last executing test programs: 21m34.679138947s ago: executing program 2 (id=3): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000f8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000150000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001b00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r2}, 0x10) r3 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000b708000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x39, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x5, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r4, 0x58, &(0x7f0000000240)}, 0xfffffffffffffff0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) syz_clone(0x80044c80, &(0x7f0000000780)="cb6aa044fb4383c8cdd053d6541fa2c86ee45e8608addc9ae3e152a7592ed554fecba0390234d98730104063fdd580ffc47894c36cb8e97941d46382cb956eda8b57c9f35ae83ec61aa35d2e2a0a87c5f8258253fd261e79fc8403277acd8d520b597837d84acfa36f84aa39e134bc584ac2d1f565eed3d54e17b8f83c7085340cd5059efbe3018ca2b7b0", 0x8b, &(0x7f0000000200), &(0x7f00000003c0), &(0x7f0000000900)="4a2be03f44170ec29893a5fba4bb35d3c2d6ad43747e4e4a0ead096c3458a868fc4c5bea6fd8e03ddf3764e4146bd156a42bc8fe34b0ed402316e41f6090047e4c2ee4a92aae8df33666d9e8d050d02a60ac1ddf5cf6a3f068070f1d7b9f9661c9901b4c78955b22735832b42155e464f924f6326a769bcae43f71dbbb00e4ac76c58e2f7a8ebe038c6f6f99fbcbdeb0b91396a966f399c3389cef17") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000008000008500000006"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 21m33.713588666s ago: executing program 2 (id=11): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0xb000000}, {{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 21m33.210504523s ago: executing program 2 (id=16): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000deab44f4850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='mm_page_alloc\x00', r4}, 0x10) syz_clone(0x640c7000, 0x0, 0x2f, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="ac00b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000000095000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) write$cgroup_int(r3, &(0x7f0000000080)=0x7, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) write$cgroup_pid(r2, &(0x7f00000001c0), 0x12) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000200)=0x1, 0x12) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r7}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x12, 0x0, &(0x7f0000000000)="b9ff03076044238c9e9e15f088a84cb688a8", 0x0, 0x0, 0x60000000, 0x0, 0xfffffe99, 0x0, 0x0}, 0x50) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000003000000040000000000"], 0x50) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={r3, 0x20, &(0x7f0000000800)={&(0x7f0000000680)=""/153, 0x99, 0x0, &(0x7f0000000740)=""/130, 0x82}}, 0x10) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0x0, 0x5, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x4, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="85000000a6000000950026e71a8552123a6f0000000000008500000081000000"], &(0x7f0000000540)='GPL\x00', 0x101, 0x0, &(0x7f0000000580), 0x40f00, 0x13, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x2, 0xffff}, 0x8, 0x10, &(0x7f0000000640)={0x1, 0xd, 0x7b, 0x5}, 0x10, r9, r6, 0x0, &(0x7f00000008c0)=[r3, r8, r0, r10, r0, r6, r6, r3], 0x0, 0x10, 0x400, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000e00000b7080000000000007b8af8ff00000000bfa20000005620d0ebb33205e5710000ffffb703000008000000b7040000635c3e3599290abd27698797620000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r11, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r11], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r12}, 0x10) 3.099152824s ago: executing program 1 (id=8750): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0, r0}, 0x18) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x40089000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unlink(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00') r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000000)='cpu&\t\t') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@raw=[@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffa}, @snprintf], &(0x7f0000000280)='syzkaller\x00', 0x12, 0x36, &(0x7f00000002c0)=""/54, 0x41100, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000780)={0x2, 0x3, 0x486d, 0x9}, 0x10, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000800)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000840)=[{0x0, 0x4, 0x4, 0x3}, {0x0, 0x3, 0x1, 0x9}, {0x3, 0x1, 0x7, 0x9}, {0x4, 0x5, 0x7, 0x5}, {0x1, 0x2, 0xc, 0x8}], 0x10, 0x7, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r4 = syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001d00)=ANY=[@ANYBLOB="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", @ANYRESOCT=r4], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_open_procfs$namespace(r4, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="b4000000000400000f1000000000000063000000000000009500050000000000622167cc525a970268e17740a38f02925549625b01a53d0a078072b0e1"], 0x0, 0x2, 0xba, &(0x7f000000cf3d)=""/186, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 3.098210714s ago: executing program 4 (id=8752): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000740)=ANY=[@ANYBLOB="8500000007000000350000000000ba00850000007d00000095000000000000004cf12aa56cd902e2bcccc7933216c775f4ca019700f81f06a9cf64f5e0a141d524581835d8050864d20000000201000000fa22beb5cf918d4aec7520ea98165b61a3cf5fc6dd8442230e7953f91136aa1f7035175135230163cf09494997cb0269fc9c7d49313ad360e5158a10861aaac07bdef9798e1c8fee9ed0f9dce435554bc34e6bdea4217ce4a98af8ad0887c697acd962000a9c13ecee6156c599c7b293de0019b27de967bfb3fe241454a04080bf668ce021879c820f9b80fe2338a894113532b18ac1440000000000000000000000000000004daac70ad892dd079b9f63237fd1fb7172e92af51bd123e665aa5424d28b055f23e9775ae17049b7226f795d551790818818d2e1f186ebe26e72"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x15) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x3abe, 0x4000000, r1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x2, 0x0, 0x0, 0x0) getpid() r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@fwd={0xd}]}, {0x0, [0x5f, 0x61, 0x0, 0x2e, 0x61, 0x61]}}, &(0x7f0000000340)=""/86, 0x2c, 0x56, 0x1, 0x6, 0x10000, @value}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x5, 0x4, 0x9, 0x7fff, 0x4400c, r1, 0x6, '\x00', 0x0, r3, 0x2, 0x4, 0x4, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r0, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0, 0x0], 0x0, 