] ? dev_set_rx_mode+0x249/0x2d0 [ 898.429683][T20633] ? __kasan_check_read+0x11/0x20 [ 898.434542][T20633] __dev_change_flags+0x1db/0x6e0 [ 898.439401][T20633] ? avc_denied+0x1b0/0x1b0 [ 898.443743][T20633] ? dev_get_flags+0x1e0/0x1e0 [ 898.448344][T20633] ? kstrtouint+0xf6/0x180 [ 898.452600][T20633] dev_change_flags+0x8c/0x1a0 [ 898.457235][T20633] dev_ifsioc+0x177/0x1150 [ 898.461447][T20633] ? dev_ioctl+0xe60/0xe60 [ 898.465696][T20633] ? __kasan_check_write+0x14/0x20 [ 898.470647][T20633] ? mutex_lock+0xb1/0x1e0 [ 898.474898][T20633] ? bit_wait_io_timeout+0x120/0x120 [ 898.480023][T20633] dev_ioctl+0x543/0xe60 [ 898.484101][T20633] sock_do_ioctl+0x26b/0x450 [ 898.488524][T20633] ? has_cap_mac_admin+0x3c0/0x3c0 [ 898.493470][T20633] ? sock_show_fdinfo+0xa0/0xa0 [ 898.498161][T20633] ? selinux_file_ioctl+0x3cc/0x540 [ 898.503197][T20633] sock_ioctl+0x455/0x740 [ 898.507367][T20633] ? sock_poll+0x400/0x400 [ 898.511613][T20633] ? __fget_files+0x2cb/0x330 [ 898.516127][T20633] ? security_file_ioctl+0x84/0xb0 [ 898.521071][T20633] ? sock_poll+0x400/0x400 [ 898.525326][T20633] __se_sys_ioctl+0x114/0x190 [ 898.529837][T20633] __x64_sys_ioctl+0x7b/0x90 [ 898.534263][T20633] x64_sys_call+0x98/0x9a0 [ 898.538518][T20633] do_syscall_64+0x3b/0xb0 [ 898.542767][T20633] ? clear_bhb_loop+0x55/0xb0 [ 898.547280][T20633] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 898.553010][T20633] RIP: 0033:0x7f5b5c17e819 [ 898.557264][T20633] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 898.576702][T20633] RSP: 002b:00007f5b5cfa5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 898.584949][T20633] RAX: ffffffffffffffda RBX: 00007f5b5c335fa0 RCX: 00007f5b5c17e819 [ 898.592757][T20633] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000008 [ 898.600583][T20633] RBP: 00007f5b5cfa5090 R08: 0000000000000000 R09: 0000000000000000 [ 898.608381][T20633] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 898.616196][T20633] R13: 0000000000000000 R14: 00007f5b5c335fa0 R15: 00007fff3abd1038 [ 898.624022][T20633] [ 898.627722][T20633] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 898.635334][T20633] device pim6reg1 entered promiscuous mode [ 898.722589][T20646] device sit0 left promiscuous mode [ 898.960613][T20650] device syzkaller0 entered promiscuous mode [ 899.066219][T20646] device sit0 entered promiscuous mode [ 899.545723][T20654] device syzkaller0 entered promiscuous mode [ 899.567026][T20644] device wg2 left promiscuous mode [ 899.679499][T20665] device veth1_macvtap left promiscuous mode [ 899.735276][T20665] device macsec0 left promiscuous mode [ 899.897860][T20668] device veth1_macvtap entered promiscuous mode [ 899.903942][T20668] device macsec0 entered promiscuous mode [ 899.910910][T20671] device veth1_macvtap left promiscuous mode [ 899.917240][T20671] device macsec0 left promiscuous mode [ 900.013856][T20679] device veth1_macvtap entered promiscuous mode [ 900.026886][T20679] device macsec0 entered promiscuous mode [ 901.266704][T20719] device sit0 left promiscuous mode [ 901.422895][T20719] device sit0 entered promiscuous mode [ 902.043882][T20744] device sit0 left promiscuous mode [ 902.078524][T20744] device sit0 entered promiscuous mode [ 902.704772][T20761] device syzkaller0 entered promiscuous mode [ 902.743311][T20769] FAULT_INJECTION: forcing a failure. [ 902.743311][T20769] name failslab, interval 1, probability 0, space 0, times 0 [ 902.826606][T20769] CPU: 1 PID: 20769 Comm: syz.2.6080 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 902.836336][T20769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 902.846232][T20769] Call Trace: [ 902.849352][T20769] [ 902.852131][T20769] dump_stack_lvl+0x151/0x1b7 [ 902.856649][T20769] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 902.861943][T20769] ? format_decode+0x72f/0x1f10 [ 902.866623][T20769] dump_stack+0x15/0x1e [ 902.870617][T20769] should_fail_ex+0x3d0/0x520 [ 