last executing test programs: 29.442532953s ago: executing program 3 (id=14739): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001000000000000000180000001800000002000000000000000020000d02000000000000000000000b090000000000"], 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x34, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000ec0)={&(0x7f0000000d00)=ANY=[@ANYBLOB="88eb010018000000000000000c00f5be0b000008000000000008000000000006ecc5bdc35d41"], &(0x7f0000000dc0)=""/230, 0x18, 0xe6, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000010000000000000000000000711212000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xa3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0xc7) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x1ff) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) close(r0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth1_to_bond\x00', 0x200}) 23.844355615s ago: executing program 3 (id=14739): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001000000000000000180000001800000002000000000000000020000d02000000000000000000000b090000000000"], 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x34, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000b80)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000000000000002be16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f7535f7866907dc6751dfb265a0e3ccae669e17fd6587d452d6453559c3421eed73d56615fe6c54c3b3ffe1b4ce25d7c983c044c03bf3a48dfe47ec9dd6c091c30b93bfae76d9ebacd3ed3e26e7a23129d6606fd28a69989d552af6bda9df2c3af36effff9af2551ce935b0f327cb3f011a7d06602e2fd52347125907000000000000003ed38ae89d24e1cebfba2f87925bfacba83109751fe6c05405d027edd68149ee99eef6a6992308a4fc0b7c70bc677d6dd4aed4af7500d7900a820b6347184e9a217b5614cd50cbe43a1ed2526814bc0000e9e086ce48e90defb6670c3df262ad0a97aec7291c25447c106a99893e10db21901eb397b2f5fd71d20fa7a050fbbef9e326ea27e513e96068fd1e8a43e89f9c85c822a961546ed5363c17ff1432d08806bc376e3e49ee52b59d13182e1f24ed200ada12f7a1525320e716660000000000b02b001500a710eb1affb87ba55b2d72078e9f40b4ae7d01000000d11cd22c35d3294000000000000000000000000000000000000000000000000000000000000000000000000c52f4ebd2c893bb97a068bd10734a83584898eccb26f7b789cfc4cd995fa3e11a5c74c85404e2df3ad37b729ac83b0dcb4f48f3c3356b9997fc455a17690b6f7f9ccbe4b1701941b18a904c0e585a66c3b84b138efc20a546d3d5227e23b03f2a834391ad24fe7d9b20cf92cb151763d41f5c76e2ff3e93ee296c4082ee73e7e197253a2b66c353312c9d75711ce1623e9c54bdff59d2a69dcb7d84c235b23a4480c2461b405cfd1a38992f295ad3adc94cd07c850d1c77a211bfa02c24e9280333152fb794e4ddea02017a6c139b50101caecaf2abc0843b99a96fc4275ad107274e2934a87a4ddcdb112754ca5bdec0ead14b6c0f19a43a2f04c7f0be31491eb8c9ff68236c8600000000000000000000000066e034c81c3cab4e33fc8dc55ce0ada18dcbf31c6e82893add3bee3e10fc873d1d922b0877cbcd95b839d3059d5140a1f742f6e75741e39e5cb6a193e06a1043375b0f61b5d4e17c81baa31b924d84f2243471221c15fa12313ffbfa7c2730302b66a99f66705b71e6205e7cbf3643561eabb9a63fcd604d5cc27e1317ad94cf438d71873e540be16b6ca20508"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000ec0)={&(0x7f0000000d00)=ANY=[@ANYBLOB="88eb010018000000000000000c00f5be0b000008000000000008000000000006ecc5bdc35d41"], &(0x7f0000000dc0)=""/230, 0x18, 0xe6, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000010000000000000000000000711212000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xa3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0xc7) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x1ff) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) close(r0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth1_to_bond\x00', 0x200}) 17.462295555s ago: executing program 3 (id=14739): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001000000000000000180000001800000002000000000000000020000d02000000000000000000000b090000000000"], 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x34, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000ec0)={&(0x7f0000000d00)=ANY=[@ANYBLOB="88eb010018000000000000000c00f5be0b000008000000000008000000000006ecc5bdc35d41"], &(0x7f0000000dc0)=""/230, 0x18, 0xe6, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000010000000000000000000000711212000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xa3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0xc7) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x1ff) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) close(r0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth1_to_bond\x00', 0x200}) 12.212490027s ago: executing program 3 (id=14739): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001000000000000000180000001800000002000000000000000020000d02000000000000000000000b090000000000"], 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x34, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000ec0)={&(0x7f0000000d00)=ANY=[@ANYBLOB="88eb010018000000000000000c00f5be0b000008000000000008000000000006ecc5bdc35d41"], &(0x7f0000000dc0)=""/230, 0x18, 0xe6, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000010000000000000000000000711212000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xa3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0xc7) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x1ff) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) close(r0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth1_to_bond\x00', 0x200}) 9.435872132s ago: executing program 0 (id=15226): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = getpid() bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x14, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001000050802fe76fae9abfe3bc6114dee2559147f2256d9c", @ANYRES32, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r1}, 0x4) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x20001400) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x6, 0x1b, &(0x7f0000000f80)=ANY=[@ANYBLOB="18000000ff7f000000000000060000001811000016325291357cffa9f4fa2f9e55a2068e35ca7d992079010c35f14dfef7ae2fa66c8b40b9683c83433a7c45707bb111ed85a44751c87a6f0dbccf57ef9433ca5b63fe9ec3a69be9a29258f07275b490e6843120294791abfd20533a65727f9bf5718e57e4c43a98e3e5a53d1bbdaa65fa597a914e4ea476e556d12c7fffae20d03b9c9b5232467b91b113e842fa7aecc4065803fd0335cb9261c637fa", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000b96600007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000085000000a100000085000000c20000008520000003000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0xffff, 0x54, &(0x7f0000000c40)=""/84, 0x41000, 0x11, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000cc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x4, 0x6, 0x7}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000d40), &(0x7f0000000d80)=[{0x4, 0x1, 0x5, 0x6}, {0x4, 0x7, 0x4, 0x2}, {0x4, 0x2, 0xc, 0xc}, {0x1, 0x1, 0xc, 0x7}, {0x4, 0x4, 0xd, 0xc}, {0x2, 0x4, 0xe, 0x6}, {0x3, 0x2, 0x9, 0xb}, {0x0, 0x3, 0xe, 0x7}], 0x10, 0x2, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="9feb010018000000000000005400000054000000040000001000000007000006040000000f00000009000000050000000100000005000000d50400000900000000f8ffff0c000000030000000b000000080000000a000000070000000900000000000001000000007f00680000000000b4856e096ebdc7fe2124f6913c41d17a3245eeb070c62f23b379bcfa44a2f51508c3199752a5d7d6dd86c729e0e742"], &(0x7f0000000840)=""/185, 0x70, 0xb9, 0x1, 0x2, 0x0, @void, @value}, 0x28) ioctl$TUNSETOFFLOAD(r4, 0x80047441, 0x2000000c) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x5, 0x2, 0xb, 0x1, 0x0, 0xfffffffffffffffd, 0x8834, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x10000009, 0x4, @perf_config_ext={0xbf42, 0x2}, 0x0, 0x7, 0x3, 0x7, 0x3ee87add, 0x3, 0x3, 0x0, 0xabd, 0x0, 0x1}, r0, 0xc, 0xffffffffffffffff, 0x12) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000780)=""/182, 0xb4, 0xb6, 0x0, 0x1, 0x0, @void, @value}, 0x28) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000040), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x12428, 0x0, 0xffffffff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 8.762201748s ago: executing program 4 (id=15234): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70200001400f400b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x2d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x11, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x4, 0x0, 0x30, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00010000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca7f8fbc9cdfa146ec56175037958e271f60d25b7937f02c8695e5a1b2cdf41dc10d1e8bf076d83923dd29c0301000000010000003d5d58c07fa1f7e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831ab7ea0c34f17e3ad6e70af07da5ceb01b7551ef3bb6220030100dfd8e012e79578e51bc53099e90fbdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f93781965f1328d6704902cbe7bc0476619f28d99cde7a6b73340cc2160a1fe3c184b751c51160fbce841dfebd31a08b32808b80200000000009dd27080e71113610e10d8fb9c2aec61ce63a3462fd50117b89a9ab759b4eeb8cb000066d42b4e54861d0227dbfd2ed8576a3f7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0180aabc18cae2ed4b4390af9a9ceafd07ed0030000002cab154ad029a119ca3c9727ec84222fff0d7216fdb0d3a0ec4bfae563858dc06e7c337642d3e5a815212f5e16c1b30c3a2a71bc85018e5ff2c910496f0dafc9ffc2cc788bee1b47683db01a46939868d75211bbae0e7313bff5d4c391ddece00fc772dd6b4d4d0a917b239fe12280fc92c88c5b8dcdcc22ee1747790a8992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5cc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673fffffff7f23877a6b24db0e067345560942fa1c22015e53fd8a46be933ab460d8629fbef2461c96a08707671215c302fae29187d4f5c06a960fd37c10223fdae7ed04935c3c90d3add8eebc8619d73415e6adcda2130f5011e42e50adab988dd8f12baf5cc9398c88607a08009c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859adfe38f77b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc874b2f663ddeef0005b3d96c7aae73835d5a3cda9e90d76c1993e0799d4894ee7f8249dc1e3428d2129369ee1b85afa1a5b6154eb2eea0d0df414b315f65112412392191fa83ee830548f11e1038debd64cbe359454a3f2239cfe35f81b7ade8a5b859968ff0e90500d0b07c0dd00490f167e6d5c1109681739dc33f75b20428d6474a0a91ee90b8de802c6b538622e6bbcb80f87b415263c401e64ed69a2f75409000000000000001d695c4559b82cabac3cccadc1e1c19af4e03020abf5ff0433d660f20898d2a045d009a0ffb20a77c9af2b80c05184a66d30bbea2ca45a4d6d6d1e6e79aef42355a500587b603306a5af8d867d80a07f10d82eafb03062e95196d5e3ffea0000000000000be959096ea948cfa8e7194123e918914a71ad5a8521fb9553bc60f7d9719b55b3abb6bba3d113a680a8d46fe074c83fbe378a3889e8145b2eaceab05ef932c6e4f8ef0ed0d818a7b76d839cf3c63ebb4380b168c38fa32e49563cfee3a7f0fc18bfa32c418cef875fb49e2989177a1bcd1e30280bc586e79a5dd80701018e7d6e97b3ce267dd4e27b6ef206660090bb2164474cef378f97ca33fc03000000000000001547053453d0c9aec91a24079b21d52fb5516bf0c28ef37aa76442f6083dc99cd61afaf6be45d7b00d3639f2f10ac2d5c759c3e5468f0000000011d415b6b085fb73a2c7c3852e0e658ffeb4e863428a792bee94f6cd895424360e0464f9d7ea425f2fa6aac029d15af607ad83532ff181c985f54b39370c06e63055b4d6a36fa98a44e379d28307c9912fb097601f3f88a2ca6fd1f9320cfe7fc8e9f7f15f02e177ce23f43a154b42e26f037e8a01377cbd3f509e6e540c9ba9c2a589c95d8ad67a65e9a44c576dc24452eaa9d819e2b04bdd1c000000070000000000000000000000005333c6199c12dcd926891927a7267c47cf897853d160100b39b613faefe16bed1fc105dddd77ab929b837d4442d13d5a29179a00837918dd7854aa17eb9fbdc2bdc0e98ae2c3f23a6131e2879f04ff01000030b92dd493be66c2242f8184733b80ba28e8ffffff7f00000000bb2f89049c5f6d63d56995747639964217aacfe548bc869098aa8e07e51dbc9e2d4db3c5f79fd355222ec2a00cf7f2ccd6dd6d2dc2a815d8314221a5472f1318a9dfbec5a759579caf3262129b14e99040b5d91398e17df85c25ccae973eecc7d187168d5c9cd848d566cc17587641ed01889c927da38d83314480b15e23138c5b877a72bd4cf74a299df4fbfc8e6ea96939f15d254d9033c5a45706bda78ab60200000000000000000000000000000000000000706f78f0a2ea9667fb5b951808545a46830970c2dfae01adbda7d29bf1f7abdaf52e0de6f9d7150808ed086642e64ebf98762b34338b80e41b704c3eefaf0bb5ff070000000000000ea15ccc0d7a830b6eb33b6b61675511d693ef5e3c44bbf71cabc5f45c879e7499f8baae2a1a09cf38da73297764fbc0e723e1cc3abb12e3076982ed32c94a2ce3e6f37c47e983da4ca5c96187db5a2a2e1742bc93a65d7187126126b3a80f17dd2f7dbbe82d104ede9ba6925afc2ee6cb94f56f1363cad635abf8f983292c49c0ebf5005154c7b58a3a2a2ea86d2fd92b8661264f781e3fb02d05a28f3f17b64d0258853d45cb5ebde10cd3d82eeed2f1ed925b7cf400304932c5ed0a362b235ce37e1f17700f7d1fecf8be8a2c5d25a9c60657560d05441387ff158a018d19a286c58684a1d2f624c3eb59d509ee89cc2df52881d005b2e5c27563ba54e4153c132d0366aa660000000000000009c1aaec93ec0f925921fb2e9eb202a29bef28224dbabe723de5c584bc398a8792e493048c87f60a51a391e95921218149403558fd13c649f90b0911d57eeb298b590581eba1ce383b539ab80fd15445987b1bb4eb512545e1ab65fef3103ce10b1ee362b51c72f82edf2f502ddf52567775e34a56d1be892f1e62b08950d517fa6fb1b0ef2edf1b67f8644786116b037d4a36fdd30b000063e58c856ec44cbbc2d370553f832af9480215e09aaa3843fe360b1c293a14627f2cfbe278f31d0abc0f5aaa10926dbbfe8a4b131c13a73d4e6d065c2c0fed3ab8442520ce0e0ad7d2d177377ab197ace3ef8b1c24ceb0bdee84bd6e6317633938dd19dc42de7f8f860eca6d9c74525fcd3497526df4c13e3ba5f0d75365a4542ae9440d2fede416d61800aaf7e038879c5d177b3876fda4121e00000100000000003edd3d43cc64e0d26b46907b42e08d000000000000903350932d3eef7fdada20c19807066e3c72d0d816eb9fa50be213bf6bbb7ccb9f2e8a153e6ced68f192ebed6e86af0f2cec7335fa8039fd6eb025440bc2a34d071f0a0e6774308a74748b8cd994ed368695aa2c59869c9200a1306ffa5a71ca69e89a69fc858f37c2c398515a910a35e22ab0573c10b85df4c2972a2fb8b9c080fbb41a753791df727fdeaded2930376eda31312256191c620cce34d1e3bf40a4a207ab1575b399eb8155781bfc7cb5920b49c039935a888d77041894f60fbbcafa487ee96b368e8769da90b44190e569fe8b923c32c288baaca5c5558b5a78bb43e5d9e47a1d5809bb178184b5672d08e29aecf1f572ac1e6cab7e820751e95999b7532603494d37a2bff35a9eec46dfc8a52433f605ebf151c837b4966b5f3628a406175a87e32c5e4268d3000933b580415b162e2946446b8f02554c8a1225217d69d049685dd06aa8528673a9673a723ac414af77f523ad730d00e8700c213f95c87a94f39f506b9e000000000000000000000000000000000000000000000000000090668ac41a1c2a4f7831e6c6a3e9c68ca2c449482bb70a994e71a7f24873848fbb128c820c1de19cc003dfa65a2b296caeb1253802080e08eeb724c4c7b7e052afa19b0f2cd7a13bda4b5a8f3b8fa3ca70bb756a3d529718d5c79d9bdb89e5d33793533211d76d00a45079eff797476106bf76f1fed952a7c9162b88911b5b00c3d26fd2fb4d7b29d1ce025e102d458efd5cca3f3835ce760359eaa01cb13cb28d60e8942fdc02b6824c00dac62f8a2d4c680ae284a82f09d6641921536814b444e4188d9b2e97eb3b108e7876f0f3f3863147ab694218c7cecc075d52d590dddbb57fc6fedf5ec69d7894a7b5c8109f303dab998815c80534b0bd34c49eea63997e56728a8185a8bb6988a7197b87f5548f5edfdfb3efc907fe561b33a6f7c707f7828c6adaf3b2a39929b4b65253e787d65c08aff5e4a9b2267bd8f803ea38f10a6e9c4a49bf23525e08c12d229211fe4d88cf1440f29accfa50f327ac1fb20d7f164100111bd21fca713b2475f1c997f3000000000080c426bcec79c6bc83ce4e6cbb17c01be69db342192d0a716cc24710d23321441f475ec485d642b61c6bd907071dbbe37c0b78f60fd2ad0d13ca62d9d9aafb01c3920b64cb5e023810e2de4327f90c389ce36d90ff9f3cb9d8cd2260d05a8126943a3df17157470595c68ac8df7fea6d42ecb2cdb65b4f2aef0dc4b2de949a6d4ec37f2fd693ae44944041a64fe6336aba1c66b1b95d2edbc40364a049616ae962d75eae619548aa86bd5f0bad56e7ad7de2ee5e6f3b42e3a27094b6b5face99456d9af1926b21d37faf7612d9752cf58e6424decd530b5419e117ec086174439af6ee6c7fdb2d19c9280fa9a02e8fa6a38acfff09050d912635fed175fd06f577d40000000000000000000000000000754bffd73c0888ba8834f20b3acea57b7817663e12c1a5503bc4c13af59bda21688d68698c53ce3aa767657774db09ece7ec888d3af290207d36fa433b35e17dc0f3dc728ea1c633a4ef9e7d9bf81b57492e0544800921d1b751c5fbc163"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55, 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 8.689589615s ago: executing program 0 (id=15235): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYRES32=r0, @ANYRES32, @ANYBLOB="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"], 0x0, 0xbf54, 0x0, 0x0, 0x0, 0x34, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r5}, 0x10) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x4120, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0xf4240, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffbfffff01000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00f5ffffffffffffff00"/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r6}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1400000000000000, &(0x7f0000000100)=@base={0xf, 0x4, 0x4, 0x10004, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) 7.224593279s ago: executing program 3 (id=14739): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001000000000000000180000001800000002000000000000000020000d02000000000000000000000b090000000000"], 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x34, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000ec0)={&(0x7f0000000d00)=ANY=[@ANYBLOB="88eb010018000000000000000c00f5be0b000008000000000008000000000006ecc5bdc35d41"], &(0x7f0000000dc0)=""/230, 0x18, 0xe6, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000010000000000000000000000711212000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xa3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0xc7) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x1ff) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) close(r0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth1_to_bond\x00', 0x200}) 5.184992601s ago: executing program 4 (id=15238): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x1, 0x8, 0x4008, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r1, 0x8982, 0x20000000) 5.184104872s ago: executing program 0 (id=15248): socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffbffffe, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xa}, 0xc020}, 0x0, 0x8, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, &(0x7f0000000540)='memory.stat\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x2a, 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000001a40)}], 0x1, 0x0, 0x18}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x1f, 0x13, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000100000085000000b400000018010000786c6c2500000000002020207b1af8ff00000000bfa1000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0xeafefa69775f6767, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000000008500000018000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 4.941569462s ago: executing program 0 (id=15240): bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000780)={{}, &(0x7f0000000180), &(0x7f0000000400)='%pi6 \x00'}, 0x20) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x2a, &(0x7f0000000100)=r4, 0x4) sendmsg$unix(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000001a40)="c81f3665b988", 0x6}], 0x1, &(0x7f00000002c0)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x18}, 0x0) socketpair(0x2b, 0x2, 0x280, &(0x7f0000001380)) recvmsg(r2, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x1f, 0x13, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000100000085000000b400000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0xa4}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0xd}], {0x95, 0x0, 0x9}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x85, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x52) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000000008500000018000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r5, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x10eb22b000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1f, 0xc, 0x0, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000ecffffffffffffff00"/28], 0x48) 4.854852789s ago: executing program 2 (id=15241): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r1, 0x8982, 0x20000000) 4.72651434s ago: executing program 4 (id=15243): perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a00000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB="0000000000010000000000000000000000000000c269b50903a4bb1ac1dc7e8b8d32fbefde0830731c334c36c858443621c473a92fefba030b988c0d645727928c381b9c1dbdd5060976c89afdee9c7ec2a0ea83005a81029e2f70cc50faa7af7178", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1}}]}}, 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001580)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYBLOB="0200"/20, @ANYRES32=0x0, @ANYRES32=r7, @ANYBLOB="0500"/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x18, 