0x6e, &(0x7f0000000700)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0x37, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0)={0x0, r4}, 0x8) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) 2.991860434s ago: executing program 4 (id=8754): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000fc0)={0xffffffffffffffff}) sendmsg$inet(r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000340)="63eced8e46dc3f0adf33c9f7b95c", 0x0, 0x1101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xb4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001cc0)={&(0x7f0000002180)=ANY=[], &(0x7f0000001d80)=""/184, 0xaa, 0xb8, 0x1, 0x400, 0x10000, @value}, 0x28) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x76}, [@call={0x27}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3f) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=@base={0xf, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x37) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0xf, &(0x7f00000016c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000240)={@map=r4, r7, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r4}, &(0x7f0000000100), &(0x7f0000000140)=r3}, 0x20) sendmsg(r5, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000001400)='H', 0x20001401}], 0x1}, 0x0) 2.991068344s ago: executing program 0 (id=8755): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0, r0}, 0x18) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x40089000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unlink(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00') r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000000)='cpu&\t\t') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@raw=[@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffa}, @snprintf], &(0x7f0000000280)='syzkaller\x00', 0x12, 0x36, &(0x7f00000002c0)=""/54, 0x41100, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000780)={0x2, 0x3, 0x486d, 0x9}, 0x10, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000800)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000840)=[{0x0, 0x4, 0x4, 0x3}, {0x0, 0x3, 0x1, 0x9}, {0x3, 0x1, 0x7, 0x9}, {0x4, 0x5, 0x7, 0x5}, {0x1, 0x2, 0xc, 0x8}], 0x10, 0x7, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r4 = syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001d00)=ANY=[@ANYBLOB="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", @ANYRESOCT=r4], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_open_procfs$namespace(r4, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="b4000000000400000f1000000000000063000000000000009500050000000000622167cc525a970268e17740a38f02925549625b01a53d0a078072b0e1"], 0x0, 0x2, 0xba, &(0x7f000000cf3d)=""/186, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 2.305307697s ago: executing program 1 (id=8756): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x100}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000fc0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000002100)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000340)="63eced8e46dc3f0adf33c9f7b95c", 0x0, 0x1101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xb4) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x76}, [@call={0x27}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3f) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=@base={0xf, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x37) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00'], 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0xf, &(0x7f00000016c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000240)={@map=r3, r6, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r3}, &(0x7f0000000100), &(0x7f0000000140)=r2}, 0x20) sendmsg(r4, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000001400)='H', 0x20001401}], 0x1}, 0x0) 2.201904217s ago: executing program 3 (id=8757): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x27, &(0x7f0000000280)=@framed={{}, [@ringbuf_query, @printk={@lx}, @printk, @printk={@d}, @printk={@lli}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x2, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000300000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000003c0)='workqueue_activate_work\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) gettid() ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000280)={'wg2\x00'}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8946, &(0x7f0000000900)={'syz_tun\x00', @random='\x00\x00\x00 \x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0xc5, [{0x0, 0x3, 0x5}, {0x0, 0x3}]}]}}, 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 2.138002923s ago: executing program 4 (id=8758): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x3a, 0x3a, 0x0, &(0x7f0000000200)="e460cdfbef2408322900119386dd6a00000000072feb311ccd3ec8a755c1e1380081ffad008036e8d50000ff010000001400000500242f09880b", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x50) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x31) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000040)=[0x0], &(0x7f0000000080)=[0x0, 0x0], 0x0, 0xe1, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0xb7, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x2, 0x17, &(0x7f0000000880)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {0x85, 0x0, 0x0, 0x76}}, {{0x6, 0x0, 0x2, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='tlb_flush\x00', r4}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0xa, 0x2, 0xb4b9, 0x9, 0x420, r3, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x2, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 2.114166255s ago: executing program 3 (id=8759): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x2a) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='mm_page_alloc\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) syz_clone(0x8a2c0080, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='net_prio.prioidx\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1, 0x0, 0x0, 0x300}, 0x1f00) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/net\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 2.073061169s ago: executing program 0 (id=8760): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000005000000020000000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000fdff00"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000050018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000004a0a1f0a55377badb38f0000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0500000004000000040000000400000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 