902.875133][T20769] __should_failslab+0xaf/0xf0 [ 902.879732][T20769] ? kvmalloc_node+0x221/0x640 [ 902.884330][T20769] should_failslab+0x9/0x20 [ 902.888675][T20769] __kmem_cache_alloc_node+0x3d/0x2a0 [ 902.893877][T20769] ? vsnprintf+0x1b93/0x1c70 [ 902.898301][T20769] ? kvmalloc_node+0x221/0x640 [ 902.902901][T20769] __kmalloc_node+0xa3/0x1e0 [ 902.907328][T20769] kvmalloc_node+0x221/0x640 [ 902.911754][T20769] ? vm_mmap+0xb0/0xb0 [ 902.915659][T20769] ? sprintf+0xd6/0x120 [ 902.919651][T20769] ? vti6_locate+0x45a/0x6a0 [ 902.924080][T20769] alloc_netdev_mqs+0x8c/0xf90 [ 902.928677][T20769] ? selinux_capset+0xf0/0xf0 [ 902.933189][T20769] ? reject_tg6_check+0x240/0x240 [ 902.938052][T20769] vti6_locate+0x552/0x6a0 [ 902.942303][T20769] ? vti6_link_config+0x570/0x570 [ 902.947164][T20769] ? vti6_siocdevprivate+0x9de/0x17e0 [ 902.952372][T20769] ? memcpy+0x56/0x70 [ 902.956190][T20769] vti6_siocdevprivate+0xa02/0x17e0 [ 902.961228][T20769] ? vti6_tnl_xmit+0x1aa0/0x1aa0 [ 902.965998][T20769] ? kstrtol_from_user+0x180/0x180 [ 902.970954][T20769] ? full_name_hash+0xba/0xf0 [ 902.975461][T20769] dev_ifsioc+0xd40/0x1150 [ 902.979710][T20769] ? ioctl_has_perm+0x3f0/0x560 [ 902.984401][T20769] ? dev_ioctl+0xe60/0xe60 [ 902.988656][T20769] ? __mutex_lock_slowpath+0xe/0x10 [ 902.993681][T20769] ? mutex_lock+0x130/0x1e0 [ 902.998024][T20769] ? bit_wait_io_timeout+0x120/0x120 [ 903.003147][T20769] dev_ioctl+0x5e9/0xe60 [ 903.007223][T20769] sock_ioctl+0x665/0x740 [ 903.011391][T20769] ? sock_poll+0x400/0x400 [ 903.015650][T20769] ? __fget_files+0x2cb/0x330 [ 903.020158][T20769] ? security_file_ioctl+0x84/0xb0 [ 903.025101][T20769] ? sock_poll+0x400/0x400 [ 903.029355][T20769] __se_sys_ioctl+0x114/0x190 [ 903.033868][T20769] __x64_sys_ioctl+0x7b/0x90 [ 903.038296][T20769] x64_sys_call+0x98/0x9a0 [ 903.042548][T20769] do_syscall_64+0x3b/0xb0 [ 903.046800][T20769] ? clear_bhb_loop+0x55/0xb0 [ 903.051314][T20769] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 903.057041][T20769] RIP: 0033:0x7f50cfb7e819 [ 903.061294][T20769] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 903.080735][T20769] RSP: 002b:00007f50d08cf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 903.088986][T20769] RAX: ffffffffffffffda RBX: 00007f50cfd35fa0 RCX: 00007f50cfb7e819 [ 903.096793][T20769] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000007 [ 903.104603][T20769] RBP: 00007f50d08cf090 R08: 0000000000000000 R09: 0000000000000000 [ 903.112413][T20769] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 903.120224][T20769] R13: 0000000000000000 R14: 00007f50cfd35fa0 R15: 00007ffdf047eff8 [ 903.128040][T20769] [ 903.293112][T20789] device sit0 left promiscuous mode [ 903.551203][T20789] device sit0 entered promiscuous mode [ 903.738649][T20795] device veth1_macvtap entered promiscuous mode [ 903.816592][T20795] device macsec0 entered promiscuous mode [ 903.887987][T12386] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 904.105119][T20809] device wg2 entered promiscuous mode [ 904.559667][T20829] device veth1_macvtap left promiscuous mode [ 904.666218][T20829] device macsec0 left promiscuous mode [ 906.139635][T20807] device veth1_macvtap entered promiscuous mode [ 906.147535][T20807] device macsec0 entered promiscuous mode [ 906.195663][T12386] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 906.236652][T20852] device veth1_macvtap left promiscuous mode [ 906.257562][T20852] device macsec0 left promiscuous mode [ 906.343118][T20854] device veth1_macvtap entered promiscuous mode [ 906.387085][T20854] device macsec0 entered promiscuous mode [ 907.118513][T20888] device veth1_macvtap left promiscuous mode [ 907.124736][T20888] device macsec0 left promiscuous mode [ 907.239283][T20892] device sit0 left promiscuous mode [ 907.332570][T20893] device veth1_macvtap entered promiscuous mode [ 907.368603][T20893] device macsec0 entered promiscuous mode [ 