0x22, &(0x7f0000000900)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @generic={0x8, 0x4, 0x9, 0x87, 0x5}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x9}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @alu={0x0, 0x1, 0xd, 0x3, 0x7, 0xfffffffffffffed8, 0xfffffffffffffffc}, @map_val={0x18, 0xad6fabff07c01154, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x8}, @ldst={0x1, 0x2, 0x3, 0x4, 0xb, 0x20, 0x10}], &(0x7f0000000400)='GPL\x00', 0xfffffffe, 0x0, &(0x7f0000000480), 0x41000, 0x31, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f00000004c0)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0xa, 0x4, 0x8001}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000580)=[r4, r6, r5, r1], &(0x7f00000005c0)=[{0x3, 0x5, 0x5}, {0x4, 0x5, 0xc, 0xb}, {0x4, 0x4, 0x0, 0xb}, {0x0, 0x3, 0xa, 0xe}], 0x10, 0xfff, @void, @value}, 0x94) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x891d, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf\xc8>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/14, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000008c0)='page_pool_state_hold\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x15, 0x4, &(0x7f0000000480)=ANY=[@ANYRES8=r0, @ANYRESDEC=r9, @ANYRES32, @ANYRES32], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x24, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='afs_make_fs_call1\x00', r3, 0x0, 0xaea}, 0x18) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r11}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r12, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 4.474555122s ago: executing program 2 (id=15244): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000022020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1fd, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="020000fe030000000400000008000000000000002c81cd6503b0ea00d87f747000677bece41e7793b3b191b670bbc928e490e083093395653dcea7add820a56de57c3e4e4affbb0500ca701f9aad078e40365bff991409d4c4444d09698252b5aedc33a6c4b99af1dc61c51f5851d8eeee5b29fb6a9df848045082a854407750d9a1ea0cc74f20791324c21299fea4a00bd497f0531fc8b0236b39145cbff447371eb9a2245a3b1b3a552f7e5ad8a4e09e69f5f38a146b97c1e4be930945eead69cc", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x3abe, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x1ac81b, 0x0, 0x0, 0x0, 0x1000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8, 0x0, 0x0, 0x1010000}, @initr0, @exit, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0)={0x0, r2}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="1801000000050000000000000000ea0485000000d000000095"], &(0x7f0000000a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x800000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)="efdfb837a5") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000040)=""/155, 0x1000000, 0x9b, 0x1, 0x0, 0x0, @void, @value}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 4.329695514s ago: executing program 4 (id=15245): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014800000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x6, 0x4, 0x5b, 0x8a, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='block_plug\x00', r1, 0x0, 0xfffffffffffffff1}, 0x18) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000180)={r2, r3}, 0xc) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x13, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r5, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000, 0x0, 0x0, 0x47}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{}, &(0x7f0000000000), &(0x7f00000003c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f00000004c0), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x27, 0x5, 0xfeff, &(0x7f0000000ec0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @tracing, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 4.046695758s ago: executing program 0 (id=15247): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0], 0x0, 0x0, &(0x7f00000000c0)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x0, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x7, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}]}, &(0x7f0000000540)='syzkaller\x00', 0x800, 0x98, &(0x7f0000000580)=""/152, 0x41100, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x2, 0x7, 0x2, 0x7}, 0x10, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680), 0x10, 0x6, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000001004a706aa6f18110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0xf5) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000030085000000a8000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1f, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) syz_clone(0x24001100, 0x0, 0x900, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYBLOB="651fc7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000340)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000120000002400000008000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='rss_stat\x00', r8}, 0x10) r10 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r9}, 0x8) write$cgroup_int(r10, &(0x7f00000001c0)=0x8200000000000000, 0xfffffdef) syz_clone(0x403ac400, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r11}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x2, 0x29, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x101}}, @tail_call, @map_val={0x18, 0x3, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xfffffffd}]}, &(0x7f00000003c0)='GPL\x00', 0x1, 0x4, &(0x7f0000000400)=""/4, 0x41100, 0x11, '\x00', r2, @fallback=0x16, r10, 0x8, &(0x7f00000004c0)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x1, 0x1, 0x2, 0x3ff}, 0x10, r3, r11, 0xa, &(0x7f0000000940)=[r0, r10], &(0x7f0000000980)=[{0x1, 0x4, 0xb, 0x4}, {0x4, 0x1, 0x10, 0x3}, {0x5, 0x4, 0x0, 0xa}, {0x0, 0x4, 0xb, 0x1}, {0x4, 0x4, 0x3, 0x9}, {0x1, 0x1, 0x3, 0x7}, {0x4, 0x2, 0x10, 0xb}, {0x3, 0x3, 0x9, 0x3}, {0x5, 0x5, 0xc, 0xa}, {0x3, 0x4, 0x10, 0x4}], 0x10, 0xa, @void, @value}, 0x94) 4.044908548s ago: executing program 4 (id=15250): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70200001400f400b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x2d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x11, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x4, 0x0, 0x30, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55, 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 3.527958561s ago: executing program 2 (id=15251): bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYBLOB="0000000000000000b7080000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r0}, 0x18) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x2, 0x4, 0x6, 0xbaa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)=""/251, &(0x7f0000000000), &(0x7f0000000200), 0xa7c, r1}, 0x38) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x5, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0xb0}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x1c, &(0x7f0000000680)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/user\x00') bpf$PROG_LOAD(0x5, 0x0, 0x5b) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000800)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0xb6, 0xd, &(0x7f0000000740)="ceb00cad9665d008c4d4f248549415945fa1691db2cad1c76b79d7cccc6407bd02a222349f68078f9aae3155f5efc2673c3679f62280a3f0a38d7a0aba9057f36ccd47e56925359ef97b3180943d07191957252a41f196ba48fe88ae1600ec23acb0467c3792a70c102c89232211bd4af6503a3ca85c9d41f48eaca51a3b1b8e1cee26d7788363ea417692a6cfc6caa6904fb0406d3c33f212d394aba23670025cd4a0a7db45d4fff3994f4947d80564b3c44879fdde", &(0x7f0000000600)="08de42d32db8f37ec7e9ebc9cf", 0x0, 0x0, 0x2}, 0x50) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) close(r2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000002c0)) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) write$cgroup_subtree(r2, 0x0, 0x2) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="2d5572ce2b697420"], 0x8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x5452, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x11, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="1802000000000020000000000000000085"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000880)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 3.07495688s ago: executing program 2 (id=15252): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000001e40)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000580)='percpu_alloc_percpu\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x20142, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="076370757375140000000000000969"], 0x17) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001f00000000000000180a000020207025007f3800000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000b70800000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b000059cb17f30cfbbb62108000000000000200"/29, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000ffff0018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x18080, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000000c0)={{}, &(0x7f0000000000), 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x3, 0x0, 0x3, 0x1, 0x0, 0xc}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2e}, @printk={@d, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x17}}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46e93f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) 2.71845903s ago: executing program 1 (id=15253): socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffbffffe, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xa}, 0xc020}, 0x0, 0x8, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, &(0x7f0000000540)='memory.stat\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x2a, 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000001a40)}], 0x1, 0x0, 0x18}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x1f, 0x13, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000100000085000000b400000018010000786c6c2500000000002020207b1af8ff00000000bfa1000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0xeafefa69775f6767, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000000008500000018000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 2.427827035s ago: executing program 1 (id=15254): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYBLOB="0a3f000000a3f500950004000000010045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000080)) 2.282069427s ago: executing program 1 (id=15255): socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffbffffe, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xa}, 0xc020}, 0x0, 0x8, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, &(0x7f0000000540)='memory.stat\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x2a, 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000001a40)}], 0x1, 0x0, 0x18}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x1f, 0x13, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000100000085000000b400000018010000786c6c2500000000002020207b1af8ff00000000bfa1000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0xeafefa69775f6767, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000000008500000018000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 1.53579703s ago: executing program 1 (id=15256): socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffbffffe, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xa}, 0xc020}, 0x0, 0x8, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, &(0x7f0000000540)='memory.stat\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x2a, 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000001a40)}], 0x1, 0x0, 0x18}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x1f, 0x13, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000100000085000000b400000018010000786c6c2500000000002020207b1af8ff00000000bfa1000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0xeafefa69775f6767, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000000008500000018000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 1.363728995s ago: executing program 1 (id=15257): perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a00000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB="0000000000010000000000000000000000000000c269b50903a4bb1ac1dc7e8b8d32fbefde0830731c334c36c858443621c473a92fefba030b988c0d645727928c381b9c1dbdd5060976c89afdee9c7ec2a0ea83005a81029e2f70cc50faa7af7178", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1}}]}}, 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001580)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYBLOB="0200"/20, @ANYRES32=0x0, @ANYRES32=r7, @ANYBLOB="0500"/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x18, 0x22, &(0x7f0000000900)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @generic={0x8, 0x4, 0x9, 0x87, 0x5}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x9}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @alu={0x0, 0x1, 0xd, 0x3, 0x7, 0xfffffffffffffed8, 0xfffffffffffffffc}, @map_val={0x18, 0xad6fabff07c01154, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x8}, @ldst={0x1, 0x2, 0x3, 0x4, 0xb, 0x20, 0x10}], &(0x7f0000000400)='GPL\x00', 0xfffffffe, 0x0, &(0x7f0000000480), 0x41000, 0x31, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f00000004c0)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0xa, 0x4, 0x8001}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000580)=[r4, r6, r5, r1], &(0x7f00000005c0)=[{0x3, 0x5, 0x5}, {0x4, 0x5, 0xc, 0xb}, {0x4, 0x4, 0x0, 0xb}, {0x0, 0x3, 0xa, 0xe}], 0x10, 0xfff, @void, @value}, 0x94) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x891d, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf\xc8>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/14, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000008c0)='page_pool_state_hold\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x15, 0x4, &(0x7f0000000480)=ANY=[@ANYRES8=r0, @ANYRESDEC=r9, @ANYRES32, @ANYRES32], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x24, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='afs_make_fs_call1\x00', r3, 0x0, 0xaea}, 0x18) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r11}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r12, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 1.269272673s ago: executing program 2 (id=15258): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r1, 0x8982, 0x20000000) 557.360463ms ago: executing program 4 (id=15259): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x7, 0x4, 0x4, 0x4, 0xffffffffffffffff, 0xcfe00000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x5, 0x1, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) (async) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@bloom_filter={0x1e, 0x80000001, 0x6, 0x5, 0x0, r0, 0x2a, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2, 0x7, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) ioctl$TUNSETDEBUG(r2, 0x400454c9, &(0x7f00000006c0)=0x40) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x40089000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000030c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) close(0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)=@o_path={&(0x7f0000000000)='./file0\x00', r3}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) 526.678895ms ago: executing program 2 (id=15260): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (fail_nth: 2) 498.561088ms ago: executing program 1 (id=15261): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000022020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1fd, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="020000fe030000000400000008000000000000002c81cd6503b0ea00d87f747000677bece41e7793b3b191b670bbc928e490e083093395653dcea7add820a56de57c3e4e4affbb0500ca701f9aad078e40365bff991409d4c4444d09698252b5aedc33a6c4b99af1dc61c51f5851d8eeee5b29fb6a9df848045082a854407750d9a1ea0cc74f20791324c21299fea4a00bd497f0531fc8b0236b39145cbff447371eb9a2245a3b1b3a552f7e5ad8a4e09e69f5f38a146b97c1e4be930945eead69cc", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x3abe, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x1ac81b, 0x0, 0x0, 0x0, 0x1000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8, 0x0, 0x0, 0x1010000}, @initr0, @exit, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0)={0x0, r2}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="1801000000050000000000000000ea0485000000d000000095"], &(0x7f0000000a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x800000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)="efdfb837a5") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000040)=""/155, 0x1000000, 0x9b, 0x1, 0x0, 0x0, @void, @value}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 114.22866ms ago: executing program 0 (id=15262): perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a00000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB="0000000000010000000000000000000000000000c269b50903a4bb1ac1dc7e8b8d32fbefde0830731c334c36c858443621c473a92fefba030b988c0d645727928c381b9c1dbdd5060976c89afdee9c7ec2a0ea83005a81029e2f70cc50faa7af7178", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1}}]}}, 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001580)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32=r6, @ANYBLOB="0200"/19, @ANYRES32=0x0, @ANYRES32=r7, @ANYBLOB="0500"/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x18, 0x22, &(0x7f0000000900)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @generic={0x8, 0x4, 0x9, 0x87, 0x5}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x9}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @alu={0x0, 0x1, 0xd, 0x3, 0x7, 0xfffffffffffffed8, 0xfffffffffffffffc}, @map_val={0x18, 0xad6fabff07c01154, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x8}, @ldst={0x1, 0x2, 0x3, 0x4, 0xb, 0x20, 0x10}], &(0x7f0000000400)='GPL\x00', 0xfffffffe, 0x0, &(0x7f0000000480), 0x41000, 0x31, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f00000004c0)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0xa, 0x4, 0x8001}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000580)=[r4, r6, r5, r1], &(0x7f00000005c0)=[{0x3, 0x5, 0x5}, {0x4, 0x5, 0xc, 0xb}, {0x4, 0x4, 0x0, 0xb}, {0x0, 0x3, 0xa, 0xe}], 0x10, 0xfff, @void, @value}, 0x94) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x891d, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf\xc8>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/14, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000008c0)='page_pool_state_hold\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x15, 0x4, &(0x7f0000000480)=ANY=[@ANYRES8=r0, @ANYRESDEC=r9, @ANYRES32, @ANYRES32], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x24, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='afs_make_fs_call1\x00', r3, 0x0, 0xaea}, 0x18) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r11}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r12, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 0s ago: executing program 3 (id=14739): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001000000000000000180000001800000002000000000000000020000d02000000000000000000000b090000000000"], 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x34, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000ec0)={&(0x7f0000000d00)=ANY=[@ANYBLOB="88eb010018000000000000000c00f5be0b000008000000000008000000000006ecc5bdc35d41"], &(0x7f0000000dc0)=""/230, 0x18, 0xe6, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000010000000000000000000000711212000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xa3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0xc7) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x1ff) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) close(r0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth1_to_bond\x00', 0x200}) kernel console output (not intermixed with test programs): msg+0x5d3/0x9a0 [ 