1.765586137s ago: executing program 1 (id=8761): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8e, 0x8001, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xe30a, r0, 0x0, 0xae30000}, 0x38) 1.612447971s ago: executing program 1 (id=8762): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x14) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000580)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0500000004000000040000000400000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 1.469960094s ago: executing program 3 (id=8763): bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 1.271296703s ago: executing program 4 (id=8764): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000b00)='q', 0x1}], 0x1}, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000a40)=""/4096) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x9) syz_clone(0x20010, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xa, 0x31, &(0x7f0000001ac0)=ANY=[@ANYBLOB="98000000100000fbffffff00ff07000018994644a0463488f15d88110000ac09", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000000600000085000000440000001847000005000000000000000000000018000000560000000000000006000000b7080000000000007b8af8ff00000000b7080000c20800007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a5000000185b00000200000000000000000000008510000005000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41000, 0x50, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x1, 0x80000000, 0x80000001}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, &(0x7f00000003c0)=[r0], &(0x7f0000000400)=[{0x2, 0x5, 0x4, 0xa}], 0x10, 0x3, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x9, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000c30d0000040000000500000018000000f8ffffff00000000fbffffff9500000000000000"], &(0x7f0000000040)='GPL\x00', 0x29, 0x0, 0x0, 0x41100, 0x3a, '\x00', r7, @fallback=0x2d, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, r8, 0x1, 0x0, &(0x7f0000000740)=[{0x0, 0x4, 0x10, 0x6}], 0x10, 0xfffffffc, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r9}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f00850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r10}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x2, 0x1, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 1.171730982s ago: executing program 0 (id=8765): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000005c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{}, &(0x7f0000000040)=0x18, 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xb, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200002000000000000000000000008500000027000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0x2e, 0x0, &(0x7f0000000300)="0000000000000000001ad6000030741218751f202817a7431e2c05414cc2e795e683c252d9743e1b216cd6312748", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8e, 0x8001, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0xfede) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xe30a, r1}, 0x38) 941.318774ms ago: executing program 0 (id=8766): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x100}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000fc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x16}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0x32e}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r3, &(0x7f0000001140)={0x0, 0x5, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x1000}], 0x1}, 0x40000100) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000002100)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001cc0)={&(0x7f0000002180)=ANY=[], &(0x7f0000001d80)=""/184, 0xaa, 0xb8, 0x1, 0x400, 0x10000, @value}, 0x28) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x76}, [@call={0x27}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3f) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=@base={0xf, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x37) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00'], 0x48) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0xf, &(0x7f00000016c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000240)={@map=r5, r8, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r5}, &(0x7f0000000100), &(0x7f0000000140)=r4}, 0x20) sendmsg(r6, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000001400)='H', 0x20001401}], 0x1}, 0x0) 864.15246ms ago: executing program 4 (id=8767): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000fc0)={0xffffffffffffffff}) sendmsg$inet(r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000340)="63eced8e46dc3f0adf33c9f7b95c", 0x0, 0x1101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xb4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001cc0)={&(0x7f0000002180)=ANY=[], &(0x7f0000001d80)=""/184, 0xaa, 0xb8, 0x1, 0x400, 0x10000, @value}, 0x28) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x76}, [@call={0x27}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3f) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=@base={0xf, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x37) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0xf, &(0x7f00000016c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000240)={@map=r4, r7, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r4}, &(0x7f0000000100), &(0x7f0000000140)=r3}, 0x20) sendmsg(r5, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000001400)='H', 0x20001401}], 0x1}, 0x0) 765.314569ms ago: executing program 1 (id=8768): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x27, &(0x7f0000000280)=@framed={{}, [@ringbuf_query, @printk={@lx}, @printk, @printk={@d}, @printk={@lli}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x2, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000300000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000003c0)='workqueue_activate_work\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) gettid() ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000280)={'wg2\x00'}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8946, &(0x7f0000000900)={'syz_tun\x00', @random='\x00\x00\x00 \x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0xc5, [{0x0, 0x3, 0x5}, {0x0, 0x3}]}]}}, 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 679.570537ms ago: executing program 1 (id=8769): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0, r0}, 