907.423311][T12386] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 908.183659][T20924] FAULT_INJECTION: forcing a failure. [ 908.183659][T20924] name failslab, interval 1, probability 0, space 0, times 0 [ 908.196109][T20924] CPU: 0 PID: 20924 Comm: syz.3.6130 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 908.205786][T20924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 908.215683][T20924] Call Trace: [ 908.218806][T20924] [ 908.221583][T20924] dump_stack_lvl+0x151/0x1b7 [ 908.226098][T20924] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 908.231392][T20924] ? kasan_save_alloc_info+0x1f/0x30 [ 908.236512][T20924] ? __kasan_slab_alloc+0x6c/0x80 [ 908.241373][T20924] ? slab_post_alloc_hook+0x53/0x2c0 [ 908.246490][T20924] ? radix_tree_node_alloc+0x80/0x3c0 [ 908.251700][T20924] dump_stack+0x15/0x1e [ 908.255693][T20924] should_fail_ex+0x3d0/0x520 [ 908.260207][T20924] ? radix_tree_node_alloc+0x80/0x3c0 [ 908.265413][T20924] __should_failslab+0xaf/0xf0 [ 908.270014][T20924] should_failslab+0x9/0x20 [ 908.274351][T20924] kmem_cache_alloc+0x3b/0x320 [ 908.278956][T20924] ? kfree+0x7a/0xf0 [ 908.282683][T20924] radix_tree_node_alloc+0x80/0x3c0 [ 908.287720][T20924] idr_get_free+0x2b6/0xa90 [ 908.292060][T20924] idr_alloc_cyclic+0x1ec/0x5d0 [ 908.296745][T20924] ? idr_alloc+0x2f0/0x2f0 [ 908.301001][T20924] ? __kasan_check_write+0x14/0x20 [ 908.305944][T20924] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 908.310809][T20924] ? debug_smp_processor_id+0x17/0x20 [ 908.316010][T20924] ? __radix_tree_preload+0x351/0x3d0 [ 908.321222][T20924] btf_alloc_id+0x46/0x150 [ 908.325476][T20924] btf_new_fd+0x5f4/0x7c0 [ 908.329641][T20924] bpf_btf_load+0x6f/0x90 [ 908.333805][T20924] __sys_bpf+0x586/0x7f0 [ 908.337889][T20924] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 908.343098][T20924] ? __ia32_sys_read+0x90/0x90 [ 908.347692][T20924] ? debug_smp_processor_id+0x17/0x20 [ 908.352899][T20924] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 908.358801][T20924] __x64_sys_bpf+0x7c/0x90 [ 908.363055][T20924] x64_sys_call+0x87f/0x9a0 [ 908.367395][T20924] do_syscall_64+0x3b/0xb0 [ 908.371644][T20924] ? clear_bhb_loop+0x55/0xb0 [ 908.376161][T20924] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 908.381888][T20924] RIP: 0033:0x7f56d737e819 [ 908.386140][T20924] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 908.405581][T20924] RSP: 002b:00007f56d81fa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 908.413830][T20924] RAX: ffffffffffffffda RBX: 00007f56d7535fa0 RCX: 00007f56d737e819 [ 908.421637][T20924] RDX: 0000000000000028 RSI: 0000000020000900 RDI: 0000000000000012 [ 908.429448][T20924] RBP: 00007f56d81fa090 R08: 0000000000000000 R09: 0000000000000000 [ 908.437261][T20924] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 908.445071][T20924] R13: 0000000000000000 R14: 00007f56d7535fa0 R15: 00007ffc3b286528 [ 908.452887][T20924] [ 908.494461][T20928] device sit0 left promiscuous mode [ 908.616627][T20927] device veth0_vlan left promiscuous mode [ 908.648974][T20927] device veth0_vlan entered promiscuous mode [ 908.771838][T20933] device sit0 entered promiscuous mode [ 909.430965][T12386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 909.459079][T12386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 909.467020][T12386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 909.639892][T20957] bridge0: port 1(bridge_slave_0) entered disabled state [ 909.880007][T20973] device veth1_macvtap left promiscuous mode [ 909.887314][T20973] device macsec0 left promiscuous mode [ 910.032622][T20976] device veth1_macvtap entered promiscuous mode [ 910.045273][T20976] device macsec0 entered promiscuous mode [ 910.735928][T21022] device sit0 left promiscuous mode [ 911.032638][T21024] device sit0 entered promiscuous mode [ 912.140101][T21035] device sit0 entered promiscuous mode [ 913.302437][T21090] device sit0 left