2122.676092][T15811] ? __sys_sendmsg_sock+0x40/0x40 [ 2122.680952][T15811] __sys_sendmsg+0x2a9/0x390 [ 2122.685373][T15811] ? ____sys_sendmsg+0x9a0/0x9a0 [ 2122.690158][T15811] ? __kasan_check_write+0x14/0x20 [ 2122.695095][T15811] ? mutex_unlock+0xb2/0x260 [ 2122.699698][T15811] ? __kasan_check_write+0x14/0x20 [ 2122.704733][T15811] ? __ia32_sys_read+0x90/0x90 [ 2122.709333][T15811] ? debug_smp_processor_id+0x17/0x20 [ 2122.714626][T15811] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 2122.720530][T15811] __x64_sys_sendmsg+0x7f/0x90 [ 2122.725216][T15811] x64_sys_call+0x16a/0x9a0 [ 2122.729641][T15811] do_syscall_64+0x3b/0xb0 [ 2122.733982][T15811] ? clear_bhb_loop+0x55/0xb0 [ 2122.738493][T15811] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2122.744404][T15811] RIP: 0033:0x7f8d5137dff9 [ 2122.748657][T15811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2122.768316][T15811] RSP: 002b:00007f8d521fd038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2122.776823][T15811] RAX: ffffffffffffffda RBX: 00007f8d51535f80 RCX: 00007f8d5137dff9 [ 2122.784944][T15811] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000004 [ 2122.792830][T15811] RBP: 00007f8d521fd090 R08: 0000000000000000 R09: 0000000000000000 [ 2122.800907][T15811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2122.808814][T15811] R13: 0000000000000000 R14: 00007f8d51535f80 R15: 00007ffeb77c3b78 [ 2122.816630][T15811] [ 2122.961467][T15795] device wg2 entered promiscuous mode [ 2122.971503][T15791] bridge0: port 2(bridge_slave_1) entered blocking state [ 2122.990984][T15791] bridge0: port 2(bridge_slave_1) entered disabled state [ 2122.999536][T15791] device bridge_slave_1 entered promiscuous mode [ 2123.183457][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2123.195938][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2123.288782][T15831] device pim6reg1 entered promiscuous mode [ 2123.303803][T15832] device wg2 left promiscuous mode [ 2123.359798][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2123.379478][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2123.388480][ T315] bridge0: port 1(bridge_slave_0) entered blocking state [ 2123.395448][ T315] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2123.405438][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2123.435563][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2123.443948][ T315] bridge0: port 2(bridge_slave_1) entered blocking state [ 2123.450814][ T315] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2123.457947][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2123.465684][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2123.490374][T15826] device wg2 entered promiscuous mode [ 2123.701994][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2124.005350][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2124.025758][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2124.038455][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2124.052521][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2124.438074][T15791] device veth0_vlan entered promiscuous mode [ 2124.447440][T15856] device pim6reg1 entered promiscuous mode [ 2124.474796][T15791] device veth1_macvtap entered promiscuous mode [ 2124.483249][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2124.491702][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2124.504931][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2124.522753][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2124.531139][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2124.539959][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2124.551721][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2124.647557][T15861] FAULT_INJECTION: forcing a failure. [ 2124.647557][T15861] name failslab, interval 1, probability 0, space 0, times 0 [ 2124.661082][T15861] CPU: 1 PID: 15861 Comm: syz.4.14793 Tainted: G W 6.1.99-syzkaller-00017-g752034bc8702 #0 [ 2124.672279][T15861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 2124.682177][T15861] Call Trace: [ 2124.685290][T15861] [ 2124.688068][T15861] dump_stack_lvl+0x151/0x1b7 [ 2124.692582][T15861] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 2124.697886][T15861] dump_stack+0x15/0x1b [ 2124.701866][T15861] should_fail_ex+0x3d0/0x520 [ 2124.706385][T15861] ? qdisc_alloc+0x7a/0x780 [ 2124.710747][T15861] __should_failslab+0xaf/0xf0 [ 2124.715584][T15861] should_failslab+0x9/0x20 [ 2124.719921][T15861] __kmem_cache_alloc_node+0x3d/0x250 [ 2124.725251][T15861] ? qdisc_alloc+0x7a/0x780 [ 2124.729564][T15861] __kmalloc_node+0xa3/0x1e0 [ 2124.733996][T15861] ? __kasan_check_write+0x14/0x20 [ 2124.738954][T15861] qdisc_alloc+0x7a/0x780 [ 2124.743134][T15861] ? tun_device_event+0x3e5/0xf80 [ 2124.747964][T15861] ? try_module_get+0x12a/0x290 [ 2124.752993][T15861] qdisc_create_dflt+0x6b/0x3e0 [ 2124.757672][T15861] ? _raw_spin_lock+0xa4/0x1b0 [ 2124.762278][T15861] dev_activate+0x2fd/0x1130 [ 2124.766704][T15861] __dev_open+0x3c7/0x4e0 [ 2124.770885][T15861] ? dev_open+0x260/0x260 [ 2124.775042][T15861] ? _raw_spin_unlock_bh+0x50/0x60 [ 2124.780203][T15861] ? dev_set_rx_mode+0x249/0x2d0 [ 2124.785229][T15861] ? __kasan_check_read+0x11/0x20 [ 2124.790183][T15861] __dev_change_flags+0x1db/0x6e0 [ 2124.795125][T15861] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 2124.801717][T15861] ? avc_denied+0x1b0/0x1b0 [ 2124.806076][T15861] ? dev_get_flags+0x1e0/0x1e0 [ 2124.810751][T15861] ? kstrtouint+0xf6/0x180 [ 2124.815089][T15861] dev_change_flags+0x8c/0x1a0 [ 2124.819687][T15861] dev_ifsioc+0x177/0x1150 [ 2124.823940][T15861] ? dev_ioctl+0xe60/0xe60 [ 2124.828407][T15861] ? __mutex_lock_slowpath+0xe/0x10 [ 2124.833634][T15861] ? mutex_lock+0x130/0x1e0 [ 2124.838043][T15861] ? bit_wait_io_timeout+0x120/0x120 [ 2124.843175][T15861] dev_ioctl+0x543/0xe60 [ 2124.847245][T15861] sock_do_ioctl+0x26b/0x450 [ 2124.851669][T15861] ? has_cap_mac_admin+0x3c0/0x3c0 [ 2124.856617][T15861] ? sock_show_fdinfo+0xa0/0xa0 [ 2124.861391][T15861] ? selinux_file_ioctl+0x3cc/0x540 [ 2124.866425][T15861] sock_ioctl+0x455/0x740 [ 2124.870592][T15861] ? sock_poll+0x400/0x400 [ 2124.874858][T15861] ? __fget_files+0x2cb/0x330 [ 2124.879364][T15861] ? security_file_ioctl+0x84/0xb0 [ 2124.884391][T15861] ? sock_poll+0x400/0x400 [ 2124.888654][T15861] __se_sys_ioctl+0x114/0x190 [ 2124.893164][T15861] __x64_sys_ioctl+0x7b/0x90 [ 2124.897587][T15861] x64_sys_call+0x98/0x9a0 [ 2124.901838][T15861] do_syscall_64+0x3b/0xb0 [ 2124.906090][T15861] ? clear_bhb_loop+0x55/0xb0 [ 2124.910601][T15861] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2124.916345][T15861] RIP: 0033:0x7f333757dff9 [ 2124.920585][T15861] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2124.940045][T15861] RSP: 002b:00007f33382a8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2124.948268][T15861] RAX: ffffffffffffffda RBX: 00007f3337735f80 RCX: 00007f333757dff9 [ 2124.956083][T15861] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 000000000000000a [ 2124.963892][T15861] RBP: 00007f33382a8090 R08: 0000000000000000 R09: 0000000000000000 [ 2124.971708][T15861] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2124.979607][T15861] R13: 0000000000000000 R14: 00007f3337735f80 R15: 00007ffd9851ccc8 [ 2124.987743][T15861] [ 2124.992725][T15861] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 2125.000804][T15861] device pim6reg1 entered promiscuous mode [ 2125.009214][T15863] device wg2 left promiscuous mode [ 2125.019573][T15864] device wg2 left promiscuous mode [ 2125.026715][T15866] device wg2 entered promiscuous mode [ 2125.033473][T15865] device wg2 entered promiscuous mode [ 2125.854569][T15884] device wg2 left promiscuous mode [ 2125.867322][T15882] device veth1_macvtap left promiscuous mode [ 2125.877329][T15882] device macsec0 left promiscuous mode [ 2125.901978][T15884] device wg2 entered promiscuous mode [ 2126.467872][T15885] bridge0: port 1(bridge_slave_0) entered blocking state [ 2126.498178][T15885] bridge0: port 1(bridge_slave_0) entered disabled state [ 2126.544043][T15885] device bridge_slave_0 entered promiscuous mode [ 2126.550687][T15904] device pim6reg1 entered promiscuous mode [ 2126.561160][T15882] device veth1_macvtap entered promiscuous mode [ 2126.568862][T15882] device macsec0 entered promiscuous mode [ 2126.585913][T15909] device wg2 left promiscuous mode [ 2126.603136][T15885] bridge0: port 2(bridge_slave_1) entered blocking state [ 2126.610113][T15885] bridge0: port 2(bridge_slave_1) entered disabled state [ 2126.617364][T15885] device bridge_slave_1 entered promiscuous mode [ 2126.626055][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2126.644634][T15907] device wg2 left promiscuous mode [ 2126.760184][T15910] device wg2 entered promiscuous mode [ 2126.779318][T15911] device wg2 entered promiscuous mode [ 2127.048694][T20961] device bridge_slave_1 left promiscuous mode [ 2127.054659][T20961] bridge0: port 2(bridge_slave_1) entered disabled state [ 2127.145570][T20961] device bridge_slave_0 left promiscuous mode [ 2127.219953][T20961] bridge0: port 1(bridge_slave_0) entered disabled state [ 2127.371961][T20961] device veth1_macvtap left promiscuous mode [ 2127.396921][T20961] device veth0_vlan left promiscuous mode [ 2128.215253][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2128.222667][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2128.276078][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2128.314999][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2128.323944][T14583] bridge0: port 1(bridge_slave_0) entered blocking state [ 2128.330842][T14583] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2128.338370][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2128.346550][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2128.355220][T14583] bridge0: port 2(bridge_slave_1) entered blocking state [ 2128.362092][T14583] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2128.370168][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2128.378256][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2128.444367][T15885] device veth0_vlan entered promiscuous mode [ 2128.479227][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2128.578689][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2128.586511][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2128.749160][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2128.756471][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2128.945369][T15885] device veth1_macvtap entered promiscuous mode [ 2129.026813][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2129.057170][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2129.143084][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2129.238775][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2129.246929][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2129.295529][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2129.304009][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2129.353103][T15945] device wg2 left promiscuous mode [ 2129.363844][T15945] device wg2 entered promiscuous mode [ 2130.043656][T20961] device bridge_slave_1 left promiscuous mode [ 2130.075893][T20961] bridge0: port 2(bridge_slave_1) entered disabled state [ 2130.109071][T20961] device bridge_slave_0 left promiscuous mode [ 2130.122630][T20961] bridge0: port 1(bridge_slave_0) entered disabled state [ 2130.176775][T20961] device veth1_macvtap left promiscuous mode [ 2130.216169][T20961] device veth0_vlan left promiscuous mode [ 2130.957877][T15975] device veth1_macvtap entered promiscuous mode [ 2130.975918][T15975] device macsec0 entered promiscuous mode [ 2131.001886][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2131.040168][T15978] device pim6reg1 entered promiscuous mode [ 2131.468561][T15973] bridge0: port 1(bridge_slave_0) entered blocking state [ 2131.619518][T15973] bridge0: port 1(bridge_slave_0) entered disabled state [ 2131.626910][T15973] device bridge_slave_0 entered promiscuous mode [ 2131.751038][T15973] bridge0: port 2(bridge_slave_1) entered blocking state [ 2131.772609][T15973] bridge0: port 2(bridge_slave_1) entered disabled state [ 2131.780218][T15973] device bridge_slave_1 entered promiscuous mode [ 2132.102546][T15997] device pim6reg1 entered promiscuous mode [ 2132.498804][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2132.506128][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2132.718912][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2132.727773][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2132.900948][T14582] bridge0: port 1(bridge_slave_0) entered blocking state [ 2132.907805][T14582] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2132.944045][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2132.954335][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2132.962406][T14582] bridge0: port 2(bridge_slave_1) entered blocking state [ 2132.969249][T14582] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2132.976551][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2132.984615][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2132.992347][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2133.000273][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2133.023122][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2133.033658][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2133.042893][T15973] device veth0_vlan entered promiscuous mode [ 2133.075064][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2133.091254][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2133.098776][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2133.106017][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2133.114262][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2133.122639][T15973] device veth1_macvtap entered promiscuous mode [ 2133.137886][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2133.145773][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2133.158482][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2133.251429][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2133.286026][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2134.138514][T29475] device bridge_slave_1 left promiscuous mode [ 2134.144915][T29475] bridge0: port 2(bridge_slave_1) entered disabled state [ 2134.152210][T29475] device bridge_slave_0 left promiscuous mode [ 2134.158214][T29475] bridge0: port 1(bridge_slave_0) entered disabled state [ 2134.165561][T29475] device veth1_macvtap left promiscuous mode [ 2134.171418][T29475] device veth0_vlan left promiscuous mode [ 2135.186127][T16041] bridge0: port 1(bridge_slave_0) entered blocking state [ 2135.261270][T16041] bridge0: port 1(bridge_slave_0) entered disabled state [ 2135.409888][T16041] device bridge_slave_0 entered promiscuous mode [ 2135.562858][T16041] bridge0: port 2(bridge_slave_1) entered blocking state [ 2135.708253][T16041] bridge0: port 2(bridge_slave_1) entered disabled state [ 2135.715559][T16041] device bridge_slave_1 entered promiscuous mode [ 2137.337092][T16080] device veth1_macvtap left promiscuous mode [ 2137.344221][T16080] device macsec0 left promiscuous mode [ 2137.362315][T16082] device veth0_vlan left promiscuous mode [ 2137.412533][T16082] device veth0_vlan entered promiscuous mode [ 2137.548735][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2137.560783][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2137.571571][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2137.587630][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2137.597061][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2137.683323][T16080] device veth1_macvtap entered promiscuous mode [ 2137.692320][T16080] device macsec0 entered promiscuous mode [ 2137.891746][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2137.903100][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2137.911564][T14582] bridge0: port 1(bridge_slave_0) entered blocking state [ 2137.918601][T14582] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2137.925835][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2137.933996][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2137.941964][T14582] bridge0: port 2(bridge_slave_1) entered blocking state [ 2137.948810][T14582] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2137.956166][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2137.964104][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2137.971960][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2137.979900][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2138.198621][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2138.380369][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2138.421795][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2138.577079][T16041] device veth0_vlan entered promiscuous mode [ 2138.636668][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2138.658937][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2138.766627][T16041] device veth1_macvtap entered promiscuous mode [ 2138.848312][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2138.864579][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2138.885380][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2138.895404][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2138.903640][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2138.925329][T16102] device veth1_macvtap left promiscuous mode [ 2138.933038][T16102] device macsec0 left promiscuous mode [ 2138.969970][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2138.986899][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2138.995234][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2139.023476][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2139.048187][T16102] device veth1_macvtap entered promiscuous mode [ 2139.060186][T16102] device macsec0 entered promiscuous mode [ 2139.215622][T16111] device wg2 left promiscuous mode [ 2139.231659][T16111] device wg2 entered promiscuous mode [ 2139.807922][T16114] device bridge0 entered promiscuous mode [ 2140.158709][T29475] device bridge_slave_1 left promiscuous mode [ 2140.164816][T29475] bridge0: port 2(bridge_slave_1) entered disabled state [ 2140.172182][T29475] device bridge_slave_0 left promiscuous mode [ 2140.178136][T29475] bridge0: port 1(bridge_slave_0) entered disabled state [ 2140.185633][T29475] device veth1_macvtap left promiscuous mode [ 2140.191495][T29475] device veth0_vlan left promiscuous mode [ 2140.490898][T16132] bridge0: port 1(bridge_slave_0) entered blocking state [ 2140.497942][T16132] bridge0: port 1(bridge_slave_0) entered disabled state [ 2140.505720][T16132] device bridge_slave_0 entered promiscuous mode [ 2140.513259][T16132] bridge0: port 2(bridge_slave_1) entered blocking state [ 2140.520446][T16132] bridge0: port 2(bridge_slave_1) entered disabled state [ 2140.528418][T16132] device bridge_slave_1 entered promiscuous mode [ 2140.536513][T16130] device wg2 left promiscuous mode [ 2140.604198][T16130] device wg2 entered promiscuous mode [ 2140.755804][T16132] bridge0: port 2(bridge_slave_1) entered blocking state [ 2140.762848][T16132] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2140.770731][T16132] bridge0: port 1(bridge_slave_0) entered blocking state [ 2140.777501][T16132] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2140.928895][T16143] device wg2 left promiscuous mode [ 2141.070900][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2141.078597][ T315] bridge0: port 1(bridge_slave_0) entered disabled state [ 2141.087847][ T315] bridge0: port 2(bridge_slave_1) entered disabled state [ 2141.131842][T16143] device wg2 entered promiscuous mode [ 2141.300056][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2141.352648][T28493] bridge0: port 1(bridge_slave_0) entered blocking state [ 