0x18) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x40089000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unlink(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00') r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000000)='cpu&\t\t') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@raw=[@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffa}, @snprintf], &(0x7f0000000280)='syzkaller\x00', 0x12, 0x36, &(0x7f00000002c0)=""/54, 0x41100, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000780)={0x2, 0x3, 0x486d, 0x9}, 0x10, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000800)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000840)=[{0x0, 0x4, 0x4, 0x3}, {0x0, 0x3, 0x1, 0x9}, {0x3, 0x1, 0x7, 0x9}, {0x4, 0x5, 0x7, 0x5}, {0x1, 0x2, 0xc, 0x8}], 0x10, 0x7, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r4 = syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001d00)=ANY=[@ANYBLOB="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", @ANYRESOCT=r4], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_open_procfs$namespace(r4, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="b4000000000400000f1000000000000063000000000000009500050000000000622167cc525a970268e17740a38f02925549625b01a53d0a078072b0e1"], 0x0, 0x2, 0xba, &(0x7f000000cf3d)=""/186, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 425.371841ms ago: executing program 3 (id=8770): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00'}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000085000000ba00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000a40)={&(0x7f0000000680)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f00000009c0)=[{&(0x7f0000000700)="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", 0xfd}, {&(0x7f0000000800)="5811b1401e465ca6b6b5acac1a3ef8afdd39724cfec263946e9fed86b523309e16", 0x21}, {&(0x7f0000000840)="e5856030c4b9adf0717d3577fcc83ef9c78c787a3bab1c16b771616d4a3e2bae98061c6e102861024ae643e726fb484587108a1f6d9b0af4a083d8f8769eb3a31a16bcde42df10428da1724fa83ac7859b0a723df3f047ca6b46b61eaecb6015a03b43d627b43e75903f34e49ed4cab96f0c265a94b4e3f6d688bc84846a30b3beae9b40bc41071943da4a20c3430372dced5fa68347ad20d086f189e53680d1ff6ef3064dcb0461d3c0b9f7cbab561fcf433e4cdfd917a3413c4cc1c25e698608ca48b9187af6cf848c1511d3ba1799ae381642fb13a1", 0xd7}, {&(0x7f0000000940)="8736f19b8483b5d34d2b5a354df281456643414955a86e7e8c858bc41044f73dd987be9fb381b013fe1300053d0a7590b0d6f55250222e1eff561dd64e670fe6a051c5fc12572bcf8fb54b3400609455fad9b53e8a2bb62f35cae2caf7dc5619e4f4adc4f7fb4c3ba35eaac06b1e6ae912668145b3082a2f", 0x78}], 0x4, &(0x7f0000000a00)=[@rights={{0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}}], 0x28, 0x20000841}, 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRES64=r3], 0x34100) write$cgroup_int(r3, &(0x7f0000000000)=0x6, 0x12) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000a80)=r3, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x5, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xfc, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0xa1, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@bloom_filter={0x1e, 0x80, 0x1, 0x9, 0x1040, 0xffffffffffffffff, 0xe, '\x00', r4, 0xffffffffffffffff, 0x4, 0x4, 0x0, 0x4, @void, @value, @void, @value}, 0x48) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200)=0xffffffffffffffff, 0x4) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x6, 0x1, 0x9, 0xd2, 0x1000, 0xffffffffffffffff, 0x1da3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)=@generic={&(0x7f0000000340)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{0x1, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x7, &(0x7f0000000040)=@raw=[@generic={0x5, 0xb, 0x5, 0x1ec, 0x6}, @jmp={0x5, 0x0, 0x6, 0x3, 0x8, 0xffffffffffffffff, 0x8}, @alu={0x7, 0x0, 0xa, 0xb, 0x2, 0x30, 0xfffffffffffffff0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x1}], &(0x7f00000000c0)='GPL\x00', 0x37afafe1, 0xfe, &(0x7f0000000100)=""/254, 0x40f00, 0x3ca103745c8c8604, '\x00', r4, 0x0, r5, 0x8, &(0x7f0000000240)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xc, 0xc00000, 0xa943}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000480)=[r6, 0x1, 0xffffffffffffffff, r7, 0xffffffffffffffff, r8], &(0x7f0000000580)=[{0x3, 0x4, 0xb, 0x5}, {0x5, 0x1, 0xe, 0x6}, {0x0, 0x4, 0x5, 0x9}, {0x5, 0x3, 0x2, 0x1}, {0x4, 0x3, 0x5, 0xb}], 0x10, 0x5, @void, @value}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="05688b00010000008e0000000180000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xe30a, r9}, 0x38) 340.526439ms ago: executing program 3 (id=8771): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x100}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000fc0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000002100)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000340)="63eced8e46dc3f0adf33c9f7b95c", 0x0, 0x1101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xb4) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x76}, [@call={0x27}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3f) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=@base={0xf, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x37) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00'], 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0xf, &(0x7f00000016c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000240)={@map=r3, r6, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r3}, &(0x7f0000000100), &(0x7f0000000140)=r2}, 0x20) sendmsg(r4, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000001400)='H', 0x20001401}], 0x1}, 0x0) 70.090823ms ago: executing program 0 (id=8772): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1a"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xffffffffffffff52) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd020f4c0c8c56147d66527da307bf731fef97861750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3665f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447c2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72e7ead0509d380578673f8b6e74ce23877a6b24db0000000000000003629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d7b90dfae158b94f50adab988dd8e12b1b56073d0d10f7067c881434af5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf77bfc95769a9294df517d90bdc01e73835efd98ad5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b31592479ecf2392548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbe1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5646ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4766e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec859c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f250057931d828ec78e116ae46c4897e2795b6ff92e9a1f63a6ed8fb4f8f3a6ec4e76f8621e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403f02734137ff47257f164391c673b6071b6ad0f05eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb79f5589829b6b0679b5d65a81826fc9b38f791c8f1892b51ad65a89bc84646ebf78f5d5d4804d9abb071fd711b5e7cc163b42a6510b8f5ee6747df0b560eabe0499bf1fef7c18bb9f55effa018679845c6598fb78bf1b8d9d9f04a5f6062c2bbb91952755b3f7c948268cb647d0a0bb1286480615941154a01d23734bcafe3b164474e2f2efa77850686ee4541f3e79efa63545a7ae53d5f0c40cc86473f7eb093980bd0d97bb4750128d9c519984c5f731ea259e71b2f12d67ce12e52c283e74594dfc933e625737ed231d61263721d46daf093f770357cd78fe1431aef52b4a0a933f1a5334ad03f3876fc8a8e187f80318427b4c922075cf829e3cc49d71d52137b48e1fb6b05dd1c7b251a7059f0a4b4f3431f67fc65b75c202e43816e34ff41db85bacd77b25242830b788ae1e00"/2566], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x5, 