promiscuous mode [ 913.388522][T21090] device sit0 entered promiscuous mode [ 914.052556][T21103] device veth0_vlan left promiscuous mode [ 914.076090][T21103] device veth0_vlan entered promiscuous mode [ 914.242028][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 914.250172][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 914.257660][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 915.239080][T21129] device veth1_macvtap left promiscuous mode [ 915.297816][T21129] device macsec0 left promiscuous mode [ 915.553412][T21134] device veth1_macvtap entered promiscuous mode [ 915.559824][T21134] device macsec0 entered promiscuous mode [ 915.698229][T12386] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 915.833500][T21153] device sit0 left promiscuous mode [ 915.844856][T21156] FAULT_INJECTION: forcing a failure. [ 915.844856][T21156] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 916.077432][T21156] CPU: 0 PID: 21156 Comm: syz.0.6201 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 916.087161][T21156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 916.097054][T21156] Call Trace: [ 916.100178][T21156] [ 916.102960][T21156] dump_stack_lvl+0x151/0x1b7 [ 916.107489][T21156] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 916.112759][T21156] ? kstrtoull+0x1cd/0x2e0 [ 916.117014][T21156] ? _parse_integer+0x40/0x40 [ 916.121529][T21156] dump_stack+0x15/0x1e [ 916.125519][T21156] should_fail_ex+0x3d0/0x520 [ 916.130121][T21156] should_fail+0xb/0x10 [ 916.134112][T21156] should_fail_usercopy+0x1a/0x20 [ 916.138971][T21156] _copy_from_user+0x1e/0xc0 [ 916.143407][T21156] iovec_from_user+0xc7/0x320 [ 916.147914][T21156] __import_iovec+0x70/0x430 [ 916.152338][T21156] ? kstrtouint_from_user+0x124/0x180 [ 916.157546][T21156] import_iovec+0xe5/0x120 [ 916.161798][T21156] copy_msghdr_from_user+0x527/0x670 [ 916.166921][T21156] ? __kasan_check_write+0x14/0x20 [ 916.171865][T21156] ? sendmsg_copy_msghdr+0x70/0x70 [ 916.176817][T21156] __sys_recvmsg+0x24b/0x3d0 [ 916.181241][T21156] ? ____sys_recvmsg+0x530/0x530 [ 916.186015][T21156] ? __kasan_check_write+0x14/0x20 [ 916.190964][T21156] ? __ia32_sys_read+0x90/0x90 [ 916.195562][T21156] ? debug_smp_processor_id+0x17/0x20 [ 916.200768][T21156] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 916.206669][T21156] __x64_sys_recvmsg+0x7f/0x90 [ 916.211270][T21156] x64_sys_call+0x171/0x9a0 [ 916.215610][T21156] do_syscall_64+0x3b/0xb0 [ 916.219861][T21156] ? clear_bhb_loop+0x55/0xb0 [ 916.224374][T21156] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 916.230102][T21156] RIP: 0033:0x7fc347d7e819 [ 916.234355][T21156] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 916.253798][T21156] RSP: 002b:00007fc348c1a038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 916.262043][T21156] RAX: ffffffffffffffda RBX: 00007fc347f35fa0 RCX: 00007fc347d7e819 [ 916.269852][T21156] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000004 [ 916.277663][T21156] RBP: 00007fc348c1a090 R08: 0000000000000000 R09: 0000000000000000 [ 916.285477][T21156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 916.293286][T21156] R13: 0000000000000000 R14: 00007fc347f35fa0 R15: 00007ffec3c69a98 [ 916.301101][T21156] [ 916.369501][T21158] device sit0 entered promiscuous mode [ 920.700515][T21198] bond_slave_1: mtu less than device minimum [ 921.374954][T21208] device veth1_macvtap left promiscuous mode [ 921.381333][T21208] device macsec0 left promiscuous mode [ 921.494810][T21208] device veth1_macvtap entered promiscuous mode [ 921.573108][T21208] device macsec0 entered promiscuous mode [ 922.535421][T21214] device veth1_macvtap left promiscuous mode [ 922.544799][T21214] device macsec0 left promiscuous mode [ 922.576030][T21220] device veth1_macvtap entered promiscuous mode [ 922.584422][T21220] device macsec0 entered promiscuous mode [ 922.599712][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 