2141.359530][T28493] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2141.420536][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2141.471495][T28493] bridge0: port 2(bridge_slave_1) entered blocking state [ 2141.478375][T28493] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2141.577201][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2141.591026][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2141.605550][T16168] device pim6reg1 entered promiscuous mode [ 2141.613696][T16167] device wg2 left promiscuous mode [ 2141.624683][T16169] device veth0_vlan left promiscuous mode [ 2141.640703][T16169] device veth0_vlan entered promiscuous mode [ 2141.673998][T16132] device veth0_vlan entered promiscuous mode [ 2141.681131][T16172] device wg2 entered promiscuous mode [ 2141.687557][T16171] device pim6reg1 entered promiscuous mode [ 2141.699235][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2141.714024][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2141.724834][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2141.734916][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2141.762640][T16132] device veth1_macvtap entered promiscuous mode [ 2141.769000][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2141.776187][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2141.783846][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2141.791866][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2141.801327][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2141.955236][T16186] FAULT_INJECTION: forcing a failure. [ 2141.955236][T16186] name failslab, interval 1, probability 0, space 0, times 0 [ 2141.998049][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2142.008837][T16186] CPU: 0 PID: 16186 Comm: syz.2.14886 Tainted: G W 6.1.99-syzkaller-00017-g752034bc8702 #0 [ 2142.020015][T16186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 2142.029910][T16186] Call Trace: [ 2142.033031][T16186] [ 2142.035895][T16186] dump_stack_lvl+0x151/0x1b7 [ 2142.040412][T16186] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 2142.045794][T16186] ? avc_has_perm_noaudit+0x430/0x430 [ 2142.051006][T16186] dump_stack+0x15/0x1b [ 2142.054995][T16186] should_fail_ex+0x3d0/0x520 [ 2142.059594][T16186] ? __request_module+0x28c/0x8d0 [ 2142.064453][T16186] __should_failslab+0xaf/0xf0 [ 2142.069061][T16186] should_failslab+0x9/0x20 [ 2142.073393][T16186] __kmem_cache_alloc_node+0x3d/0x250 [ 2142.078686][T16186] ? __request_module+0x28c/0x8d0 [ 2142.083547][T16186] kmalloc_trace+0x2a/0xa0 [ 2142.087798][T16186] ? dev_load+0x5b/0xb0 [ 2142.091795][T16186] __request_module+0x28c/0x8d0 [ 2142.096568][T16186] ? capable+0x78/0xe0 [ 2142.100474][T16186] ? _trace_android_vh_delayacct_wpcopy_end+0x120/0x120 [ 2142.107255][T16186] ? security_capable+0x87/0xb0 [ 2142.111933][T16186] dev_load+0x5b/0xb0 [ 2142.115747][T16186] dev_ioctl+0x52c/0xe60 [ 2142.119834][T16186] sock_do_ioctl+0x26b/0x450 [ 2142.124341][T16186] ? has_cap_mac_admin+0x3c0/0x3c0 [ 2142.129292][T16186] ? sock_show_fdinfo+0xa0/0xa0 [ 2142.133977][T16186] ? selinux_file_ioctl+0x3cc/0x540 [ 2142.139010][T16186] sock_ioctl+0x455/0x740 [ 2142.143176][T16186] ? sock_poll+0x400/0x400 [ 2142.147430][T16186] ? __fget_files+0x2cb/0x330 [ 2142.151951][T16186] ? security_file_ioctl+0x84/0xb0 [ 2142.156887][T16186] ? sock_poll+0x400/0x400 [ 2142.161142][T16186] __se_sys_ioctl+0x114/0x190 [ 2142.165665][T16186] __x64_sys_ioctl+0x7b/0x90 [ 2142.170081][T16186] x64_sys_call+0x98/0x9a0 [ 2142.174333][T16186] do_syscall_64+0x3b/0xb0 [ 2142.178590][T16186] ? clear_bhb_loop+0x55/0xb0 [ 2142.183098][T16186] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2142.188853][T16186] RIP: 0033:0x7fd8f597dff9 [ 2142.193083][T16186] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2142.212527][T16186] RSP: 002b:00007fd8f6719038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2142.220767][T16186] RAX: ffffffffffffffda RBX: 00007fd8f5b36058 RCX: 00007fd8f597dff9 [ 2142.228762][T16186] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 000000000000000a [ 2142.236575][T16186] RBP: 00007fd8f6719090 R08: 0000000000000000 R09: 0000000000000000 [ 2142.244389][T16186] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2142.252209][T16186] R13: 0000000000000000 R14: 00007fd8f5b36058 R15: 00007ffda8031c48 [ 2142.260013][T16186] [ 2142.279631][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2142.318031][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2142.326534][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2142.443656][T16186] device pim6reg1 entered promiscuous mode [ 2142.764659][T16207] device veth1_macvtap left promiscuous mode [ 2142.773736][T16207] device macsec0 left promiscuous mode [ 2142.916516][T16207] device veth1_macvtap entered promiscuous mode [ 2142.929390][T16207] device macsec0 entered promiscuous mode [ 2143.258568][T29475] device bridge_slave_1 left promiscuous mode [ 2143.264549][T29475] bridge0: port 2(bridge_slave_1) entered disabled state [ 2143.271950][T29475] device bridge_slave_0 left promiscuous mode [ 2143.278263][T29475] bridge0: port 1(bridge_slave_0) entered disabled state [ 2143.285860][T29475] device veth1_macvtap left promiscuous mode [ 2143.291753][T29475] device veth0_vlan left promiscuous mode [ 2143.724826][T16215] device wg2 left promiscuous mode [ 2143.868452][T16225] device wg2 entered promiscuous mode [ 2143.876684][T16216] device veth0_vlan left promiscuous mode [ 2143.887216][T16216] device veth0_vlan entered promiscuous mode [ 2144.079467][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2144.087513][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2144.168431][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2144.248245][T16239] FAULT_INJECTION: forcing a failure. [ 2144.248245][T16239] name failslab, interval 1, probability 0, space 0, times 0 [ 2144.326680][T16242] FAULT_INJECTION: forcing a failure. [ 2144.326680][T16242] name failslab, interval 1, probability 0, space 0, times 0 [ 2144.370598][T16242] CPU: 0 PID: 16242 Comm: syz.2.14902 Tainted: G W 6.1.99-syzkaller-00017-g752034bc8702 #0 [ 2144.381895][T16242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 2144.391784][T16242] Call Trace: [ 2144.394908][T16242] [ 2144.397684][T16242] dump_stack_lvl+0x151/0x1b7 [ 2144.402199][T16242] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 2144.407493][T16242] ? avc_has_perm_noaudit+0x430/0x430 [ 2144.412718][T16242] dump_stack+0x15/0x1b [ 2144.416731][T16242] should_fail_ex+0x3d0/0x520 [ 2144.421210][T16242] ? __request_module+0x28c/0x8d0 [ 2144.426155][T16242] __should_failslab+0xaf/0xf0 [ 2144.430753][T16242] should_failslab+0x9/0x20 [ 2144.435104][T16242] __kmem_cache_alloc_node+0x3d/0x250 [ 2144.440312][T16242] ? __request_module+0x28c/0x8d0 [ 2144.445161][T16242] kmalloc_trace+0x2a/0xa0 [ 2144.449431][T16242] ? dev_load+0x5b/0xb0 [ 2144.453443][T16242] __request_module+0x28c/0x8d0 [ 2144.458094][T16242] ? capable+0x78/0xe0 [ 2144.462000][T16242] ? _trace_android_vh_delayacct_wpcopy_end+0x120/0x120 [ 2144.468772][T16242] ? security_capable+0x87/0xb0 [ 2144.473455][T16242] dev_load+0x5b/0xb0 [ 2144.477275][T16242] dev_ioctl+0x52c/0xe60 [ 2144.481454][T16242] sock_do_ioctl+0x26b/0x450 [ 2144.485880][T16242] ? has_cap_mac_admin+0x3c0/0x3c0 [ 2144.490813][T16242] ? sock_show_fdinfo+0xa0/0xa0 [ 2144.495505][T16242] ? selinux_file_ioctl+0x3cc/0x540 [ 2144.500539][T16242] sock_ioctl+0x455/0x740 [ 2144.504792][T16242] ? sock_poll+0x400/0x400 [ 2144.509043][T16242] ? __fget_files+0x2cb/0x330 [ 2144.513557][T16242] ? security_file_ioctl+0x84/0xb0 [ 2144.518520][T16242] ? sock_poll+0x400/0x400 [ 2144.522840][T16242] __se_sys_ioctl+0x114/0x190 [ 2144.527358][T16242] __x64_sys_ioctl+0x7b/0x90 [ 2144.531784][T16242] x64_sys_call+0x98/0x9a0 [ 2144.536120][T16242] do_syscall_64+0x3b/0xb0 [ 2144.540374][T16242] ? clear_bhb_loop+0x55/0xb0 [ 2144.545116][T16242] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2144.550844][T16242] RIP: 0033:0x7fd8f597dff9 [ 2144.555089][T16242] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2144.574619][T16242] RSP: 002b:00007fd8f6719038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2144.582863][T16242] RAX: ffffffffffffffda RBX: 00007fd8f5b36058 RCX: 00007fd8f597dff9 [ 2144.590683][T16242] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000008 [ 2144.598750][T16242] RBP: 00007fd8f6719090 R08: 0000000000000000 R09: 0000000000000000 [ 2144.606557][T16242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2144.614454][T16242] R13: 0000000000000000 R14: 00007fd8f5b36058 R15: 00007ffda8031c48 [ 2144.622277][T16242] [ 2144.625133][T16239] CPU: 1 PID: 16239 Comm: syz.0.14901 Tainted: G W 6.1.99-syzkaller-00017-g752034bc8702 #0 [ 2144.636339][T16239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 2144.646228][T16239] Call Trace: [ 2144.649348][T16239] [ 2144.652128][T16239] dump_stack_lvl+0x151/0x1b7 [ 2144.656641][T16239] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 2144.661933][T16239] ? __stack_depot_save+0x36/0x480 [ 2144.666965][T16239] dump_stack+0x15/0x1b [ 2144.670962][T16239] should_fail_ex+0x3d0/0x520 [ 2144.675475][T16239] ? dup_task_struct+0x5a/0x7d0 [ 2144.680158][T16239] __should_failslab+0xaf/0xf0 [ 2144.684769][T16239] should_failslab+0x9/0x20 [ 2144.689546][T16239] kmem_cache_alloc_node+0x3e/0x2d0 [ 2144.694649][T16239] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 2144.699614][T16239] dup_task_struct+0x5a/0x7d0 [ 2144.704196][T16239] ? __kasan_check_write+0x14/0x20 [ 2144.709145][T16239] copy_process+0x5c3/0x3530 [ 2144.713597][T16239] ? __kasan_check_write+0x14/0x20 [ 2144.718559][T16239] ? proc_fail_nth_write+0x20b/0x290 [ 2144.724183][T16239] ? selinux_file_permission+0x2bb/0x560 [ 2144.729827][T16239] ? proc_fail_nth_read+0x210/0x210 [ 2144.734857][T16239] ? fsnotify_perm+0x6a/0x5b0 [ 2144.739381][T16239] ? idle_dummy+0x10/0x10 [ 2144.743652][T16239] ? vfs_write+0x952/0xed0 [ 2144.747876][T16239] ? __kasan_slab_free+0x11/0x20 [ 2144.752973][T16239] kernel_clone+0x229/0x890 [ 2144.757247][T16239] ? __kasan_check_write+0x14/0x20 [ 2144.762718][T16239] ? mutex_unlock+0xb2/0x260 [ 2144.767173][T16239] ? create_io_thread+0x180/0x180 [ 2144.772120][T16239] __x64_sys_clone+0x231/0x280 [ 2144.777431][T16239] ? __do_sys_vfork+0x110/0x110 [ 2144.782572][T16239] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 2144.788545][T16239] ? exit_to_user_mode_prepare+0x39/0xa0 [ 2144.794015][T16239] x64_sys_call+0x1b0/0x9a0 [ 2144.798350][T16239] do_syscall_64+0x3b/0xb0 [ 2144.802793][T16239] ? clear_bhb_loop+0x55/0xb0 [ 2144.807465][T16239] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2144.813194][T16239] RIP: 0033:0x7f8d5137dff9 [ 2144.817444][T16239] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2144.837010][T16239] RSP: 002b:00007f8d521fcfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2144.845278][T16239] RAX: ffffffffffffffda RBX: 00007f8d51535f80 RCX: 00007f8d5137dff9 [ 2144.853241][T16239] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008020000 [ 2144.862019][T16239] RBP: 00007f8d521fd090 R08: 0000000000000000 R09: 0000000000000000 [ 2144.869817][T16239] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2144.877650][T16239] R13: 0000000000000000 R14: 00007f8d51535f80 R15: 00007ffeb77c3b78 [ 2144.885630][T16239] [ 2144.890339][T16242] device pim6reg1 entered promiscuous mode [ 2145.009972][T16227] bridge0: port 1(bridge_slave_0) entered blocking state [ 2145.161810][T16227] bridge0: port 1(bridge_slave_0) entered disabled state [ 2145.235699][T16227] device bridge_slave_0 entered promiscuous mode [ 2145.315018][T16227] bridge0: port 2(bridge_slave_1) entered blocking state [ 2145.322067][T16227] bridge0: port 2(bridge_slave_1) entered disabled state [ 2145.329726][T16227] device bridge_slave_1 entered promiscuous mode [ 2145.338932][T16262] device pim6reg1 entered promiscuous mode [ 2145.539153][T16227] bridge0: port 2(bridge_slave_1) entered blocking state [ 2145.546004][T16227] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2145.577571][T16272] device wg2 left promiscuous mode [ 2145.712140][T16281] device wg2 entered promiscuous mode [ 2145.844791][ T315] bridge0: port 2(bridge_slave_1) entered disabled state [ 2145.870159][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2145.943994][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2146.213633][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2146.224335][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2146.233045][T15432] bridge0: port 1(bridge_slave_0) entered blocking state [ 2146.240356][T15432] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2146.248424][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2146.256854][T15432] bridge0: port 2(bridge_slave_1) entered blocking state [ 2146.264914][T15432] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2146.296877][T16303] device pim6reg1 entered promiscuous mode [ 2146.315021][T16227] device veth0_vlan entered promiscuous mode [ 2146.322564][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2146.330643][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2146.338778][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2146.354972][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2146.365650][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2146.387658][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2146.401184][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2146.413502][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2146.422135][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2146.429625][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2146.455579][T16227] device veth1_macvtap entered promiscuous mode [ 2146.516408][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2146.528884][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2146.632183][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2146.814652][T16317] FAULT_INJECTION: forcing a failure. [ 2146.814652][T16317] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2146.828916][T16317] CPU: 0 PID: 16317 Comm: syz.4.14927 Tainted: G W 6.1.99-syzkaller-00017-g752034bc8702 #0 [ 2146.840372][T16317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 2146.850258][T16317] Call Trace: [ 2146.853381][T16317] [ 2146.856158][T16317] dump_stack_lvl+0x151/0x1b7 [ 2146.860674][T16317] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 2146.865976][T16317] dump_stack+0x15/0x1b [ 2146.869966][T16317] should_fail_ex+0x3d0/0x520 [ 2146.874473][T16317] should_fail+0xb/0x10 [ 2146.878466][T16317] should_fail_usercopy+0x1a/0x20 [ 2146.883327][T16317] _copy_from_user+0x1e/0xc0 [ 2146.887759][T16317] __tun_chr_ioctl+0x28c/0x22d0 [ 2146.892444][T16317] ? tun_flow_create+0x320/0x320 [ 2146.897395][T16317] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 2146.903377][T16317] ? avc_has_extended_perms+0xa7e/0x10f0 [ 2146.908855][T16317] tun_chr_ioctl+0x2a/0x40 [ 2146.913184][T16317] ? tun_chr_poll+0x670/0x670 [ 2146.917824][T16317] __se_sys_ioctl+0x114/0x190 [ 2146.922503][T16317] __x64_sys_ioctl+0x7b/0x90 [ 2146.926931][T16317] x64_sys_call+0x98/0x9a0 [ 2146.931182][T16317] do_syscall_64+0x3b/0xb0 [ 2146.935490][T16317] ? clear_bhb_loop+0x55/0xb0 [ 2146.939962][T16317] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2146.945675][T16317] RIP: 0033:0x7f333757dff9 [ 2146.949928][T16317] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2146.969804][T16317] RSP: 002b:00007f33382a8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2146.978047][T16317] RAX: ffffffffffffffda RBX: 00007f3337735f80 RCX: 00007f333757dff9 [ 2146.986222][T16317] RDX: 00000000200000c0 RSI: 00000000400454ca RDI: 0000000000000009 [ 2146.994133][T16317] RBP: 00007f33382a8090 R08: 0000000000000000 R09: 0000000000000000 [ 2147.001926][T16317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2147.009747][T16317] R13: 0000000000000000 R14: 00007f3337735f80 R15: 00007ffd9851ccc8 [ 2147.017555][T16317] [ 2147.039489][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2147.051381][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2147.060129][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2147.076786][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2148.158658][T29475] device bridge_slave_1 left promiscuous mode [ 2148.164665][T29475] bridge0: port 2(bridge_slave_1) entered disabled state [ 2148.171965][T29475] device bridge_slave_0 left promiscuous mode [ 2148.177955][T29475] bridge0: port 1(bridge_slave_0) entered disabled state [ 2148.185794][T29475] device veth1_macvtap left promiscuous mode [ 2148.191689][T29475] device veth0_vlan left promiscuous mode [ 2148.952336][T16363] syz.2.14939[16363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2148.952409][T16363] syz.2.14939[16363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2149.071041][T16370] FAULT_INJECTION: forcing a failure. [ 2149.071041][T16370] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2149.208689][T16370] CPU: 1 PID: 16370 Comm: syz.2.14943 Tainted: G W 6.1.99-syzkaller-00017-g752034bc8702 #0 [ 2149.219895][T16370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 2149.229783][T16370] Call Trace: [ 2149.233008][T16370] [ 2149.235778][T16370] dump_stack_lvl+0x151/0x1b7 [ 2149.240289][T16370] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 2149.245582][T16370] ? _kstrtol+0x150/0x150 [ 2149.250159][T16370] ? avc_has_perm_noaudit+0x348/0x430 [ 2149.255362][T16370] dump_stack+0x15/0x1b [ 2149.259361][T16370] should_fail_ex+0x3d0/0x520 [ 2149.263874][T16370] should_fail+0xb/0x10 [ 2149.267865][T16370] should_fail_usercopy+0x1a/0x20 [ 2149.272852][T16370] strncpy_from_user+0x24/0x2b0 [ 2149.277536][T16370] bpf_prog_load+0x1fb/0x1bf0 [ 2149.282280][T16370] ? map_freeze+0x3a0/0x3a0 [ 2149.286615][T16370] ? selinux_bpf+0xcb/0x100 [ 2149.290957][T16370] ? security_bpf+0x82/0xb0 [ 2149.295289][T16370] __sys_bpf+0x52c/0x7f0 [ 2149.299366][T16370] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2149.304579][T16370] ? __ia32_sys_read+0x90/0x90 [ 2149.309186][T16370] ? debug_smp_processor_id+0x17/0x20 [ 2149.314394][T16370] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 2149.320396][T16370] __x64_sys_bpf+0x7c/0x90 [ 2149.324631][T16370] x64_sys_call+0x87f/0x9a0 [ 2149.328963][T16370] do_syscall_64+0x3b/0xb0 [ 2149.333302][T16370] ? clear_bhb_loop+0x55/0xb0 [ 2149.337938][T16370] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2149.343696][T16370] RIP: 0033:0x7fd8f597dff9 [ 2149.347886][T16370] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2149.367762][T16370] RSP: 002b:00007fd8f673a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2149.376097][T16370] RAX: ffffffffffffffda RBX: 00007fd8f5b35f80 RCX: 00007fd8f597dff9 [ 2149.383919][T16370] RDX: 0000000000000094 RSI: 00000000200000c0 RDI: 0000000000000005 [ 2149.391814][T16370] RBP: 00007fd8f673a090 R08: 0000000000000000 R09: 0000000000000000 [ 2149.399618][T16370] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2149.407427][T16370] R13: 0000000000000000 R14: 00007fd8f5b35f80 R15: 00007ffda8031c48 [ 2149.415242][T16370] [ 2149.473599][T16364] device veth1_macvtap left promiscuous mode [ 2149.479838][T16364] device macsec0 left promiscuous mode [ 2149.556003][T16359] bridge0: port 1(bridge_slave_0) entered blocking state [ 2149.568122][T16359] bridge0: port 1(bridge_slave_0) entered disabled state [ 2149.575465][T16359] device bridge_slave_0 entered promiscuous mode [ 2149.611470][T16359] bridge0: port 2(bridge_slave_1) entered blocking state [ 2149.661757][T16359] bridge0: port 2(bridge_slave_1) entered disabled state [ 2149.728704][T16359] device bridge_slave_1 entered promiscuous mode [ 2149.806912][T16387] device syzkaller0 entered promiscuous mode [ 2150.072622][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2150.080893][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2150.099577][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2150.107714][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2150.174768][T28493] bridge0: port 1(bridge_slave_0) entered blocking state [ 2150.181826][T28493] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2150.297706][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2150.375642][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2150.503355][T28493] bridge0: port 2(bridge_slave_1) entered blocking state [ 2150.510254][T28493] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2150.679446][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2150.687411][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2150.788917][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2150.801855][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2150.881937][T16359] device veth0_vlan entered promiscuous mode [ 2150.888377][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2150.990492][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2151.076922][T16411] device veth1_macvtap left promiscuous mode [ 2151.137950][T16411] device macsec0 left promiscuous mode [ 2151.426661][T16359] device veth1_macvtap entered promiscuous mode [ 2151.435357][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2151.444986][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2151.452572][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2151.466405][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2151.488336][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2151.495795][T16425] device veth1_macvtap entered promiscuous mode [ 2151.502392][T16425] device macsec0 entered promiscuous mode [ 2151.627869][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2151.640554][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2151.663656][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2151.728998][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2151.757552][T16436] FAULT_INJECTION: forcing a failure. [ 2151.757552][T16436] name failslab, interval 1, probability 0, space 0, times 0 [ 2151.771391][T16436] CPU: 1 PID: 16436 Comm: syz.4.14963 Tainted: G W 6.1.99-syzkaller-00017-g752034bc8702 #0 [ 2151.782600][T16436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 2151.792996][T16436] Call Trace: [ 2151.796215][T16436] [ 2151.799082][T16436] dump_stack_lvl+0x151/0x1b7 [ 2151.803689][T16436] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 2151.809227][T16436] dump_stack+0x15/0x1b [ 2151.813215][T16436] should_fail_ex+0x3d0/0x520 [ 2151.817729][T16436] ? security_inode_alloc+0x29/0x120 [ 2151.822849][T16436] __should_failslab+0xaf/0xf0 [ 2151.827543][T16436] should_failslab+0x9/0x20 [ 2151.831886][T16436] kmem_cache_alloc+0x3b/0x2c0 [ 2151.836478][T16436] security_inode_alloc+0x29/0x120 [ 2151.841512][T16436] inode_init_always+0x720/0x970 [ 2151.847417][T16436] ? sockfs_init_fs_context+0xb0/0xb0 [ 2151.852617][T16436] new_inode_pseudo+0x98/0x1d0 [ 2151.857219][T16436] __sock_create+0x135/0x760 [ 2151.861753][T16436] ? __sock_create+0xd/0x760 [ 2151.866148][T16436] __sys_socketpair+0x29f/0x6e0 [ 2151.870837][T16436] ? __ia32_sys_socket+0x90/0x90 [ 2151.875613][T16436] ? debug_smp_processor_id+0x17/0x20 [ 2151.880819][T16436] __x64_sys_socketpair+0x9b/0xb0 [ 2151.885773][T16436] x64_sys_call+0x19b/0x9a0 [ 2151.890111][T16436] do_syscall_64+0x3b/0xb0 [ 2151.894364][T16436] ? clear_bhb_loop+0x55/0xb0 [ 2151.898884][T16436] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2151.904606][T16436] RIP: 0033:0x7f333757dff9 [ 2151.908863][T16436] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2151.928400][T16436] RSP: 002b:00007f33382a8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 2151.936633][T16436] RAX: ffffffffffffffda RBX: 00007f3337735f80 RCX: 00007f333757dff9 [ 2151.944445][T16436] RDX: 0000000000000300 RSI: 000000000008000a RDI: 0000000000000011 [ 2151.952277][T16436] RBP: 00007f33382a8090 R08: 0000000000000000 R09: 0000000000000000 [ 2151.960068][T16436] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 2151.967883][T16436] R13: 0000000000000000 R14: 00007f3337735f80 R15: 00007ffd9851ccc8 [ 2151.975696][T16436] [ 2151.981979][T16436] socket: no more sockets [ 2152.556165][T16455] FAULT_INJECTION: forcing a failure. [ 2152.556165][T16455] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2152.569240][T16455] CPU: 1 PID: 16455 Comm: syz.0.14968 Tainted: G W 6.1.99-syzkaller-00017-g752034bc8702 #0 [ 2152.580943][T16455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 2152.590837][T16455] Call Trace: [ 2152.593956][T16455] [ 2152.596734][T16455] dump_stack_lvl+0x151/0x1b7 [ 2152.601259][T16455] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 2152.606670][T16455] dump_stack+0x15/0x1b [ 2152.610662][T16455] should_fail_ex+0x3d0/0x520 [ 2152.615176][T16455] should_fail+0xb/0x10 [ 2152.619169][T16455] should_fail_usercopy+0x1a/0x20 [ 2152.624032][T16455] copy_page_from_iter_atomic+0x349/0x10b0 [ 2152.629674][T16455] ? shmem_get_folio+0xa0/0xa0 [ 2152.634274][T16455] ? __kasan_check_write+0x14/0x20 [ 2152.639216][T16455] ? pipe_zero+0x220/0x220 [ 2152.643471][T16455] ? shmem_write_begin+0x1f0/0x3a0 [ 2152.648417][T16455] ? __kasan_check_write+0x14/0x20 [ 2152.653363][T16455] ? shmem_writepage+0xe00/0xe00 [ 2152.658136][T16455] generic_perform_write+0x369/0x5c0 [ 2152.663259][T16455] ? generic_file_direct_write+0x6b0/0x6b0 [ 2152.668899][T16455] ? __file_remove_privs+0x640/0x640 [ 2152.674019][T16455] ? generic_write_checks+0x138/0x1c0 [ 2152.679228][T16455] __generic_file_write_iter+0x174/0x3a0 [ 2152.684697][T16455] generic_file_write_iter+0xb1/0x310 [ 2152.689907][T16455] vfs_write+0xaf6/0xed0 [ 2152.694001][T16455] ? __kasan_slab_free+0x11/0x20 [ 2152.698757][T16455] ? file_end_write+0x1c0/0x1c0 [ 2152.703443][T16455] ? mutex_lock+0xb1/0x1e0 [ 2152.707697][T16455] ? bit_wait_io_timeout+0x120/0x120 [ 2152.712996][T16455] ? __fdget_pos+0x2e2/0x390 [ 2152.717416][T16455] ? ksys_write+0x77/0x2c0 [ 2152.721781][T16455] ksys_write+0x199/0x2c0 [ 2152.725935][T16455] ? __this_cpu_preempt_check+0x13/0x20 [ 2152.731310][T16455] ? __ia32_sys_read+0x90/0x90 [ 2152.735997][T16455] ? debug_smp_processor_id+0x17/0x20 [ 2152.741288][T16455] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 2152.747192][T16455] __x64_sys_write+0x7b/0x90 [ 2152.751612][T16455] x64_sys_call+0x2f/0x9a0 [ 2152.755874][T16455] do_syscall_64+0x3b/0xb0 [ 2152.760127][T16455] ? clear_bhb_loop+0x55/0xb0 [ 2152.764632][T16455] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2152.770362][T16455] RIP: 0033:0x7f8d5137dff9 [ 2152.774617][T16455] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2152.794245][T16455] RSP: 002b:00007f8d521dc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2152.802566][T16455] RAX: ffffffffffffffda RBX: 00007f8d51536058 RCX: 00007f8d5137dff9 [ 2152.810491][T16455] RDX: 0000000020000992 RSI: 0000000020000980 RDI: 0000000000000005 [ 2152.818312][T16455] RBP: 00007f8d521dc090 R08: 0000000000000000 R09: 0000000000000000 [ 2152.826222][T16455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2152.834035][T16455] R13: 0000000000000000 R14: 00007f8d51536058 R15: 00007ffeb77c3b78 [ 2152.841852][T16455] [ 2153.158636][T29475] device bridge_slave_1 left promiscuous mode [ 2153.164564][T29475] bridge0: port 2(bridge_slave_1) entered disabled state [ 2153.171928][T29475] device bridge_slave_0 left promiscuous mode [ 2153.177851][T29475] bridge0: port 1(bridge_slave_0) entered disabled state [ 2153.185662][T29475] device veth1_macvtap left promiscuous mode [ 2153.191546][T29475] device veth0_vlan left promiscuous mode [ 2153.651496][T16468] device veth1_macvtap left promiscuous mode [ 2153.657449][T16468] device macsec0 left promiscuous mode [ 2153.676608][T16485] FAULT_INJECTION: forcing a failure. [ 2153.676608][T16485] name failslab, interval 1, probability 0, space 0, times 0 [ 2153.696089][T16485] CPU: 0 PID: 16485 Comm: syz.0.14978 Tainted: G W 6.1.99-syzkaller-00017-g752034bc8702 #0 [ 2153.707377][T16485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 2153.717544][T16485] Call Trace: [ 2153.720653][T16485] [ 2153.723429][T16485] dump_stack_lvl+0x151/0x1b7 [ 2153.727946][T16485] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 2153.733237][T16485] dump_stack+0x15/0x1b [ 2153.737317][T16485] should_fail_ex+0x3d0/0x520 [ 2153.741830][T16485] ? security_inode_alloc+0x29/0x120 [ 2153.747042][T16485] __should_failslab+0xaf/0xf0 [ 2153.751733][T16485] should_failslab+0x9/0x20 [ 2153.756068][T16485] kmem_cache_alloc+0x3b/0x2c0 [ 2153.760670][T16485] security_inode_alloc+0x29/0x120 [ 2153.765639][T16485] inode_init_always+0x720/0x970 [ 2153.770387][T16485] ? sockfs_init_fs_context+0xb0/0xb0 [ 2153.775591][T16485] new_inode_pseudo+0x98/0x1d0 [ 2153.780195][T16485] __sock_create+0x135/0x760 [ 2153.784747][T16485] __sys_socketpair+0x29f/0x6e0 [ 2153.789406][T16485] ? __ia32_sys_socket+0x90/0x90 [ 2153.794177][T16485] ? __ia32_sys_read+0x90/0x90 [ 2153.798788][T16485] ? debug_smp_processor_id+0x17/0x20 [ 2153.803995][T16485] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 2153.809947][T16468] device veth1_macvtap entered promiscuous mode [ 2153.810064][T16485] __x64_sys_socketpair+0x9b/0xb0 [ 2153.810090][T16485] x64_sys_call+0x19b/0x9a0 [ 2153.810110][T16485] do_syscall_64+0x3b/0xb0 [ 2153.810126][T16485] ? clear_bhb_loop+0x55/0xb0 [ 2153.810146][T16485] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2153.810165][T16485] RIP: 0033:0x7f8d5137dff9 [ 2153.810180][T16485] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2153.810201][T16485] RSP: 002b:00007f8d521fd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 2153.810221][T16485] RAX: ffffffffffffffda RBX: 00007f8d51535f80 RCX: 00007f8d5137dff9 [ 2153.810234][T16485] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2153.810246][T16485] RBP: 00007f8d521fd090 R08: 0000000000000000 R09: 0000000000000000 [ 2153.810258][T16485] R10: 00000000200006c0 R11: 0000000000000246 R12: 0000000000000001 [ 2153.810270][T16485] R13: 0000000000000000 R14: 00007f8d51535f80 R15: 00007ffeb77c3b78 [ 2153.810287][T16485] [ 2153.938560][T16485] socket: no more sockets [ 2153.947900][T16468] device macsec0 entered promiscuous mode [ 2154.033693][T16496] device syzkaller0 entered promiscuous mode [ 2154.040913][T16474] bridge0: port 1(bridge_slave_0) entered blocking state [ 2154.047908][T16474] bridge0: port 1(bridge_slave_0) entered disabled state [ 2154.056958][T16474] device bridge_slave_0 entered promiscuous mode [ 2154.110582][T16474] bridge0: port 2(bridge_slave_1) entered blocking state [ 2154.117452][T16474] bridge0: port 2(bridge_slave_1) entered disabled state [ 2154.124968][T16474] device bridge_slave_1 entered promiscuous mode [ 2154.147802][T16498] device wg2 left promiscuous mode [ 2154.174477][T16503] device wg2 entered promiscuous mode [ 2154.629684][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2154.637015][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2154.750191][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2154.770231][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2154.782445][ T325] bridge0: port 1(bridge_slave_0) entered blocking state [ 2154.789309][ T325] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2154.802316][T16520] cgroup: fork rejected by pids controller in /syz1 [ 2154.898183][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2154.948654][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2155.029442][ T325] bridge0: port 2(bridge_slave_1) entered blocking state [ 2155.036302][ T325] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2155.115800][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2155.159472][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2155.185591][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2155.206725][T16632] device veth1_macvtap left promiscuous mode [ 2155.216973][T16632] device macsec0 left promiscuous mode [ 2155.424301][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2155.442669][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2155.519057][T16650] FAULT_INJECTION: forcing a failure. [ 2155.519057][T16650] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2155.527689][T16474] device veth0_vlan entered promiscuous mode [ 2155.548131][T16650] CPU: 1 PID: 16650 Comm: syz.2.14997 Tainted: G W 6.1.99-syzkaller-00017-g752034bc8702 #0 [ 2155.559419][T16650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 2155.569319][T16650] Call Trace: [ 2155.572434][T16650] [ 2155.575214][T16650] dump_stack_lvl+0x151/0x1b7 [ 2155.579739][T16650] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 2155.585131][T16650] ? vfs_write+0x952/0xed0 [ 2155.589359][T16650] ? __kasan_slab_free+0x11/0x20 [ 2155.594191][T16650] dump_stack+0x15/0x1b [ 2155.598131][T16650] should_fail_ex+0x3d0/0x520 [ 2155.602640][T16650] should_fail+0xb/0x10 [ 2155.606633][T16650] should_fail_usercopy+0x1a/0x20 [ 2155.608976][T16644] device syzkaller0 entered promiscuous mode [ 2155.611489][T16650] _copy_from_user+0x1e/0xc0 [ 2155.621734][T16650] __sys_bpf+0x23b/0x7f0 [ 2155.625825][T16650] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2155.631022][T16650] ? __ia32_sys_read+0x90/0x90 [ 2155.635629][T16650] ? debug_smp_processor_id+0x17/0x20 [ 2155.640828][T16650] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 2155.646740][T16650] __x64_sys_bpf+0x7c/0x90 [ 2155.650997][T16650] x64_sys_call+0x87f/0x9a0 [ 2155.655327][T16650] do_syscall_64+0x3b/0xb0 [ 2155.659573][T16650] ? clear_bhb_loop+0x55/0xb0 [ 2155.664086][T16650] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2155.669824][T16650] RIP: 0033:0x7fd8f597dff9 [ 2155.674154][T16650] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2155.693781][T16650] RSP: 002b:00007fd8f673a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2155.702030][T16650] RAX: ffffffffffffffda RBX: 00007fd8f5b35f80 RCX: 00007fd8f597dff9 [ 2155.709826][T16650] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 2155.717644][T16650] RBP: 00007fd8f673a090 R08: 0000000000000000 R09: 0000000000000000 [ 2155.725450][T16650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2155.733260][T16650] R13: 0000000000000000 R14: 00007fd8f5b35f80 R15: 00007ffda8031c48 [ 2155.741229][T16650] [ 2155.768786][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2155.776658][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2155.796049][T16531] device veth1_macvtap entered promiscuous mode [ 2155.818634][T16531] device macsec0 entered promiscuous mode [ 2155.827436][T16474] device veth1_macvtap entered promiscuous mode [ 2155.865525][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2155.890223][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2155.897572][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2155.923618][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2155.938330][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2156.007815][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2156.018734][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2156.026833][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2156.035105][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2156.041187][T16661] FAULT_INJECTION: forcing a failure. [ 2156.041187][T16661] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2156.056177][T16661] CPU: 0 PID: 16661 Comm: syz.4.15000 Tainted: G W 6.1.99-syzkaller-00017-g752034bc8702 #0 [ 2156.067362][T16661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 2156.077345][T16661] Call Trace: [ 2156.080468][T16661] [ 2156.083247][T16661] dump_stack_lvl+0x151/0x1b7 [ 2156.087760][T16661] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 2156.093055][T16661] dump_stack+0x15/0x1b [ 2156.097044][T16661] should_fail_ex+0x3d0/0x520 [ 2156.101568][T16661] should_fail+0xb/0x10 [ 2156.105554][T16661] should_fail_usercopy+0x1a/0x20 [ 2156.110412][T16661] copy_page_from_iter_atomic+0x349/0x10b0 [ 2156.116053][T16661] ? shmem_get_folio+0xa0/0xa0 [ 2156.120652][T16661] ? __kasan_check_write+0x14/0x20 [ 2156.125687][T16661] ? pipe_zero+0x220/0x220 [ 2156.129937][T16661] ? shmem_write_begin+0x1f0/0x3a0 [ 2156.134902][T16661] ? __kasan_check_write+0x14/0x20 [ 2156.139839][T16661] ? shmem_writepage+0xe00/0xe00 [ 2156.144706][T16661] generic_perform_write+0x369/0x5c0 [ 2156.149820][T16661] ? generic_file_direct_write+0x6b0/0x6b0 [ 2156.155575][T16661] ? __file_remove_privs+0x640/0x640 [ 2156.160723][T16661] ? generic_write_checks+0x138/0x1c0 [ 2156.165902][T16661] __generic_file_write_iter+0x174/0x3a0 [ 2156.171383][T16661] generic_file_write_iter+0xb1/0x310 [ 2156.176581][T16661] vfs_write+0xaf6/0xed0 [ 2156.180659][T16661] ? __kasan_slab_free+0x11/0x20 [ 2156.185436][T16661] ? file_end_write+0x1c0/0x1c0 [ 2156.190123][T16661] ? mutex_lock+0xb1/0x1e0 [ 2156.194368][T16661] ? bit_wait_io_timeout+0x120/0x120 [ 2156.199490][T16661] ? __fdget_pos+0x2e2/0x390 [ 2156.203913][T16661] ? ksys_write+0x77/0x2c0 [ 2156.208296][T16661] ksys_write+0x199/0x2c0 [ 2156.212449][T16661] ? __this_cpu_preempt_check+0x13/0x20 [ 2156.217839][T16661] ? __ia32_sys_read+0x90/0x90 [ 2156.222520][T16661] ? debug_smp_processor_id+0x17/0x20 [ 2156.228198][T16661] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 2156.234097][T16661] __x64_sys_write+0x7b/0x90 [ 2156.238523][T16661] x64_sys_call+0x2f/0x9a0 [ 2156.243233][T16661] do_syscall_64+0x3b/0xb0 [ 2156.247577][T16661] ? clear_bhb_loop+0x55/0xb0 [ 2156.252257][T16661] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2156.257988][T16661] RIP: 0033:0x7f333757dff9 [ 2156.262236][T16661] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2156.281683][T16661] RSP: 002b:00007f33373ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2156.289935][T16661] RAX: ffffffffffffffda RBX: 00007f3337736058 RCX: 00007f333757dff9 [ 2156.297745][T16661] RDX: 0000000020000992 RSI: 0000000020000980 RDI: 0000000000000005 [ 2156.305545][T16661] RBP: 00007f33373ff090 R08: 0000000000000000 R09: 0000000000000000 [ 2156.313359][T16661] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2156.321177][T16661] R13: 0000000000000000 R14: 00007f3337736058 R15: 00007ffd9851ccc8 [ 2156.329174][T16661] [ 2156.402957][T16652] bridge0: port 1(bridge_slave_0) entered blocking state [ 2156.409957][T16652] bridge0: port 1(bridge_slave_0) entered disabled state [ 2156.417363][T16652] device bridge_slave_0 entered promiscuous mode [ 2156.425286][T16652] bridge0: port 2(bridge_slave_1) entered blocking state [ 2156.432208][T16652] bridge0: port 2(bridge_slave_1) entered disabled state [ 2156.439795][T16652] device bridge_slave_1 entered promiscuous mode [ 2156.480679][T16652] bridge0: port 2(bridge_slave_1) entered blocking state [ 2156.488054][T16652] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2156.495090][T16652] bridge0: port 1(bridge_slave_0) entered blocking state [ 2156.502017][T16652] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2156.520447][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2156.528233][ T325] bridge0: port 1(bridge_slave_0) entered disabled state [ 2156.535263][ T325] bridge0: port 2(bridge_slave_1) entered disabled state [ 2156.551204][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2156.559677][T14583] bridge0: port 1(bridge_slave_0) entered blocking state [ 2156.566499][T14583] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2156.573907][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2156.581993][T14583] bridge0: port 2(bridge_slave_1) entered blocking state [ 2156.588866][T14583] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2156.596384][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2156.604253][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2156.620745][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2156.630160][T16652] device veth0_vlan entered promiscuous mode [ 2156.638184][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2156.645934][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2156.653696][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2156.664922][T16652] device