0x0, 0x0, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xd, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1.05151ms ago: executing program 0 (id=8773): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x2a) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='mm_page_alloc\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) syz_clone(0x8a2c0080, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='net_prio.prioidx\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1, 0x0, 0x0, 0x300}, 0x1f00) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/net\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 468.09µs ago: executing program 3 (id=8774): bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x51, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000280)=ANY=[@ANYBLOB="0600000004000000050000005c00000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000ea8a6167c7c1f822f34f785497f715b00e47df8f387269377b0c523d2679a6582e9d2db97f43fa6828785a30aa4395db0929633fed29dfa1740777e9dc0b26ac1098a10e0673bf0133f1aac8a336746335d4b4e9", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000feffffff00"/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x40}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x79, 0x10, 0x68}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x22e, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0x29, 0x0, 0xa, &(0x7f0000000340)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r5, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 0s ago: executing program 4 (id=8775): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000005000000020000000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000fdff00"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000050018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000004a0a1f0a55377badb38f0000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0500000004000000040000000400000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) kernel console output (not intermixed with test programs): : ffffffffffffffda RBX: 00007fa4c2f35f80 RCX: 00007fa4c2d7def9 [ 740.096474][T17588] RDX: 0000000000000038 RSI: 0000000020000200 RDI: 000000000000001a [ 740.104287][T17588] RBP: 00007fa4c3aaa090 R08: 0000000000000000 R09: 0000000000000000 [ 740.112100][T17588] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 740.119910][T17588] R13: 0000000000000000 R14: 00007fa4c2f35f80 R15: 00007ffc5df03ca8 [ 740.127814][T17588] [ 741.527431][T17639] bridge0: port 2(bridge_slave_1) entered disabled state [ 741.534728][T17639] bridge0: port 1(bridge_slave_0) entered disabled state [ 741.559438][T17639] device bridge0 left promiscuous mode [ 741.578850][T17639] device bridge_slave_1 left promiscuous mode [ 741.628580][T17639] bridge0: port 2(bridge_slave_1) entered disabled state [ 741.661440][T17639] device bridge_slave_0 left promiscuous mode [ 741.667651][T17639] bridge0: port 1(bridge_slave_0) entered disabled state [ 745.666632][T17737] device syzkaller0 entered promiscuous mode [ 746.198681][T17764] bond_slave_1: mtu greater than device maximum [ 746.271813][T17764] device vxcan1 entered promiscuous mode [ 750.773380][T17828] bridge0: port 1(bridge_slave_0) entered blocking state [ 750.815697][T17828] bridge0: port 1(bridge_slave_0) entered disabled state [ 750.857779][T17828] device bridge_slave_0 entered promiscuous mode [ 750.876376][T17828] bridge0: port 2(bridge_slave_1) entered blocking state [ 750.954268][T17828] bridge0: port 2(bridge_slave_1) entered disabled state [ 751.000245][T17828] device bridge_slave_1 entered promiscuous mode [ 751.267848][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 751.275168][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 751.283918][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 751.292389][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 751.304604][ T387] bridge0: port 1(bridge_slave_0) entered blocking state [ 751.311597][ T387] bridge0: port 1(bridge_slave_0) entered forwarding state [ 751.331011][ T1884] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 751.338549][ T1884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 751.346985][ T1884] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 751.355090][ T1884] bridge0: port 2(bridge_slave_1) entered blocking state [ 751.361949][ T1884] bridge0: port 2(bridge_slave_1) entered forwarding state [ 751.369226][ T1884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 751.377106][ T1884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 751.392144][T17828] device veth0_vlan entered promiscuous mode [ 751.399748][ T1884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 751.407619][ T1884] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 751.414927][ T1884] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 751.422322][ T1884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 751.434544][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 751.443654][T17828] device veth1_macvtap entered promiscuous mode [ 751.453244][ T1884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 751.466587][ T1884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 754.289344][T17909] FAULT_INJECTION: forcing a failure. [ 754.289344][T17909] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 754.389344][T17909] CPU: 0 PID: 17909 Comm: syz.4.5663 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 754.399000][T17909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 754.409016][T17909] Call Trace: [ 754.412135][T17909] [ 754.414913][T17909] dump_stack_lvl+0x151/0x1b7 [ 