925.435880][T21240] FAULT_INJECTION: forcing a failure. [ 925.435880][T21240] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 925.466561][T21240] CPU: 1 PID: 21240 Comm: syz.2.6227 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 925.476276][T21240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 925.486167][T21240] Call Trace: [ 925.489293][T21240] [ 925.492070][T21240] dump_stack_lvl+0x151/0x1b7 [ 925.496586][T21240] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 925.501882][T21240] ? do_vfs_ioctl+0xba7/0x29a0 [ 925.506481][T21240] dump_stack+0x15/0x1e [ 925.510475][T21240] should_fail_ex+0x3d0/0x520 [ 925.514987][T21240] should_fail+0xb/0x10 [ 925.518976][T21240] should_fail_usercopy+0x1a/0x20 [ 925.523836][T21240] _copy_from_user+0x1e/0xc0 [ 925.528262][T21240] br_dev_read_uargs+0x15c/0x3f0 [ 925.533041][T21240] ? br_dev_siocdevprivate+0x1a20/0x1a20 [ 925.538510][T21240] br_ioctl_stub+0x161/0x940 [ 925.542931][T21240] ? has_cap_mac_admin+0x3c0/0x3c0 [ 925.547877][T21240] ? vfs_write+0x952/0xed0 [ 925.552130][T21240] ? br_dev_read_uargs+0x3f0/0x3f0 [ 925.557077][T21240] ? __kasan_check_write+0x14/0x20 [ 925.562023][T21240] ? mutex_lock+0xb1/0x1e0 [ 925.566280][T21240] ? bit_wait_io_timeout+0x120/0x120 [ 925.571411][T21240] ? selinux_file_ioctl+0x3cc/0x540 [ 925.576451][T21240] ? br_dev_read_uargs+0x3f0/0x3f0 [ 925.581376][T21240] sock_ioctl+0x291/0x740 [ 925.585548][T21240] ? sock_poll+0x400/0x400 [ 925.589797][T21240] ? __fget_files+0x2cb/0x330 [ 925.594310][T21240] ? security_file_ioctl+0x84/0xb0 [ 925.599259][T21240] ? sock_poll+0x400/0x400 [ 925.603509][T21240] __se_sys_ioctl+0x114/0x190 [ 925.608027][T21240] __x64_sys_ioctl+0x7b/0x90 [ 925.612449][T21240] x64_sys_call+0x98/0x9a0 [ 925.616701][T21240] do_syscall_64+0x3b/0xb0 [ 925.620954][T21240] ? clear_bhb_loop+0x55/0xb0 [ 925.625475][T21240] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 925.631197][T21240] RIP: 0033:0x7f50cfb7e819 [ 925.635450][T21240] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 925.654890][T21240] RSP: 002b:00007f50d08cf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 925.663134][T21240] RAX: ffffffffffffffda RBX: 00007f50cfd35fa0 RCX: 00007f50cfb7e819 [ 925.670944][T21240] RDX: 0000000000000000 RSI: 0000000000008941 RDI: 0000000000000004 [ 925.678757][T21240] RBP: 00007f50d08cf090 R08: 0000000000000000 R09: 0000000000000000 [ 925.686569][T21240] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 925.694379][T21240] R13: 0000000000000000 R14: 00007f50cfd35fa0 R15: 00007ffdf047eff8 [ 925.702196][T21240] [ 926.040295][T21239] device sit0 entered promiscuous mode [ 928.324073][T21311] device pim6reg1 entered promiscuous mode [ 928.351535][T21312] device veth0_vlan left promiscuous mode [ 928.357626][T21312] device veth0_vlan entered promiscuous mode [ 928.509366][T21316] device veth1_macvtap left promiscuous mode [ 928.515181][T21316] device macsec0 left promiscuous mode [ 928.828096][T21317] device veth1_macvtap entered promiscuous mode [ 928.865661][T21317] device macsec0 entered promiscuous mode [ 929.795178][T21347] device sit0 left promiscuous mode [ 930.264019][T21348] device sit0 entered promiscuous mode [ 930.771298][T21350] bridge0: port 2(bridge_slave_1) entered disabled state [ 930.778313][T21350] bridge0: port 1(bridge_slave_0) entered disabled state [ 932.408055][T21378] device veth1_macvtap left promiscuous mode [ 932.414803][T21378] device macsec0 left promiscuous mode [ 932.507241][T21382] device veth1_macvtap entered promiscuous mode [ 932.513482][T21382] device macsec0 entered promiscuous mode [ 932.529080][T21384] device veth1_macvtap left promiscuous mode [ 932.536473][T21384] device macsec0 left promiscuous mode [ 932.591831][T21388] device sit0 left promiscuous mode [ 932.613865][T21391] device sit0 entered promiscuous mode [ 933.156796][T21389] device veth1_macvtap entered promiscuous mode [ 933.162953][T21389] device