veth1_macvtap entered promiscuous mode [ 2156.671759][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2156.682441][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2156.694677][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2156.798637][T29475] device veth1_macvtap left promiscuous mode [ 2156.804462][T29475] device veth0_vlan left promiscuous mode [ 2157.551312][T29475] device bridge_slave_1 left promiscuous mode [ 2157.568213][T29475] bridge0: port 2(bridge_slave_1) entered disabled state [ 2157.576132][T29475] device bridge_slave_0 left promiscuous mode [ 2157.583660][T29475] bridge0: port 1(bridge_slave_0) entered disabled state [ 2157.596659][T29475] device veth1_macvtap left promiscuous mode [ 2157.602739][T29475] device veth0_vlan left promiscuous mode [ 2158.254260][T16690] device wg2 entered promiscuous mode [ 2158.711265][T16699] device wg2 left promiscuous mode [ 2158.832283][T16672] bridge0: port 1(bridge_slave_0) entered blocking state [ 2158.926267][T16672] bridge0: port 1(bridge_slave_0) entered disabled state [ 2159.000074][T16672] device bridge_slave_0 entered promiscuous mode [ 2159.137097][T16672] bridge0: port 2(bridge_slave_1) entered blocking state [ 2159.148980][T16672] bridge0: port 2(bridge_slave_1) entered disabled state [ 2159.156585][T16672] device bridge_slave_1 entered promiscuous mode [ 2159.163664][T16716] device wg2 entered promiscuous mode [ 2160.519943][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2160.527205][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2160.535001][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2160.543538][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2160.551882][ T325] bridge0: port 1(bridge_slave_0) entered blocking state [ 2160.558741][ T325] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2160.592834][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2160.600730][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2160.608948][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2160.616924][T28965] bridge0: port 2(bridge_slave_1) entered blocking state [ 2160.623780][T28965] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2160.727057][T16672] device veth0_vlan entered promiscuous mode [ 2160.733801][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2160.742561][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2160.751362][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2160.758892][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2160.766133][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2160.776694][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2160.784604][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2160.808938][T16672] device veth1_macvtap entered promiscuous mode [ 2160.840703][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2160.848944][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2160.856972][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2160.865446][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2160.873703][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2161.588561][ T8] device bridge_slave_1 left promiscuous mode [ 2161.594565][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 2161.601874][ T8] device bridge_slave_0 left promiscuous mode [ 2161.607780][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 2161.615428][ T8] device veth1_macvtap left promiscuous mode [ 2161.621271][ T8] device veth0_vlan left promiscuous mode [ 2162.163688][T16744] FAULT_INJECTION: forcing a failure. [ 2162.163688][T16744] name failslab, interval 1, probability 0, space 0, times 0 [ 2162.278631][T16744] CPU: 0 PID: 16744 Comm: syz.2.15022 Tainted: G W 6.1.99-syzkaller-00017-g752034bc8702 #0 [ 2162.289838][T16744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 2162.299819][T16744] Call Trace: [ 2162.302954][T16744] [ 2162.305718][T16744] dump_stack_lvl+0x151/0x1b7 [ 2162.310244][T16744] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 2162.315533][T16744] dump_stack+0x15/0x1b [ 2162.319521][T16744] should_fail_ex+0x3d0/0x520 [ 2162.324031][T16744] ? security_inode_alloc+0x29/0x120 [ 2162.329287][T16744] __should_failslab+0xaf/0xf0 [ 2162.333979][T16744] should_failslab+0x9/0x20 [ 2162.338316][T16744] kmem_cache_alloc+0x3b/0x2c0 [ 2162.342915][T16744] security_inode_alloc+0x29/0x120 [ 2162.347862][T16744] inode_init_always+0x720/0x970 [ 2162.352634][T16744] ? sockfs_init_fs_context+0xb0/0xb0 [ 2162.357844][T16744] new_inode_pseudo+0x98/0x1d0 [ 2162.362530][T16744] __sock_create+0x135/0x760 [ 2162.366956][T16744] __sys_socketpair+0x29f/0x6e0 [ 2162.371652][T16744] ? __ia32_sys_socket+0x90/0x90 [ 2162.376411][T16744] ? __ia32_sys_read+0x90/0x90 [ 2162.381017][T16744] ? debug_smp_processor_id+0x17/0x20 [ 2162.386223][T16744] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 2162.392126][T16744] __x64_sys_socketpair+0x9b/0xb0 [ 2162.396987][T16744] x64_sys_call+0x19b/0x9a0 [ 2162.401324][T16744] do_syscall_64+0x3b/0xb0 [ 2162.405578][T16744] ? clear_bhb_loop+0x55/0xb0 [ 2162.410104][T16744] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2162.415823][T16744] RIP: 0033:0x7fd8f597dff9 [ 2162.420075][T16744] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2162.439517][T16744] RSP: 002b:00007fd8f673a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 2162.447760][T16744] RAX: ffffffffffffffda RBX: 00007fd8f5b35f80 RCX: 00007fd8f597dff9 [ 2162.455574][T16744] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2162.463384][T16744] RBP: 00007fd8f673a090 R08: 0000000000000000 R09: 0000000000000000 [ 2162.471193][T16744] R10: 00000000200006c0 R11: 0000000000000246 R12: 0000000000000001 [ 2162.479095][T16744] R13: 0000000000000000 R14: 00007fd8f5b35f80 R15: 00007ffda8031c48 [ 2162.486904][T16744] [ 2162.490045][T16751] FAULT_INJECTION: forcing a failure. [ 2162.490045][T16751] name failslab, interval 1, probability 0, space 0, times 0 [ 2162.492312][T16744] socket: no more sockets [ 2162.502553][T16751] CPU: 1 PID: 16751 Comm: syz.1.15024 Tainted: G W 6.1.99-syzkaller-00017-g752034bc8702 #0 [ 2162.517887][T16751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 2162.527793][T16751] Call Trace: [ 2162.530908][T16751] [ 2162.533687][T16751] dump_stack_lvl+0x151/0x1b7 [ 2162.538218][T16751] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 2162.543576][T16751] ? __stack_depot_save+0x36/0x480 [ 2162.548530][T16751] dump_stack+0x15/0x1b [ 2162.552524][T16751] should_fail_ex+0x3d0/0x520 [ 2162.557028][T16751] ? dup_task_struct+0x5a/0x7d0 [ 2162.561715][T16751] __should_failslab+0xaf/0xf0 [ 2162.566316][T16751] should_failslab+0x9/0x20 [ 2162.570656][T16751] kmem_cache_alloc_node+0x3e/0x2d0 [ 2162.575694][T16751] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 2162.580637][T16751] dup_task_struct+0x5a/0x7d0 [ 2162.585148][T16751] ? __kasan_check_write+0x14/0x20 [ 2162.590097][T16751] copy_process+0x5c3/0x3530 [ 2162.594536][T16751] ? __kasan_check_write+0x14/0x20 [ 2162.599475][T16751] ? proc_fail_nth_write+0x20b/0x290 [ 2162.604593][T16751] ? selinux_file_permission+0x2bb/0x560 [ 2162.610060][T16751] ? proc_fail_nth_read+0x210/0x210 [ 2162.615092][T16751] ? fsnotify_perm+0x6a/0x5b0 [ 2162.619811][T16751] ? idle_dummy+0x10/0x10 [ 2162.623949][T16751] ? vfs_write+0x952/0xed0 [ 2162.628199][T16751] ? __kasan_slab_free+0x11/0x20 [ 2162.633059][T16751] kernel_clone+0x229/0x890 [ 2162.637401][T16751] ? __kasan_check_write+0x14/0x20 [ 2162.642349][T16751] ? mutex_unlock+0xb2/0x260 [ 2162.646773][T16751] ? create_io_thread+0x180/0x180 [ 2162.651642][T16751] __x64_sys_clone+0x231/0x280 [ 2162.656236][T16751] ? __do_sys_vfork+0x110/0x110 [ 2162.660929][T16751] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 2162.666824][T16751] ? exit_to_user_mode_prepare+0x39/0xa0 [ 2162.672293][T16751] x64_sys_call+0x1b0/0x9a0 [ 2162.676632][T16751] do_syscall_64+0x3b/0xb0 [ 2162.680882][T16751] ? clear_bhb_loop+0x55/0xb0 [ 2162.685398][T16751] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2162.691125][T16751] RIP: 0033:0x7fc79a37dff9 [ 2162.695379][T16751] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2162.715347][T16751] RSP: 002b:00007fc79b240fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2162.723591][T16751] RAX: ffffffffffffffda RBX: 00007fc79a535f80 RCX: 00007fc79a37dff9 [ 2162.731403][T16751] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008020000 [ 2162.739217][T16751] RBP: 00007fc79b241090 R08: 0000000000000000 R09: 0000000000000000 [ 2162.747028][T16751] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2162.754839][T16751] R13: 0000000000000000 R14: 00007fc79a535f80 R15: 00007ffd43091538 [ 2162.762659][T16751] [ 2162.776326][T16738] device wg2 left promiscuous mode [ 2162.795179][T16743] device wg2 left promiscuous mode [ 2162.806165][T16746] device wg2 entered promiscuous mode [ 2162.813605][T16747] device wg2 entered promiscuous mode [ 2162.964174][T16764] device wg2 left promiscuous mode [ 2163.038247][T16765] device wg2 left promiscuous mode [ 2163.078694][T16768] device wg2 entered promiscuous mode [ 2163.104993][T16771] device wg2 entered promiscuous mode [ 2163.145024][T16750] bridge0: port 1(bridge_slave_0) entered blocking state [ 2163.168077][T16750] bridge0: port 1(bridge_slave_0) entered disabled state [ 2163.175544][T16750] device bridge_slave_0 entered promiscuous mode [ 2163.190703][T16750] bridge0: port 2(bridge_slave_1) entered blocking state [ 2163.197615][T16750] bridge0: port 2(bridge_slave_1) entered disabled state [ 2163.205110][T16750] device bridge_slave_1 entered promiscuous mode [ 2163.366649][T16750] bridge0: port 2(bridge_slave_1) entered blocking state [ 2163.373518][T16750] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2163.380627][T16750] bridge0: port 1(bridge_slave_0) entered blocking state [ 2163.387410][T16750] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2163.457239][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2163.465210][T28965] bridge0: port 1(bridge_slave_0) entered disabled state [ 2163.472588][T28965] bridge0: port 2(bridge_slave_1) entered disabled state [ 2163.761872][T16796] device wg2 left promiscuous mode [ 2163.780167][T16803] device wg2 entered promiscuous mode [ 2163.789464][T16800] device wg2 left promiscuous mode [ 2163.869844][T16807] device wg2 entered promiscuous mode [ 2163.876247][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2163.891816][T28965] bridge0: port 1(bridge_slave_0) entered blocking state [ 2163.898802][T28965] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2163.909000][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2163.917250][T28965] bridge0: port 2(bridge_slave_1) entered blocking state [ 2163.924144][T28965] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2163.939462][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2163.947545][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2163.961333][T16809] device wg2 left promiscuous mode [ 2164.126624][T16750] device veth0_vlan entered promiscuous mode [ 2164.159943][T16815] device wg2 entered promiscuous mode [ 2164.166010][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2164.176084][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2164.184960][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2164.203529][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2164.228266][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2164.236337][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2164.245275][T16750] device veth1_macvtap entered promiscuous mode [ 2164.343621][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2164.351912][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2164.360337][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2164.377034][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2164.386266][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2164.486165][T16830] device veth0_vlan left promiscuous mode [ 2164.698552][T16830] device veth0_vlan entered promiscuous mode [ 2165.368659][T29475] device bridge_slave_1 left promiscuous mode [ 2165.374747][T29475] bridge0: port 2(bridge_slave_1) entered disabled state [ 2165.382203][T29475] device bridge_slave_0 left promiscuous mode [ 2165.388577][T29475] bridge0: port 1(bridge_slave_0) entered disabled state [ 2165.396388][T29475] device veth1_macvtap left promiscuous mode [ 2165.402330][T29475] device veth0_vlan left promiscuous mode [ 2166.460065][T16843] device wg2 left promiscuous mode [ 2166.560493][T16851] device wg2 entered promiscuous mode [ 2166.768750][T16854] bridge0: port 1(bridge_slave_0) entered blocking state [ 2166.775640][T16854] bridge0: port 1(bridge_slave_0) entered disabled state [ 2166.878751][T16854] device bridge_slave_0 entered promiscuous mode [ 2166.956162][T16860] device wg2 left promiscuous mode [ 2167.004611][T16866] device wg2 entered promiscuous mode [ 2167.012293][T16854] bridge0: port 2(bridge_slave_1) entered blocking state [ 2167.062094][T16854] bridge0: port 2(bridge_slave_1) entered disabled state [ 2167.147858][T16854] device bridge_slave_1 entered promiscuous mode [ 2167.178472][T16849] device veth1_macvtap entered promiscuous mode [ 2167.187248][T16849] device macsec0 entered promiscuous mode [ 2167.232144][T16874] device wg2 left promiscuous mode [ 2167.247032][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2167.456838][T16874] device wg2 entered promiscuous mode [ 2168.397288][T16903] FAULT_INJECTION: forcing a failure. [ 2168.397288][T16903] name failslab, interval 1, probability 0, space 0, times 0 [ 2168.418067][T16903] CPU: 1 PID: 16903 Comm: syz.2.15073 Tainted: G W 6.1.99-syzkaller-00017-g752034bc8702 #0 [ 2168.429278][T16903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 2168.439247][T16903] Call Trace: [ 2168.442367][T16903] [ 2168.445144][T16903] dump_stack_lvl+0x151/0x1b7 [ 2168.449661][T16903] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 2168.454965][T16903] dump_stack+0x15/0x1b [ 2168.459074][T16903] should_fail_ex+0x3d0/0x520 [ 2168.463559][T16903] ? prepare_creds+0x2f/0x6a0 [ 2168.468062][T16903] __should_failslab+0xaf/0xf0 [ 2168.472657][T16903] should_failslab+0x9/0x20 [ 2168.477120][T16903] kmem_cache_alloc+0x3b/0x2c0 [ 2168.481719][T16903] ? __kasan_check_write+0x14/0x20 [ 2168.486667][T16903] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 2168.492146][T16903] prepare_creds+0x2f/0x6a0 [ 2168.496473][T16903] ? memcpy+0x56/0x70 [ 2168.500296][T16903] copy_creds+0xf0/0x630 [ 2168.504371][T16903] copy_process+0x855/0x3530 [ 2168.508823][T16903] ? __kasan_check_write+0x14/0x20 [ 2168.513753][T16903] ? proc_fail_nth_write+0x20b/0x290 [ 2168.518864][T16903] ? proc_fail_nth_read+0x210/0x210 [ 2168.523983][T16903] ? fsnotify_perm+0x6a/0x5b0 [ 2168.528506][T16903] ? idle_dummy+0x10/0x10 [ 2168.532664][T16903] ? vfs_write+0x952/0xed0 [ 2168.536914][T16903] ? __kasan_slab_free+0x11/0x20 [ 2168.541694][T16903] kernel_clone+0x229/0x890 [ 2168.546050][T16903] ? __kasan_check_write+0x14/0x20 [ 2168.550979][T16903] ? mutex_unlock+0xb2/0x260 [ 2168.555403][T16903] ? create_io_thread+0x180/0x180 [ 2168.560535][T16903] __x64_sys_clone+0x231/0x280 [ 2168.565140][T16903] ? __do_sys_vfork+0x110/0x110 [ 2168.569824][T16903] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 2168.575723][T16903] ? exit_to_user_mode_prepare+0x39/0xa0 [ 2168.581183][T16903] x64_sys_call+0x1b0/0x9a0 [ 2168.585666][T16903] do_syscall_64+0x3b/0xb0 [ 2168.589869][T16903] ? clear_bhb_loop+0x55/0xb0 [ 2168.594385][T16903] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2168.600123][T16903] RIP: 0033:0x7fd8f597dff9 [ 2168.604376][T16903] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2168.623988][T16903] RSP: 002b:00007fd8f6739fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2168.632231][T16903] RAX: ffffffffffffffda RBX: 00007fd8f5b35f80 RCX: 00007fd8f597dff9 [ 2168.640042][T16903] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000024001000 [ 2168.647860][T16903] RBP: 00007fd8f673a090 R08: 0000000000000000 R09: 0000000000000000 [ 2168.655664][T16903] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2168.663472][T16903] R13: 0000000000000000 R14: 00007fd8f5b35f80 R15: 00007ffda8031c48 [ 2168.671308][T16903] [ 2168.719541][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2168.726767][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2168.761887][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2168.770531][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2168.778870][ T325] bridge0: port 1(bridge_slave_0) entered blocking state [ 2168.785742][ T325] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2168.793743][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2168.802306][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2168.810881][ T325] bridge0: port 2(bridge_slave_1) entered blocking state [ 2168.817720][ T325] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2168.880865][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2168.915765][T16910] device wg2 left promiscuous mode [ 2169.088675][T16920] device wg2 entered promiscuous mode [ 2169.095315][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2169.104265][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2169.263424][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2169.367463][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2169.474746][T16916] device veth1_macvtap left promiscuous mode [ 2169.688656][T16931] device veth1_macvtap entered promiscuous mode [ 2169.710878][T16940] FAULT_INJECTION: forcing a failure. [ 2169.710878][T16940] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2169.742288][T16931] device macsec0 entered promiscuous mode [ 2169.753691][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2169.762456][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2169.772578][T16940] CPU: 0 PID: 16940 Comm: syz.0.15085 Tainted: G W 6.1.99-syzkaller-00017-g752034bc8702 #0 [ 2169.783762][T16940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 2169.793667][T16940] Call Trace: [ 2169.796778][T16940] [ 2169.799557][T16940] dump_stack_lvl+0x151/0x1b7 [ 2169.804086][T16940] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 2169.809369][T16940] ? __kasan_check_write+0x14/0x20 [ 2169.814403][T16940] dump_stack+0x15/0x1b [ 2169.818393][T16940] should_fail_ex+0x3d0/0x520 [ 2169.822908][T16940] should_fail+0xb/0x10 [ 2169.826896][T16940] should_fail_usercopy+0x1a/0x20 [ 2169.831846][T16940] _copy_to_user+0x1e/0x90 [ 2169.836102][T16940] simple_read_from_buffer+0xc7/0x150 [ 2169.841305][T16940] proc_fail_nth_read+0x1a3/0x210 [ 2169.846164][T16940] ? proc_fault_inject_write+0x390/0x390 [ 2169.851633][T16940] ? fsnotify_perm+0x269/0x5b0 [ 2169.856232][T16940] ? security_file_permission+0x86/0xb0 [ 2169.861615][T16940] ? proc_fault_inject_write+0x390/0x390 [ 2169.867170][T16940] vfs_read+0x26c/0xae0 [ 2169.871347][T16940] ? kernel_read+0x1f0/0x1f0 [ 2169.875768][T16940] ? mutex_lock+0xb1/0x1e0 [ 2169.880025][T16940] ? bit_wait_io_timeout+0x120/0x120 [ 2169.885159][T16940] ? __fdget_pos+0x2e2/0x390 [ 2169.889572][T16940] ? ksys_read+0x77/0x2c0 [ 2169.893736][T16940] ksys_read+0x199/0x2c0 [ 2169.897841][T16940] ? vfs_write+0xed0/0xed0 [ 2169.902159][T16940] ? debug_smp_processor_id+0x17/0x20 [ 2169.907537][T16940] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 2169.913446][T16940] __x64_sys_read+0x7b/0x90 [ 2169.917791][T16940] x64_sys_call+0x28/0x9a0 [ 2169.922038][T16940] do_syscall_64+0x3b/0xb0 [ 2169.926288][T16940] ? clear_bhb_loop+0x55/0xb0 [ 2169.930812][T16940] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2169.936531][T16940] RIP: 0033:0x7f8d5137ca3c [ 2169.940790][T16940] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 2169.960222][T16940] RSP: 002b:00007f8d521fd030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2169.968475][T16940] RAX: ffffffffffffffda RBX: 00007f8d51535f80 RCX: 