754.419427][T17909] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 754.424721][T17909] ? migrate_enable+0x1cb/0x2b0 [ 754.429411][T17909] dump_stack+0x15/0x1c [ 754.433403][T17909] should_fail_ex+0x3d0/0x520 [ 754.437918][T17909] should_fail+0xb/0x10 [ 754.441943][T17909] should_fail_usercopy+0x1a/0x20 [ 754.446766][T17909] _copy_to_user+0x1e/0x90 [ 754.451021][T17909] generic_map_update_batch+0x6fe/0x8c0 [ 754.456403][T17909] ? generic_map_delete_batch+0x5c0/0x5c0 [ 754.461968][T17909] ? generic_map_delete_batch+0x5c0/0x5c0 [ 754.467513][T17909] bpf_map_do_batch+0x4cc/0x630 [ 754.472203][T17909] __sys_bpf+0x66b/0x7f0 [ 754.476278][T17909] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 754.481493][T17909] ? __ia32_sys_read+0x90/0x90 [ 754.486094][T17909] ? debug_smp_processor_id+0x17/0x20 [ 754.491292][T17909] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 754.497198][T17909] __x64_sys_bpf+0x7c/0x90 [ 754.501447][T17909] x64_sys_call+0x87f/0x9a0 [ 754.505787][T17909] do_syscall_64+0x3b/0xb0 [ 754.510042][T17909] ? clear_bhb_loop+0x55/0xb0 [ 754.514550][T17909] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 754.520281][T17909] RIP: 0033:0x7fa44d97def9 [ 754.524536][T17909] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 754.543975][T17909] RSP: 002b:00007fa44e802038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 754.552222][T17909] RAX: ffffffffffffffda RBX: 00007fa44db36058 RCX: 00007fa44d97def9 [ 754.560029][T17909] RDX: 0000000000000027 RSI: 00000000200001c0 RDI: 000000000000001a [ 754.568016][T17909] RBP: 00007fa44e802090 R08: 0000000000000000 R09: 0000000000000000 [ 754.575825][T17909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 754.583636][T17909] R13: 0000000000000000 R14: 00007fa44db36058 R15: 00007ffcaf30c218 [ 754.591467][T17909] [ 762.870284][ T3059] device bridge_slave_1 left promiscuous mode [ 762.876216][ T3059] bridge0: port 2(bridge_slave_1) entered disabled state [ 762.883730][ T3059] device bridge_slave_0 left promiscuous mode [ 762.890048][ T3059] bridge0: port 1(bridge_slave_0) entered disabled state [ 762.897894][ T3059] device veth1_macvtap left promiscuous mode [ 762.903845][ T3059] device veth0_vlan left promiscuous mode [ 764.221327][T18023] bridge0: port 1(bridge_slave_0) entered blocking state [ 764.229039][T18023] bridge0: port 1(bridge_slave_0) entered disabled state [ 764.270191][T18023] device bridge_slave_0 entered promiscuous mode [ 764.290193][T18023] bridge0: port 2(bridge_slave_1) entered blocking state [ 764.315712][T18023] bridge0: port 2(bridge_slave_1) entered disabled state [ 764.333337][T18023] device bridge_slave_1 entered promiscuous mode [ 767.971833][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 767.980043][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 768.001003][ T1884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 768.010354][ T1884] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 768.018373][ T1884] bridge0: port 1(bridge_slave_0) entered blocking state [ 768.025243][ T1884] bridge0: port 1(bridge_slave_0) entered forwarding state [ 768.040869][ T1884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 768.049092][ T1884] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 768.057928][ T1884] bridge0: port 2(bridge_slave_1) entered blocking state [ 768.064800][ T1884] bridge0: port 2(bridge_slave_1) entered forwarding state [ 768.071991][ T1884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 768.080166][ T1884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 768.115263][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 768.148789][T18023] device veth0_vlan entered promiscuous mode [ 768.188123][ T1884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 768.196606][ T1884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 768.205296][ T1884] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 768.212989][ T1884] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 768.228978][T18050] device veth0_vlan left promiscuous mode [ 768.278753][T18050] device veth0_vlan entered promiscuous mode [ 768.343406][ T1884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 768.361760][T18023] device veth1_macvtap entered promiscuous mode [ 768.423853][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 768.487473][ T1884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 770.932803][T18099] device veth0_vlan left promiscuous mode [ 770.947443][T18099] device veth0_vlan entered promiscuous mode [ 771.041844][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 771.090653][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 771.200364][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 771.746156][T18123] FAULT_INJECTION: forcing a failure. [ 771.746156][T18123] name failslab, interval 1, probability 0, space 0, times 0 [ 771.789629][T18123] CPU: 1 PID: 18123 Comm: syz.0.5720 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 771.799282][T18123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 771.809177][T18123] Call Trace: [ 771.812296][T18123] [ 771.815077][T18123] dump_stack_lvl+0x151/0x1b7 [ 771.819590][T18123] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 771.824889][T18123] ? avc_has_perm+0x16f/0x260 [ 771.829419][T18123] dump_stack+0x15/0x1c [ 771.833478][T18123] should_fail_ex+0x3d0/0x520 [ 771.838086][T18123] __should_failslab+0xaf/0xf0 [ 771.842773][T18123] should_failslab+0x9/0x20 [ 771.847205][T18123] slab_pre_alloc_hook+0x2e/0x1b0 [ 771.852209][T18123] kmem_cache_alloc_lru+0x49/0x220 [ 771.857151][T18123] ? sock_alloc_inode+0x28/0xc0 [ 771.861850][T18123] sock_alloc_inode+0x28/0xc0 [ 771.866350][T18123] ? sockfs_init_fs_context+0xb0/0xb0 [ 771.871563][T18123] new_inode_pseudo+0x65/0x1d0 [ 771.876155][T18123] __sock_create+0x135/0x760 [ 771.880583][T18123] __sys_socketpair+0x29f/0x6e0 [ 771.885269][T18123] ? __ia32_sys_socket+0x90/0x90 [ 771.890044][T18123] ? __ia32_sys_read+0x90/0x90 [ 771.894652][T18123] ? debug_smp_processor_id+0x17/0x20 [ 771.899846][T18123] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 771.905759][T18123] __x64_sys_socketpair+0x9b/0xb0 [ 771.910609][T18123] x64_sys_call+0x19b/0x9a0 [ 771.914952][T18123] do_syscall_64+0x3b/0xb0 [ 771.919204][T18123] ? clear_bhb_loop+0x55/0xb0 [ 771.923720][T18123] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 771.929441][T18123] RIP: 0033:0x7fd44657def9 [ 771.933699][T18123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 771.953244][T18123] RSP: 002b:00007fd44740e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 