macsec0 entered promiscuous mode [ 933.378933][T21397] device sit0 left promiscuous mode [ 933.400900][T21399] device sit0 entered promiscuous mode [ 934.356373][T21407] device veth0_vlan left promiscuous mode [ 934.367540][T21407] device veth0_vlan entered promiscuous mode [ 934.491309][T21419] device sit0 left promiscuous mode [ 934.510823][T21419] device sit0 entered promiscuous mode [ 935.256287][T21435] device veth1_macvtap left promiscuous mode [ 935.301299][T21435] device macsec0 left promiscuous mode [ 935.380336][T21435] device veth1_macvtap entered promiscuous mode [ 935.447886][T21435] device macsec0 entered promiscuous mode [ 938.260956][T21451] device sit0 left promiscuous mode [ 938.367086][T21451] device sit0 entered promiscuous mode [ 938.592246][T21456] device sit0 left promiscuous mode [ 939.163052][T21458] device sit0 entered promiscuous mode [ 941.888815][T21510] device sit0 left promiscuous mode [ 942.143026][T21509] device sit0 entered promiscuous mode [ 943.406719][T21548] tun0: tun_chr_ioctl cmd 1074025675 [ 943.411840][T21548] tun0: persist enabled [ 944.057791][T21580] device veth1_macvtap left promiscuous mode [ 944.135026][T21580] device macsec0 left promiscuous mode [ 944.283144][T21582] device veth1_macvtap left promiscuous mode [ 944.300006][T21582] device macsec0 left promiscuous mode [ 944.398347][T21586] device veth1_macvtap entered promiscuous mode [ 944.468717][T21586] device macsec0 entered promiscuous mode [ 944.520853][T21580] device veth1_macvtap entered promiscuous mode [ 944.555326][T21580] device macsec0 entered promiscuous mode [ 945.134475][T21617] device sit0 left promiscuous mode [ 945.366179][T21621] device sit0 entered promiscuous mode [ 945.864802][T21612] device syzkaller0 entered promiscuous mode [ 945.916522][T21639] device veth1_macvtap left promiscuous mode [ 945.922971][T21639] device macsec0 left promiscuous mode [ 945.982416][T21648] device veth1_macvtap entered promiscuous mode [ 945.988555][T21648] device macsec0 entered promiscuous mode [ 946.453254][T21683] device sit0 left promiscuous mode [ 946.515182][T21686] FAULT_INJECTION: forcing a failure. [ 946.515182][T21686] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 946.557967][T21686] CPU: 0 PID: 21686 Comm: syz.2.6367 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 946.567700][T21686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 946.577591][T21686] Call Trace: [ 946.580715][T21686] [ 946.583493][T21686] dump_stack_lvl+0x151/0x1b7 [ 946.588008][T21686] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 946.593305][T21686] ? migrate_enable+0x1cb/0x2b0 [ 946.597990][T21686] dump_stack+0x15/0x1e [ 946.601978][T21686] should_fail_ex+0x3d0/0x520 [ 946.606494][T21686] should_fail+0xb/0x10 [ 946.610483][T21686] should_fail_usercopy+0x1a/0x20 [ 946.615346][T21686] _copy_from_user+0x1e/0xc0 [ 946.619773][T21686] generic_map_update_batch+0x54c/0x8c0 [ 946.625153][T21686] ? generic_map_delete_batch+0x5c0/0x5c0 [ 946.630708][T21686] ? generic_map_delete_batch+0x5c0/0x5c0 [ 946.636264][T21686] bpf_map_do_batch+0x4cc/0x630 [ 946.640949][T21686] __sys_bpf+0x66b/0x7f0 [ 946.645029][T21686] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 946.650238][T21686] ? __ia32_sys_read+0x90/0x90 [ 946.654836][T21686] ? debug_smp_processor_id+0x17/0x20 [ 946.660041][T21686] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 946.665945][T21686] __x64_sys_bpf+0x7c/0x90 [ 946.670199][T21686] x64_sys_call+0x87f/0x9a0 [ 946.674539][T21686] do_syscall_64+0x3b/0xb0 [ 946.678787][T21686] ? clear_bhb_loop+0x55/0xb0 [ 946.683304][T21686] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 946.689032][T21686] RIP: 0033:0x7f50cfb7e819 [ 946.693285][T21686] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 946.712726][T21686] RSP: 002b:00007f50d08cf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 946.720967][T21686] RAX: ffffffffffffffda