00007f8d5137ca3c [ 2169.976483][T16940] RDX: 000000000000000f RSI: 00007f8d521fd0a0 RDI: 0000000000000005 [ 2169.984370][T16940] RBP: 00007f8d521fd090 R08: 0000000000000000 R09: 0000000000000000 [ 2169.992180][T16940] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2169.999991][T16940] R13: 0000000000000000 R14: 00007f8d51535f80 R15: 00007ffeb77c3b78 [ 2170.007805][T16940] [ 2170.016115][T16854] device veth0_vlan entered promiscuous mode [ 2170.064283][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2170.072536][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2170.087370][T16854] device veth1_macvtap entered promiscuous mode [ 2170.362741][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2170.381641][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2170.451016][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2170.464947][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2170.499021][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2170.881607][T16947] device veth1_macvtap left promiscuous mode [ 2170.887565][T16947] device macsec0 left promiscuous mode [ 2170.908857][T16956] device veth1_macvtap entered promiscuous mode [ 2170.915022][T16956] device macsec0 entered promiscuous mode [ 2170.937171][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2170.945776][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2170.976772][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2170.986907][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2171.330230][T16970] device wg2 left promiscuous mode [ 2171.345613][T16970] device wg2 entered promiscuous mode [ 2171.828533][ T43] device bridge_slave_1 left promiscuous mode [ 2171.834512][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 2171.842062][ T43] device bridge_slave_0 left promiscuous mode [ 2171.848228][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 2171.855772][ T43] device veth1_macvtap left promiscuous mode [ 2171.861766][ T43] device veth0_vlan left promiscuous mode [ 2172.922707][T16982] device wg2 left promiscuous mode [ 2174.556167][T16998] device veth1_macvtap left promiscuous mode [ 2174.569708][T16998] device macsec0 left promiscuous mode [ 2175.070300][T16998] device veth1_macvtap entered promiscuous mode [ 2175.164453][T16998] device macsec0 entered promiscuous mode [ 2175.498444][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2175.578881][T16994] bridge0: port 1(bridge_slave_0) entered blocking state [ 2175.586120][T16994] bridge0: port 1(bridge_slave_0) entered disabled state [ 2175.593787][T16994] device bridge_slave_0 entered promiscuous mode [ 2175.600926][T17022] device veth0_vlan left promiscuous mode [ 2175.607779][T17022] device veth0_vlan entered promiscuous mode [ 2175.618410][T16994] bridge0: port 2(bridge_slave_1) entered blocking state [ 2175.628419][T16994] bridge0: port 2(bridge_slave_1) entered disabled state [ 2175.648777][T16994] device bridge_slave_1 entered promiscuous mode [ 2175.829865][T17031] device wg2 entered promiscuous mode [ 2175.996148][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2176.011135][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2176.120167][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2176.131887][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2176.141133][ T325] bridge0: port 1(bridge_slave_0) entered blocking state [ 2176.148006][ T325] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2176.155966][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2176.164865][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2176.183178][ T325] bridge0: port 2(bridge_slave_1) entered blocking state [ 2176.190133][ T325] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2176.197388][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2176.205522][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2176.220177][T16994] device veth0_vlan entered promiscuous mode [ 2176.228379][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2176.236788][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2176.245803][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2176.257217][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2176.264682][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2176.284986][T17055] device syzkaller0 entered promiscuous mode [ 2176.302175][T16994] device veth1_macvtap entered promiscuous mode [ 2176.309470][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2176.322194][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2176.331118][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2176.998882][ T8] device bridge_slave_1 left promiscuous mode [ 2177.004798][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 2177.012099][ T8] device bridge_slave_0 left promiscuous mode [ 2177.018050][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 2177.025536][ T8] device veth1_macvtap left promiscuous mode [ 2177.031390][ T8] device veth0_vlan left promiscuous mode [ 2178.100677][T17065] device veth0_vlan left promiscuous mode [ 2178.140548][T17065] device veth0_vlan entered promiscuous mode [ 2178.404125][T17062] device veth1_macvtap left promiscuous mode [ 2178.424307][T17062] device macsec0 left promiscuous mode [ 2178.594774][T17063] device veth1_macvtap left promiscuous mode [ 2178.602769][T17063] device macsec0 left promiscuous mode [ 2178.764668][T17080] device veth1_macvtap entered promiscuous mode [ 2178.770855][T17080] device macsec0 entered promiscuous mode [ 2178.779319][T17081] device veth1_macvtap entered promiscuous mode [ 2178.788875][T17081] device macsec0 entered promiscuous mode [ 2178.938534][T17088] device wg2 left promiscuous mode [ 2179.037460][T17093] device wg2 entered promiscuous mode [ 2179.258418][T17110] device wg2 left promiscuous mode [ 2179.274757][T17074] bridge0: port 1(bridge_slave_0) entered blocking state [ 2179.298036][T17074] bridge0: port 1(bridge_slave_0) entered disabled state [ 2179.315988][T17074] device bridge_slave_0 entered promiscuous mode [ 2179.346186][T17074] bridge0: port 2(bridge_slave_1) entered blocking state [ 2179.353222][T17074] bridge0: port 2(bridge_slave_1) entered disabled state [ 2179.360997][T17074] device bridge_slave_1 entered promiscuous mode [ 2179.992960][T17124] device veth1_macvtap left promiscuous mode [ 2179.999441][T17124] device macsec0 left promiscuous mode [ 2180.180451][T17129] device wg2 left promiscuous mode [ 2180.304874][T17126] device veth1_macvtap left promiscuous mode [ 2180.311598][T17126] device macsec0 left promiscuous mode [ 2180.320758][T17135] device veth1_macvtap entered promiscuous mode [ 2180.328405][T17135] device macsec0 entered promiscuous mode [ 2180.334898][T17133] device wg2 entered promiscuous mode [ 2180.347589][T17137] device veth1_macvtap entered promiscuous mode [ 2180.357695][T17137] device macsec0 entered promiscuous mode [ 2180.588327][T17148] device wg2 entered promiscuous mode [ 2180.676106][T17147] device wg2 left promiscuous mode [ 2180.848478][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2180.855778][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2180.863815][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2180.923850][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2180.991265][T15432] bridge0: port 1(bridge_slave_0) entered blocking state [ 2180.998255][T15432] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2181.399220][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2181.406982][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2181.415490][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2181.423995][T15432] bridge0: port 2(bridge_slave_1) entered blocking state [ 2181.430890][T15432] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2181.444647][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2181.495719][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2181.897247][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2181.905516][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2181.924200][T17074] device veth0_vlan entered promiscuous mode [ 2181.936092][T17168] device veth1_macvtap left promiscuous mode [ 2181.965053][T17168] device macsec0 left promiscuous mode [ 2181.987560][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2181.997829][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2182.012076][T17074] device veth1_macvtap entered promiscuous mode [ 2182.041941][T17178] device veth1_macvtap entered promiscuous mode [ 2182.049437][T17178] device macsec0 entered promiscuous mode [ 2182.055786][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2182.063732][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2182.071563][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2182.083676][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2182.091913][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2182.099591][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2182.107594][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2182.115889][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2182.123997][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2182.134265][T17177] device wg2 entered promiscuous mode [ 2182.688627][ T43] device bridge_slave_1 left promiscuous mode [ 2182.694659][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 2182.702195][ T43] device bridge_slave_0 left promiscuous mode [ 2182.708336][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 2182.715992][ T43] device veth1_macvtap left promiscuous mode [ 2182.721882][ T43] device veth0_vlan left promiscuous mode [ 2183.768988][T17186] device veth0_vlan left promiscuous mode [ 2183.823860][T17186] device veth0_vlan entered promiscuous mode [ 2183.870914][T17191] device wg2 left promiscuous mode [ 2184.010868][T17194] device wg2 entered promiscuous mode [ 2184.302598][T17203] device wg2 left promiscuous mode [ 2184.691298][T17195] bridge0: port 1(bridge_slave_0) entered blocking state [ 2184.870771][T17195] bridge0: port 1(bridge_slave_0) entered disabled state [ 2184.958502][T17195] device bridge_slave_0 entered promiscuous mode [ 2184.965551][T17225] device wg2 entered promiscuous mode [ 2185.029635][T17195] bridge0: port 2(bridge_slave_1) entered blocking state [ 2185.036498][T17195] bridge0: port 2(bridge_slave_1) entered disabled state [ 2185.046226][T17195] device bridge_slave_1 entered promiscuous mode [ 2185.870870][T17230] device veth1_macvtap left promiscuous mode [ 2185.876796][T17230] device macsec0 left promiscuous mode [ 2186.243683][T17230] device veth1_macvtap entered promiscuous mode [ 2186.249874][T17230] device macsec0 entered promiscuous mode [ 2186.372287][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2186.402396][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2186.422273][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2186.430532][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2186.438954][T28965] bridge0: port 1(bridge_slave_0) entered blocking state [ 2186.445808][T28965] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2186.453016][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2186.461133][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2186.469610][T28965] bridge0: port 2(bridge_slave_1) entered blocking state [ 2186.476493][T28965] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2186.501691][T17238] device veth0_vlan left promiscuous mode [ 2186.507865][T17238] device veth0_vlan entered promiscuous mode [ 2186.616625][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2186.639280][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2186.647200][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2186.693220][T17195] device veth0_vlan entered promiscuous mode [ 2186.718817][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2186.727076][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2186.753373][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2186.760970][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2186.768556][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2186.867893][T17195] device veth1_macvtap entered promiscuous mode [ 2186.874885][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2186.883032][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2186.896955][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2187.007925][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2187.016516][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2187.094117][T17250] FAULT_INJECTION: forcing a failure. [ 2187.094117][T17250] name failslab, interval 1, probability 0, space 0, times 0 [ 2187.101131][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2187.106627][T17250] CPU: 0 PID: 17250 Comm: syz.1.15174 Tainted: G W 6.1.99-syzkaller-00017-g752034bc8702 #0 [ 2187.114961][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2187.125617][T17250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 2187.125628][T17250] Call Trace: [ 2187.125634][T17250] [ 2187.125640][T17250] dump_stack_lvl+0x151/0x1b7 [ 2187.125665][T17250] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 2187.159122][T17250] ? kstrtoull+0x1cd/0x2e0 [ 2187.163372][T17250] ? _parse_integer+0x40/0x40 [ 2187.167886][T17250] dump_stack+0x15/0x1b [ 2187.171874][T17250] should_fail_ex+0x3d0/0x520 [ 2187.176391][T17250] ? bpf_test_init+0xf1/0x190 [ 2187.180913][T17250] __should_failslab+0xaf/0xf0 [ 2187.185508][T17250] should_failslab+0x9/0x20 [ 2187.190021][T17250] __kmem_cache_alloc_node+0x3d/0x250 [ 2187.195229][T17250] ? bpf_test_init+0xf1/0x190 [ 2187.199912][T17250] __kmalloc+0xa3/0x1e0 [ 2187.203924][T17250] bpf_test_init+0xf1/0x190 [ 2187.208248][T17250] bpf_prog_test_run_skb+0x297/0x13a0 [ 2187.213471][T17250] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 2187.219184][T17250] ? __kasan_check_write+0x14/0x20 [ 2187.224344][T17250] ? fput+0x15b/0x1b0 [ 2187.228165][T17250] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 2187.233891][T17250] bpf_prog_test_run+0x3b0/0x630 [ 2187.238754][T17250] ? bpf_prog_query+0x260/0x260 [ 2187.243637][T17250] ? selinux_bpf+0xd2/0x100 [ 2187.247974][T17250] ? security_bpf+0x82/0xb0 [ 2187.252323][T17250] __sys_bpf+0x59f/0x7f0 [ 2187.256435][T17250] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2187.261699][T17250] ? __ia32_sys_read+0x90/0x90 [ 2187.266380][T17250] ? debug_smp_processor_id+0x17/0x20 [ 2187.271967][T17250] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 2187.277866][T17250] __x64_sys_bpf+0x7c/0x90 [ 2187.282116][T17250] x64_sys_call+0x87f/0x9a0 [ 2187.286481][T17250] do_syscall_64+0x3b/0xb0 [ 2187.290881][T17250] ? clear_bhb_loop+0x55/0xb0 [ 2187.295406][T17250] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2187.301122][T17250] RIP: 0033:0x7fc79a37dff9 [ 2187.305374][T17250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2187.325024][T17250] RSP: 002b:00007fc79b241038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2187.333265][T17250] RAX: ffffffffffffffda RBX: 00007fc79a535f80 RCX: 00007fc79a37dff9 [ 2187.341074][T17250] RDX: 000000000000002c RSI: 0000000020000080 RDI: 000000000000000a [ 2187.348886][T17250] RBP: 00007fc79b241090 R08: 0000000000000000 R09: 0000000000000000 [ 2187.356765][T17250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2187.364532][T17250] R13: 0000000000000000 R14: 00007fc79a535f80 R15: 00007ffd43091538 [ 2187.372327][T17250] [ 2187.386795][T17248] device wg2 left promiscuous mode [ 2187.526450][T17251] device wg2 entered promiscuous mode [ 2187.817476][T17262] device wg2 left promiscuous mode [ 2187.928116][T17263] device wg2 entered promiscuous mode [ 2188.428599][ T43] device bridge_slave_1 left promiscuous mode [ 2188.435185][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 2188.442517][ T43] device bridge_slave_0 left promiscuous mode [ 2188.448561][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 2188.456179][ T43] device veth1_macvtap left promiscuous mode [ 2188.462587][ T43] device veth0_vlan left promiscuous mode [ 2190.257431][T17287] FAULT_INJECTION: forcing a failure. [ 2190.257431][T17287] name failslab, interval 1, probability 0, space 0, times 0 [ 2190.314819][T17287] CPU: 1 PID: 17287 Comm: syz.4.15184 Tainted: G W 6.1.99-syzkaller-00017-g752034bc8702 #0 [ 2190.326113][T17287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 2190.336002][T17287] Call Trace: [ 2190.339197][T17287] [ 2190.341899][T17287] dump_stack_lvl+0x151/0x1b7 [ 2190.346414][T17287] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 2190.351988][T17287] ? kstrtoull+0x1cd/0x2e0 [ 2190.356238][T17287] ? _parse_integer+0x40/0x40 [ 2190.360741][T17287] dump_stack+0x15/0x1b [ 2190.364737][T17287] should_fail_ex+0x3d0/0x520 [ 2190.369345][T17287] ? bpf_test_init+0xf1/0x190 [ 2190.373944][T17287] __should_failslab+0xaf/0xf0 [ 2190.378707][T17287] should_failslab+0x9/0x20 [ 2190.383167][T17287] __kmem_cache_alloc_node+0x3d/0x250 [ 2190.388435][T17287] ? bpf_test_init+0xf1/0x190 [ 2190.392939][T17287] __kmalloc+0xa3/0x1e0 [ 2190.396939][T17287] bpf_test_init+0xf1/0x190 [ 2190.401315][T17287] bpf_prog_test_run_skb+0x297/0x13a0 [ 2190.406491][T17287] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 2190.412212][T17287] ? __kasan_check_write+0x14/0x20 [ 2190.417160][T17287] ? fput+0x15b/0x1b0 [ 2190.420985][T17287] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 2190.426715][T17287] bpf_prog_test_run+0x3b0/0x630 [ 2190.431478][T17287] ? bpf_prog_query+0x260/0x260 [ 2190.436162][T17287] ? selinux_bpf+0xd2/0x100 [ 2190.440942][T17287] ? security_bpf+0x82/0xb0 [ 2190.445378][T17287] __sys_bpf+0x59f/0x7f0 [ 2190.449534][T17287] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2190.454999][T17287] ? __ia32_sys_read+0x90/0x90 [ 2190.459601][T17287] ? debug_smp_processor_id+0x17/0x20 [ 2190.464919][T17287] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 2190.469515][T17269] device veth1_macvtap left promiscuous mode [ 2190.470792][T17287] __x64_sys_bpf+0x7c/0x90 [ 2190.470821][T17287] x64_sys_call+0x87f/0x9a0 [ 2190.470841][T17287] do_syscall_64+0x3b/0xb0 [ 2190.470858][T17287] ? clear_bhb_loop+0x55/0xb0 [ 2190.470878][T17287] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2190.470898][T17287] RIP: 0033:0x7f333757dff9 [ 2190.470914][T17287] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2190.470930][T17287] RSP: 002b:00007f33382a8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2190.470952][T17287] RAX: ffffffffffffffda RBX: 00007f3337735f80 RCX: 00007f333757dff9 [ 2190.470965][T17287] RDX: 000000000000002c RSI: 0000000020000080 RDI: 000000000000000a [ 2190.470978][T17287] RBP: 00007f33382a8090 R08: 0000000000000000 R09: 0000000000000000 [ 2190.470990][T17287] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2190.471002][T17287] R13: 0000000000000000 R14: 00007f3337735f80 R15: 00007ffd9851ccc8 [ 2190.471020][T17287] [ 2190.595276][T17269] device macsec0 left promiscuous mode [ 2190.893359][T17269] device veth1_macvtap entered promiscuous mode [ 2190.955106][T17269] device macsec0 entered promiscuous mode [ 2191.001275][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2191.380663][T17285] bridge0: port 1(bridge_slave_0) entered blocking state [ 2191.393181][T17285] bridge0: port 1(bridge_slave_0) entered disabled state [ 2191.448481][T17285] device bridge_slave_0 entered promiscuous mode [ 2191.663462][T17285] bridge0: port 2(bridge_slave_1) entered blocking state [ 2191.670481][T17285] bridge0: port 2(bridge_slave_1) entered disabled state [ 2191.680296][T17285] device bridge_slave_1 entered promiscuous mode [ 2192.896951][T17285] device veth0_vlan entered promiscuous mode [ 