771.961480][T18123] RAX: ffffffffffffffda RBX: 00007fd446735f80 RCX: 00007fd44657def9 [ 771.969313][T18123] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 771.977115][T18123] RBP: 00007fd44740e090 R08: 0000000000000000 R09: 0000000000000000 [ 771.985025][T18123] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 771.992836][T18123] R13: 0000000000000000 R14: 00007fd446735f80 R15: 00007ffdb2a2fc08 [ 772.000653][T18123] [ 772.021566][T18123] socket: no more sockets [ 772.741268][T18147] device veth0_vlan left promiscuous mode [ 772.785489][T18147] device veth0_vlan entered promiscuous mode [ 773.155441][T18154] bridge0: port 1(bridge_slave_0) entered blocking state [ 773.163605][T18154] bridge0: port 1(bridge_slave_0) entered disabled state [ 773.179866][T18154] device bridge_slave_0 entered promiscuous mode [ 773.186863][T18154] bridge0: port 2(bridge_slave_1) entered blocking state [ 773.194819][T18154] bridge0: port 2(bridge_slave_1) entered disabled state [ 773.202437][T18154] device bridge_slave_1 entered promiscuous mode [ 773.307064][T18154] bridge0: port 2(bridge_slave_1) entered blocking state [ 773.313954][T18154] bridge0: port 2(bridge_slave_1) entered forwarding state [ 773.321040][T18154] bridge0: port 1(bridge_slave_0) entered blocking state [ 773.327810][T18154] bridge0: port 1(bridge_slave_0) entered forwarding state [ 773.343151][T18164] bridge0: port 1(bridge_slave_0) entered blocking state [ 773.350164][T18164] bridge0: port 1(bridge_slave_0) entered disabled state [ 773.357476][T18164] device bridge_slave_0 entered promiscuous mode [ 773.364563][T18164] bridge0: port 2(bridge_slave_1) entered blocking state [ 773.371666][T18164] bridge0: port 2(bridge_slave_1) entered disabled state [ 773.378926][T18164] device bridge_slave_1 entered promiscuous mode [ 773.447797][ T1884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 773.455552][ T1884] bridge0: port 1(bridge_slave_0) entered disabled state [ 773.462928][ T1884] bridge0: port 2(bridge_slave_1) entered disabled state [ 773.475902][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 773.484115][ T40] bridge0: port 1(bridge_slave_0) entered blocking state [ 773.490979][ T40] bridge0: port 1(bridge_slave_0) entered forwarding state [ 773.510524][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 773.518605][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 773.525560][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 773.532880][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 773.540933][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 773.558289][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 773.575647][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 773.584555][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 773.592068][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 773.611234][T18154] device veth0_vlan entered promiscuous mode [ 773.622737][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 773.633556][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 773.641678][ T295] bridge0: port 1(bridge_slave_0) entered blocking state [ 773.648514][ T295] bridge0: port 1(bridge_slave_0) entered forwarding state [ 773.656621][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 773.672681][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 773.680719][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 773.688731][ T295] bridge0: port 2(bridge_slave_1) entered blocking state [ 773.695598][ T295] bridge0: port 2(bridge_slave_1) entered forwarding state [ 773.706032][T18154] device veth1_macvtap entered promiscuous mode [ 773.723656][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 773.735132][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 773.743171][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 773.762462][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 773.780547][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 773.798237][T18164] device veth0_vlan entered promiscuous mode [ 773.806866][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 773.815494][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 773.823381][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 773.842625][T18164] device veth1_macvtap entered promiscuous mode [ 773.849869][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 773.862672][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 773.872658][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 774.059547][T18180] FAULT_INJECTION: forcing a failure. [ 774.059547][T18180] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 774.145787][T18180] CPU: 1 PID: 18180 Comm: syz.0.5745 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 774.155441][T18180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 774.165338][T18180] Call Trace: [ 774.168459][T18180] [ 774.171240][T18180] dump_stack_lvl+0x151/0x1b7 [ 774.175751][T18180] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 774.181048][T18180] ? task_rq_lock+0xd2/0x2b0 [ 774.185476][T18180] dump_stack+0x15/0x1c [ 774.189463][T18180] should_fail_ex+0x3d0/0x520 [ 774.194064][T18180] should_fail+0xb/0x10 [ 774.198066][T18180] should_fail_usercopy+0x1a/0x20 [ 774.202917][T18180] _copy_to_user+0x1e/0x90 [ 774.207257][T18180] __htab_map_lookup_and_delete_batch+0x1eb4/0x2220 [ 774.213683][T18180] ? avc_denied+0x1b0/0x1b0 [ 774.218032][T18180] ? lookup_nulls_elem_raw+0x170/0x170 [ 774.223322][T18180] ? __fget_files+0x2cb/0x330 [ 774.227833][T18180] htab_percpu_map_lookup_batch+0x30/0x40 [ 774.233379][T18180] ? __htab_percpu_map_update_elem+0x790/0x790 [ 774.239382][T18180] bpf_map_do_batch+0x2e2/0x630 [ 774.244058][T18180] __sys_bpf+0x66b/0x7f0 [ 774.248158][T18180] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 774.253352][T18180] ? __ia32_sys_read+0x90/0x90 [ 774.257942][T18180] ? debug_smp_processor_id+0x17/0x20 [ 774.263153][T18180] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 774.269055][T18180] __x64_sys_bpf+0x7c/0x90 [ 774.273309][T18180] x64_sys_call+0x87f/0x9a0 [ 774.277647][T18180] do_syscall_64+0x3b/0xb0 [ 774.282684][T18180] ? clear_bhb_loop+0x55/0xb0 [ 774.287194][T18180] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 774.292921][T18180] RIP: 0033:0x7fd44657def9 [ 774.297177][T18180] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 774.316620][T18180] RSP: 002b:00007fd4473ed038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 774.324866][T18180] RAX: ffffffffffffffda RBX: 00007fd446736058 RCX: 