RBX: 00007f50cfd35fa0 RCX: 00007f50cfb7e819 [ 946.728786][T21686] RDX: 0000000000000038 RSI: 0000000020000200 RDI: 000000000000001a [ 946.736595][T21686] RBP: 00007f50d08cf090 R08: 0000000000000000 R09: 0000000000000000 [ 946.744403][T21686] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 946.752212][T21686] R13: 0000000000000000 R14: 00007f50cfd35fa0 R15: 00007ffdf047eff8 [ 946.760033][T21686] [ 946.831348][T21681] device veth1_macvtap left promiscuous mode [ 946.937250][T21681] device macsec0 left promiscuous mode [ 947.049909][T21689] device sit0 entered promiscuous mode [ 947.425307][T21692] device veth1_macvtap entered promiscuous mode [ 947.437547][T21692] device macsec0 entered promiscuous mode [ 947.521324][T21704] device sit0 left promiscuous mode [ 947.656615][T21705] device sit0 entered promiscuous mode [ 948.862480][T21738] device veth1_macvtap left promiscuous mode [ 948.960421][T21738] device macsec0 left promiscuous mode [ 949.174473][T21742] device veth1_macvtap entered promiscuous mode [ 949.196619][T21742] device macsec0 entered promiscuous mode [ 952.783984][T21794] device sit0 left promiscuous mode [ 952.901314][T21796] device sit0 entered promiscuous mode [ 953.922584][T21815] device wg2 entered promiscuous mode [ 953.977652][T21814] device sit0 left promiscuous mode [ 954.186210][T21819] device sit0 entered promiscuous mode [ 960.066602][T21859] device sit0 left promiscuous mode [ 960.086468][T21865] device sit0 entered promiscuous mode [ 960.257583][T21881] device sit0 left promiscuous mode [ 960.286237][T21883] device sit0 entered promiscuous mode [ 960.972289][T21916] device sit0 left promiscuous mode [ 961.183066][T21917] device sit0 entered promiscuous mode [ 961.570848][T21913] device veth1_macvtap left promiscuous mode [ 961.619584][T21913] device macsec0 left promiscuous mode [ 963.022324][T21923] device veth1_macvtap entered promiscuous mode [ 963.028545][T21923] device macsec0 entered promiscuous mode [ 964.032682][T21948] device sit0 left promiscuous mode [ 964.104805][T21953] device sit0 left promiscuous mode [ 964.185547][T21948] device sit0 entered promiscuous mode [ 965.273499][T21953] device sit0 entered promiscuous mode [ 965.418485][T21974] device sit0 left promiscuous mode [ 965.517197][T21975] device sit0 entered promiscuous mode [ 966.705622][T21992] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 966.717166][T21992] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 966.725407][T21992] CPU: 0 PID: 21992 Comm: syz.3.6459 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 966.735129][T21992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 966.745027][T21992] RIP: 0010:dev_map_enqueue+0x31/0x340 [ 966.750316][T21992] Code: 56 41 55 41 54 53 48 83 ec 18 48 89 55 c0 49 89 f7 48 89 fb 49 bc 00 00 00 00 00 fc ff df e8 e6 fb dd ff 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 74 08 48 89 df e8 80 67 25 00 4c 8b 33 48 83 c3 20 [ 966.769762][T21992] RSP: 0018:ffffc900017075f8 EFLAGS: 00010246 [ 966.775658][T21992] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000080000 [ 966.783470][T21992] RDX: ffffc9000f601000 RSI: 000000000000069c RDI: 000000000000069d [ 966.791295][T21992] RBP: ffffc90001707638 R08: ffffffff84145712 R09: ffffffff84145632 [ 966.799090][T21992] R10: 0000000000000004 R11: ffff88811b1ad100 R12: dffffc0000000000 [ 966.806906][T21992] R13: 1ffff1103edc6e15 R14: 1ffff1103edc6e15 R15: ffff888130208070 [ 966.814801][T21992] FS: 00007f56d81fa6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 966.823569][T21992] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 966.829988][T21992] CR2: 0000001b3381fffc CR3: 000000014b38c000 CR4: 00000000003506b0 [ 966.837805][T21992] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 966.845612][T21992] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 966.853427][T21992] Call Trace: [ 966.856556][T21992] [ 