2193.040932][T12989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2193.141590][T12989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2193.258594][T12989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2193.300399][T12989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2193.353303][T12989] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2193.386000][T12989] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2193.396474][T12989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2193.404975][T12989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2193.414617][T12989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2193.423360][T12989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2193.431657][T12989] bridge0: port 1(bridge_slave_0) entered blocking state [ 2193.438516][T12989] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2193.446432][T12989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2193.454753][T12989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2193.463138][T12989] bridge0: port 2(bridge_slave_1) entered blocking state [ 2193.470174][T12989] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2193.483661][T17285] device veth1_macvtap entered promiscuous mode [ 2193.500825][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2193.521845][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2193.530415][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2193.539709][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2193.611471][T17344] device veth1_macvtap left promiscuous mode [ 2193.620035][T17344] device macsec0 left promiscuous mode [ 2193.668071][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2193.676438][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2193.890266][T17345] device veth1_macvtap entered promiscuous mode [ 2193.896452][T17345] device macsec0 entered promiscuous mode [ 2193.907170][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2193.915778][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2195.232299][ T43] device bridge_slave_1 left promiscuous mode [ 2195.254291][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 2195.368536][ T43] device bridge_slave_0 left promiscuous mode [ 2195.374500][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 2195.382736][ T43] device veth1_macvtap left promiscuous mode [ 2195.388621][ T43] device veth0_vlan left promiscuous mode [ 2196.638844][T17358] device wg2 left promiscuous mode [ 2196.666492][T17367] device wg2 entered promiscuous mode [ 2196.790629][T17366] bridge0: port 1(bridge_slave_0) entered blocking state [ 2196.811948][T17366] bridge0: port 1(bridge_slave_0) entered disabled state [ 2196.878888][T17366] device bridge_slave_0 entered promiscuous mode [ 2196.937718][T17386] device veth0_vlan left promiscuous mode [ 2196.945195][T17386] device veth0_vlan entered promiscuous mode [ 2197.010753][T17366] bridge0: port 2(bridge_slave_1) entered blocking state [ 2197.017605][T17366] bridge0: port 2(bridge_slave_1) entered disabled state [ 2197.025490][T17366] device bridge_slave_1 entered promiscuous mode [ 2197.033967][T17379] device wg2 left promiscuous mode [ 2197.040847][T17385] tun0: tun_chr_ioctl cmd 1074025677 [ 2197.046140][T17385] tun0: linktype set to 823 [ 2197.219252][T17389] device wg2 entered promiscuous mode [ 2197.864064][T17366] bridge0: port 2(bridge_slave_1) entered blocking state [ 2197.871297][T17366] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2197.878487][T17366] bridge0: port 1(bridge_slave_0) entered blocking state [ 2197.885243][T17366] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2198.107626][T14582] bridge0: port 1(bridge_slave_0) entered disabled state [ 2198.115677][T14582] bridge0: port 2(bridge_slave_1) entered disabled state [ 2198.149741][T17408] device wg2 left promiscuous mode [ 2198.182864][T17409] device wg2 entered promiscuous mode [ 2198.455704][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2198.463226][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2198.532179][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2198.608391][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2198.616593][ T315] bridge0: port 1(bridge_slave_0) entered blocking state [ 2198.623479][ T315] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2198.630935][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2198.639193][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2198.647180][ T315] bridge0: port 2(bridge_slave_1) entered blocking state [ 2198.654039][ T315] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2198.788972][T12989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2198.797227][T12989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2198.805448][T12989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2198.813569][T12989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2199.033665][T17366] device veth0_vlan entered promiscuous mode [ 2199.067363][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2199.076511][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2199.084951][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2199.092844][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2199.103602][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2199.111263][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2199.128090][T17366] device veth1_macvtap entered promiscuous mode [ 2199.134605][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2199.143005][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2199.151164][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2199.167012][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2199.181489][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2199.190087][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2199.198948][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2199.898613][T20961] device bridge_slave_1 left promiscuous mode [ 2199.904531][T20961] bridge0: port 2(bridge_slave_1) entered disabled state [ 2199.911837][T20961] device bridge_slave_0 left promiscuous mode [ 2199.917761][T20961] bridge0: port 1(bridge_slave_0) entered disabled state [ 2199.925316][T20961] device veth1_macvtap left promiscuous mode [ 2199.931298][T20961] device veth0_vlan left promiscuous mode [ 2202.091931][T17439] device wg2 left promiscuous mode [ 2202.196392][T17447] device wg2 entered promiscuous mode [ 2202.292716][T17437] bridge0: port 1(bridge_slave_0) entered blocking state [ 2202.357319][T17437] bridge0: port 1(bridge_slave_0) entered disabled state [ 2202.366273][T17437] device bridge_slave_0 entered promiscuous mode [ 2202.403303][T17450] device wg2 left promiscuous mode [ 2202.438679][T17437] bridge0: port 2(bridge_slave_1) entered blocking state [ 2202.445718][T17437] bridge0: port 2(bridge_slave_1) entered disabled state [ 2202.452906][T17437] device bridge_slave_1 entered promiscuous mode [ 2202.459966][T17441] device veth1_macvtap left promiscuous mode [ 2202.466681][T17441] device macsec0 left promiscuous mode [ 2202.509170][T17450] device wg2 entered promiscuous mode [ 2202.554333][T17460] device pim6reg1 entered promiscuous mode [ 2202.563238][T17441] device veth1_macvtap entered promiscuous mode [ 2202.572399][T17441] device macsec0 entered promiscuous mode [ 2202.618318][T17463] bridge0: port 3(dummy0) entered blocking state [ 2202.624539][T17463] bridge0: port 3(dummy0) entered disabled state [ 2202.631913][T17463] device dummy0 entered promiscuous mode [ 2202.637546][T17463] bridge0: port 3(dummy0) entered blocking state [ 2202.643717][T17463] bridge0: port 3(dummy0) entered forwarding state [ 2202.670167][T17465] device dummy0 left promiscuous mode [ 2202.676722][T17465] bridge0: port 3(dummy0) entered disabled state [ 2202.899717][T17474] FAULT_INJECTION: forcing a failure. [ 2202.899717][T17474] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2202.914333][T17474] CPU: 0 PID: 17474 Comm: syz.1.15236 Tainted: G W 6.1.99-syzkaller-00017-g752034bc8702 #0 [ 2202.925519][T17474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 2202.935502][T17474] Call Trace: [ 2202.938804][T17474] [ 2202.941581][T17474] dump_stack_lvl+0x151/0x1b7 [ 2202.946099][T17474] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 2202.951397][T17474] dump_stack+0x15/0x1b [ 2202.955381][T17474] should_fail_ex+0x3d0/0x520 [ 2202.959909][T17474] should_fail+0xb/0x10 [ 2202.964058][T17474] should_fail_usercopy+0x1a/0x20 [ 2202.968924][T17474] copy_page_from_iter_atomic+0x349/0x10b0 [ 2202.974563][T17474] ? shmem_get_folio+0xa0/0xa0 [ 2202.979174][T17474] ? fault_in_readable+0x172/0x2d0 [ 2202.984111][T17474] ? pipe_zero+0x220/0x220 [ 2202.988362][T17474] ? shmem_write_begin+0x1f0/0x3a0 [ 2202.993308][T17474] ? shmem_writepage+0xe00/0xe00 [ 2202.998125][T17474] generic_perform_write+0x369/0x5c0 [ 2203.003205][T17474] ? generic_file_direct_write+0x6b0/0x6b0 [ 2203.008849][T17474] ? __file_remove_privs+0x640/0x640 [ 2203.013964][T17474] ? generic_write_checks+0x138/0x1c0 [ 2203.019174][T17474] __generic_file_write_iter+0x174/0x3a0 [ 2203.024647][T17474] generic_file_write_iter+0xb1/0x310 [ 2203.029849][T17474] vfs_write+0xaf6/0xed0 [ 2203.033930][T17474] ? __hrtimer_run_queues+0x46b/0xad0 [ 2203.039254][T17474] ? file_end_write+0x1c0/0x1c0 [ 2203.044017][T17474] ? mutex_lock+0xb1/0x1e0 [ 2203.048272][T17474] ? bit_wait_io_timeout+0x120/0x120 [ 2203.053386][T17474] ? __fdget_pos+0x2e2/0x390 [ 2203.057805][T17474] ? ksys_write+0x77/0x2c0 [ 2203.062057][T17474] ksys_write+0x199/0x2c0 [ 2203.066217][T17474] ? __ia32_sys_read+0x90/0x90 [ 2203.070817][T17474] ? debug_smp_processor_id+0x17/0x20 [ 2203.076110][T17474] __x64_sys_write+0x7b/0x90 [ 2203.080549][T17474] x64_sys_call+0x2f/0x9a0 [ 2203.084789][T17474] do_syscall_64+0x3b/0xb0 [ 2203.089043][T17474] ? clear_bhb_loop+0x55/0xb0 [ 2203.093555][T17474] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2203.099285][T17474] RIP: 0033:0x7fc79a37dff9 [ 2203.103535][T17474] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2203.123089][T17474] RSP: 002b:00007fc79b241038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2203.131556][T17474] RAX: ffffffffffffffda RBX: 00007fc79a535f80 RCX: 00007fc79a37dff9 [ 2203.139368][T17474] RDX: 0000000020000992 RSI: 0000000020000980 RDI: 0000000000000005 [ 2203.147172][T17474] RBP: 00007fc79b241090 R08: 0000000000000000 R09: 0000000000000000 [ 2203.154985][T17474] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2203.163055][T17474] R13: 0000000000000000 R14: 00007fc79a535f80 R15: 00007ffd43091538 [ 2203.170961][T17474] [ 2203.650750][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2203.658512][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2203.754636][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2203.863495][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2203.942445][T15432] bridge0: port 1(bridge_slave_0) entered blocking state [ 2203.949414][T15432] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2203.987427][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2203.998452][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2204.006379][T15432] bridge0: port 2(bridge_slave_1) entered blocking state [ 2204.013251][T15432] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2204.021522][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2204.047410][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2204.055666][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2204.063751][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2204.071699][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2204.086229][T17437] device veth0_vlan entered promiscuous mode [ 2204.094679][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2204.103377][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2204.111582][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2204.119958][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2204.134106][T17437] device veth1_macvtap entered promiscuous mode [ 2204.144651][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2204.152301][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2204.159991][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2204.168130][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2204.176021][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2204.188458][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2204.196543][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2204.204760][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2204.212827][T28493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2204.848615][T20961] device bridge_slave_1 left promiscuous mode [ 2204.854543][T20961] bridge0: port 2(bridge_slave_1) entered disabled state [ 2204.861994][T20961] device bridge_slave_0 left promiscuous mode [ 2204.868194][T20961] bridge0: port 1(bridge_slave_0) entered disabled state [ 2204.875941][T20961] device veth1_macvtap left promiscuous mode [ 2204.881828][T20961] device veth0_vlan left promiscuous mode [ 2206.940682][T17496] bridge0: port 1(bridge_slave_0) entered blocking state [ 2206.947537][T17496] bridge0: port 1(bridge_slave_0) entered disabled state [ 2206.954985][T17496] device bridge_slave_0 entered promiscuous mode [ 2206.962250][T17496] bridge0: port 2(bridge_slave_1) entered blocking state [ 2206.978038][T17496] bridge0: port 2(bridge_slave_1) entered disabled state [ 2206.986297][T17496] device bridge_slave_1 entered promiscuous mode [ 2207.000895][T17512] device wg2 left promiscuous mode [ 2207.107452][T17518] device wg2 entered promiscuous mode [ 2207.445823][T17520] device veth1_macvtap left promiscuous mode [ 2207.464901][T17520] device macsec0 left promiscuous mode [ 2208.276134][T17533] device veth0_vlan left promiscuous mode [ 2208.408987][T17533] device veth0_vlan entered promiscuous mode [ 2209.051670][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2209.059295][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2209.138122][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2209.219610][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2209.319921][T14582] bridge0: port 1(bridge_slave_0) entered blocking state [ 2209.326768][T14582] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2209.579176][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2209.587361][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2209.719781][T14582] bridge0: port 2(bridge_slave_1) entered blocking state [ 2209.726637][T14582] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2209.890088][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2209.979095][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2210.080008][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2210.087913][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2210.180521][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2210.199752][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2210.207908][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2210.224805][T17496] device veth0_vlan entered promiscuous mode [ 2210.238037][T17496] device veth1_macvtap entered promiscuous mode [ 2210.246174][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2210.254463][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2210.262377][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2210.280646][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2210.289064][T28965] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2210.314958][T17560] device wg2 left promiscuous mode [ 2210.925659][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2210.933078][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2210.941060][T17563] device wg2 entered promiscuous mode [ 2210.956715][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2210.969618][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2211.069053][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2211.081621][T17571] FAULT_INJECTION: forcing a failure. [ 2211.081621][T17571] name failslab, interval 1, probability 0, space 0, times 0 [ 2211.122034][T14583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2211.187051][T17571] CPU: 0 PID: 17571 Comm: syz.2.15260 Tainted: G W 6.1.99-syzkaller-00017-g752034bc8702 #0 [ 2211.198248][T17571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 2211.208152][T17571] Call Trace: [ 2211.211265][T17571] [ 2211.214057][T17571] dump_stack_lvl+0x151/0x1b7 [ 2211.218566][T17571] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 2211.223859][T17571] ? expand_files+0xd3/0x700 [ 2211.228277][T17571] dump_stack+0x15/0x1b [ 2211.232269][T17571] should_fail_ex+0x3d0/0x520 [ 2211.236911][T17571] ? perf_event_alloc+0x11b/0x1840 [ 2211.241817][T17571] __should_failslab+0xaf/0xf0 [ 2211.246417][T17571] should_failslab+0x9/0x20 [ 2211.250756][T17571] kmem_cache_alloc_node+0x3e/0x2d0 [ 2211.255791][T17571] ? _find_next_zero_bit+0x8c/0x140 [ 2211.260825][T17571] perf_event_alloc+0x11b/0x1840 [ 2211.265599][T17571] __se_sys_perf_event_open+0xb27/0x3d60 [ 2211.271243][T17571] ? mutex_lock+0x151/0x1e0 [ 2211.275582][T17571] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 2211.281046][T17571] ? fput+0x15b/0x1b0 [ 2211.284870][T17571] ? __ia32_sys_read+0x90/0x90 [ 2211.289468][T17571] ? debug_smp_processor_id+0x17/0x20 [ 2211.294678][T17571] __x64_sys_perf_event_open+0xbf/0xd0 [ 2211.299970][T17571] x64_sys_call+0x7de/0x9a0 [ 2211.304305][T17571] do_syscall_64+0x3b/0xb0 [ 2211.308560][T17571] ? clear_bhb_loop+0x55/0xb0 [ 2211.313160][T17571] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2211.318900][T17571] RIP: 0033:0x7fd8f597dff9 [ 2211.323139][T17571] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2211.342682][T17571] RSP: 002b:00007fd8f673a038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2211.350924][T17571] RAX: ffffffffffffffda RBX: 00007fd8f5b35f80 RCX: 00007fd8f597dff9 [ 2211.358739][T17571] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000000020000100 [ 2211.366630][T17571] RBP: 00007fd8f673a090 R08: 0000000000000000 R09: 0000000000000000 [ 2211.374443][T17571] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2211.382256][T17571] R13: 0000000000000000 R14: 00007fd8f5b35f80 R15: 00007ffda8031c48 [ 2211.390157][T17571] [ 2211.618565][T17576] device wg2 left promiscuous mode SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=3 req=14739 state=3 status=67 (errno 11: Resource temporarily unavailable) [ 2211.818857][T17579] device wg2 entered promiscuous mode [ 2212.578805][ T43] device bridge_slave_1 left promiscuous mode [ 2212.584952][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 2212.592222][ T43] device bridge_slave_0 left promiscuous mode [ 2212.598197][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 2212.605560][ T43] device veth1_macvtap left promiscuous mode [ 2212.611431][ T43] device veth0_vlan left promiscuous mode [ 2213.539212][ T43] device bridge_slave_1 left promiscuous mode [ 2213.545278][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 2213.552539][ T43] device bridge_slave_0 left promiscuous mode [ 2213.558527][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 2213.566044][ T43] device bridge_slave_1 left promiscuous mode [ 2213.572084][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 2213.579295][ T43] device bridge_slave_0 left promiscuous mode [ 2213.585201][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 2213.592900][ T43] device bridge_slave_1 left promiscuous mode [ 2213.598898][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 2213.606007][ T43] device bridge_slave_0 left promiscuous mode [ 2213.612018][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 2213.619773][ T43] device veth0_vlan left promiscuous mode [ 2213.625488][ T43] device veth1_macvtap left promiscuous mode [ 2213.631404][ T43] device veth0_vlan left promiscuous mode [ 2213.637147][ T43] device veth1_macvtap left promiscuous mode [ 2213.643029][ T43] device veth0_vlan left promiscuous mode [ 2214.788496][ T43] device bridge_slave_1 left promiscuous mode [ 2214.794630][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 2214.801941][ T43] device bridge_slave_0 left promiscuous mode [ 2214.808168][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 2214.815721][ T43] device veth1_macvtap left promiscuous mode