966.859326][T21992] ? __die_body+0x62/0xb0 [ 966.863491][T21992] ? die_addr+0x9f/0xd0 [ 966.867484][T21992] ? exc_general_protection+0x317/0x4c0 [ 966.872982][T21992] ? asm_exc_general_protection+0x27/0x30 [ 966.878521][T21992] ? xdp_do_redirect_frame+0x1b2/0x800 [ 966.883811][T21992] ? xdp_do_redirect_frame+0x292/0x800 [ 966.889109][T21992] ? dev_map_enqueue+0x31/0x340 [ 966.893793][T21992] ? dev_map_enqueue+0x2a/0x340 [ 966.898479][T21992] xdp_do_redirect_frame+0x2b5/0x800 [ 966.903603][T21992] bpf_test_run_xdp_live+0xc30/0x1f70 [ 966.908818][T21992] ? bpf_test_run_xdp_live+0x7ae/0x1f70 [ 966.914188][T21992] ? xdp_convert_md_to_buff+0x360/0x360 [ 966.919573][T21992] ? bpf_dispatcher_change_prog+0xd86/0xf10 [ 966.925299][T21992] ? 0xffffffffa00038c0 [ 966.929301][T21992] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 966.935372][T21992] ? __kasan_check_write+0x14/0x20 [ 966.940311][T21992] ? _copy_from_user+0x90/0xc0 [ 966.944921][T21992] bpf_prog_test_run_xdp+0x7d1/0x1130 [ 966.950130][T21992] ? dev_put+0x80/0x80 [ 966.954031][T21992] ? __kasan_check_write+0x14/0x20 [ 966.958973][T21992] ? fput+0x15b/0x1b0 [ 966.962794][T21992] ? dev_put+0x80/0x80 [ 966.966697][T21992] bpf_prog_test_run+0x3b0/0x630 [ 966.971473][T21992] ? bpf_prog_query+0x260/0x260 [ 966.976161][T21992] ? selinux_bpf+0xd2/0x100 [ 966.980499][T21992] ? security_bpf+0x82/0xb0 [ 966.984838][T21992] __sys_bpf+0x59f/0x7f0 [ 966.988917][T21992] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 966.994129][T21992] ? bpf_trace_run1+0x240/0x240 [ 966.998812][T21992] __x64_sys_bpf+0x7c/0x90 [ 967.003060][T21992] x64_sys_call+0x87f/0x9a0 [ 967.007402][T21992] do_syscall_64+0x3b/0xb0 [ 967.011651][T21992] ? clear_bhb_loop+0x55/0xb0 [ 967.016164][T21992] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 967.021893][T21992] RIP: 0033:0x7f56d737e819 [ 967.026146][T21992] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 967.045589][T21992] RSP: 002b:00007f56d81fa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 967.053832][T21992] RAX: ffffffffffffffda RBX: 00007f56d7535fa0 RCX: 00007f56d737e819 [ 967.061644][T21992] RDX: 0000000000000050 RSI: 00000000200000c0 RDI: 000000000000000a [ 967.069454][T21992] RBP: 00007f56d73f175e R08: 0000000000000000 R09: 0000000000000000 [ 967.077266][T21992] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 967.085075][T21992] R13: 0000000000000000 R14: 00007f56d7535fa0 R15: 00007ffc3b286528 [ 967.092894][T21992] [ 967.095752][T21992] Modules linked in: [ 967.099628][T21992] ---[ end trace 0000000000000000 ]--- [ 967.104871][T21992] RIP: 0010:dev_map_enqueue+0x31/0x340 [ 967.110199][T21992] Code: 56 41 55 41 54 53 48 83 ec 18 48 89 55 c0 49 89 f7 48 89 fb 49 bc 00 00 00 00 00 fc ff df e8 e6 fb dd ff 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 74 08 48 89 df e8 80 67 25 00 4c 8b 33 48 83 c3 20 [ 967.129630][T21992] RSP: 0018:ffffc900017075f8 EFLAGS: 00010246 [ 967.135507][T21992] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000080000 [ 967.143350][T21992] RDX: ffffc9000f601000 RSI: 000000000000069c RDI: 000000000000069d [ 967.151150][T21992] RBP: ffffc90001707638 R08: ffffffff84145712 R09: ffffffff84145632 [ 967.158977][T21992] R10: 0000000000000004 R11: ffff88811b1ad100 R12: dffffc0000000000 [ 967.166774][T21992] R13: 1ffff1103edc6e15 R14: 1ffff1103edc6e15 R15: ffff888130208070 [ 967.174568][T21992] FS: 00007f56d81fa6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 967.183363][T21992] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 967.189773][T21992] CR2: 0000001b3381fffc CR3: 000000014b38c000 CR4: 00000000003506b0 [ 967.197590][T21992] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 967.205373][T21992] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 967.213220][T21992] Kernel panic - not syncing: Fatal exception in interrupt [ 967.220544][T21992] Kernel Offset: disabled [ 967.224674][T21992] Rebooting in 86400 seconds..