00007fd44657def9 [ 774.332671][T18180] RDX: 0000000000000038 RSI: 0000000020000080 RDI: 0000000000000018 [ 774.340481][T18180] RBP: 00007fd4473ed090 R08: 0000000000000000 R09: 0000000000000000 [ 774.348297][T18180] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 774.356110][T18180] R13: 0000000000000000 R14: 00007fd446736058 R15: 00007ffdb2a2fc08 [ 774.363926][T18180] [ 774.373480][ T3059] device bridge_slave_1 left promiscuous mode [ 774.380642][ T3059] bridge0: port 2(bridge_slave_1) entered disabled state [ 774.388675][ T3059] device bridge_slave_0 left promiscuous mode [ 774.419518][ T3059] bridge0: port 1(bridge_slave_0) entered disabled state [ 774.526606][ T3059] device veth1_macvtap left promiscuous mode [ 774.554763][ T3059] device veth0_vlan left promiscuous mode [ 774.586041][ T3059] device veth1_macvtap left promiscuous mode [ 774.610577][ T3059] device veth0_vlan left promiscuous mode [ 775.969032][T18210] device veth0_vlan left promiscuous mode [ 775.986942][T18210] device veth0_vlan entered promiscuous mode [ 776.709039][T18229] FAULT_INJECTION: forcing a failure. [ 776.709039][T18229] name failslab, interval 1, probability 0, space 0, times 0 [ 776.732265][T18229] CPU: 0 PID: 18229 Comm: syz.0.5751 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 776.741929][T18229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 776.751823][T18229] Call Trace: [ 776.754941][T18229] [ 776.757805][T18229] dump_stack_lvl+0x151/0x1b7 [ 776.762318][T18229] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 776.767624][T18229] dump_stack+0x15/0x1c [ 776.771621][T18229] should_fail_ex+0x3d0/0x520 [ 776.776127][T18229] ? bpf_test_init+0xf1/0x190 [ 776.780634][T18229] __should_failslab+0xaf/0xf0 [ 776.785233][T18229] should_failslab+0x9/0x20 [ 776.789569][T18229] __kmem_cache_alloc_node+0x3d/0x250 [ 776.794780][T18229] ? bpf_test_init+0xf1/0x190 [ 776.799293][T18229] __kmalloc+0xa3/0x1e0 [ 776.803289][T18229] bpf_test_init+0xf1/0x190 [ 776.807625][T18229] bpf_prog_test_run_xdp+0x414/0x1130 [ 776.812923][T18229] ? dev_put+0x80/0x80 [ 776.816828][T18229] ? __kasan_check_write+0x14/0x20 [ 776.821861][T18229] ? fput+0x15b/0x1b0 [ 776.825673][T18229] ? dev_put+0x80/0x80 [ 776.829582][T18229] bpf_prog_test_run+0x3b0/0x630 [ 776.834357][T18229] ? bpf_prog_query+0x260/0x260 [ 776.839052][T18229] ? selinux_bpf+0xd2/0x100 [ 776.843390][T18229] ? security_bpf+0x82/0xb0 [ 776.847732][T18229] __sys_bpf+0x59f/0x7f0 [ 776.851802][T18229] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 776.857017][T18229] ? __ia32_sys_read+0x90/0x90 [ 776.861611][T18229] ? debug_smp_processor_id+0x17/0x20 [ 776.866814][T18229] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 776.872719][T18229] __x64_sys_bpf+0x7c/0x90 [ 776.876971][T18229] x64_sys_call+0x87f/0x9a0 [ 776.881312][T18229] do_syscall_64+0x3b/0xb0 [ 776.885565][T18229] ? clear_bhb_loop+0x55/0xb0 [ 776.890081][T18229] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 776.895978][T18229] RIP: 0033:0x7fd44657def9 [ 776.900232][T18229] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 776.919678][T18229] RSP: 002b:00007fd44740e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 776.927915][T18229] RAX: ffffffffffffffda RBX: 00007fd446735f80 RCX: 00007fd44657def9 [ 776.936111][T18229] RDX: 0000000000000050 RSI: 0000000020000040 RDI: 000000000000000a [ 776.944011][T18229] RBP: 00007fd44740e090 R08: 0000000000000000 R09: 0000000000000000 [ 776.951821][T18229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 776.959632][T18229] R13: 0000000000000000 R14: 00007fd446735f80 R15: 00007ffdb2a2fc08 [ 776.967450][T18229] [ 777.580867][T18251] FAULT_INJECTION: forcing a failure. [ 777.580867][T18251] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 777.677767][T18251] CPU: 0 PID: 18251 Comm: syz.1.5758 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 777.687419][T18251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 777.697311][T18251] Call Trace: [ 777.700435][T18251] [ 777.703212][T18251] dump_stack_lvl+0x151/0x1b7 [ 777.707726][T18251] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 777.713015][T18251] ? vfs_write+0x952/0xed0 [ 777.717267][T18251] ? __kasan_slab_free+0x11/0x20 [ 777.722041][T18251] dump_stack+0x15/0x1c [ 777.726035][T18251] should_fail_ex+0x3d0/0x520 [ 777.730549][T18251] should_fail+0xb/0x10 [ 777.734540][T18251] should_fail_usercopy+0x1a/0x20 [ 777.739398][T18251] _copy_from_user+0x1e/0xc0 [ 777.743828][T18251] __sys_bpf+0x23b/0x7f0 [ 777.747908][T18251] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 777.753118][T18251] ? __ia32_sys_read+0x90/0x90 [ 777.757715][T18251] ? debug_smp_processor_id+0x17/0x20 [ 777.762920][T18251] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 777.768821][T18251] __x64_sys_bpf+0x7c/0x90 [ 777.773081][T18251] x64_sys_call+0x87f/0x9a0 [ 777.777413][T18251] do_syscall_64+0x3b/0xb0 [ 777.781668][T18251] ? clear_bhb_loop+0x55/0xb0 [ 777.786271][T18251] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 777.792000][T18251] RIP: 0033:0x7fa4c2d7def9 [ 777.796248][T18251] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 777.815814][T18251] RSP: 002b:00007fa4c3aaa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 777.824056][T18251] RAX: ffffffffffffffda RBX: 00007fa4c2f35f80 RCX: 00007fa4c2d7def9 [ 777.831958][T18251] RDX: 0000000000000050 RSI: 0000000020000600 RDI: 000000000000000a [ 777.839766][T18251] RBP: 00007fa4c3aaa090 R08: 0000000000000000 R09: 0000000000000000 [ 777.847582][T18251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 777.855402][T18251] R13: 0000000000000000 R14: 00007fa4c2f35f80 R15: 00007ffc5df03ca8 [ 777.863208][T18251] [ 779.375633][T18294] FAULT_INJECTION: forcing a failure. [ 779.375633][T18294] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 779.473403][T18294] CPU: 1 PID: 18294 Comm: syz.1.5770 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 779.483146][T18294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 779.493044][T18294] Call Trace: [ 779.496163][T18294] [ 779.498938][T18294] dump_stack_lvl+0x151/0x1b7 [ 779.503455][T18294] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 779.508849][T18294] ? migrate_enable+0x1cb/0x2b0 [ 779.513550][T18294] dump_stack+0x15/0x1c [ 779.517528][T18294] should_fail_ex+0x3d0/0x520 [ 779.522046][T18294] should_fail+0xb/0x10 [ 779.526038][T18294] should_fail_usercopy+0x1a/0x20 [ 779.530988][T18294] _copy_from_user+0x1e/0xc0 [ 779.535408][T18294] generic_map_update_batch+0x4d9/0x8c0 [ 779.540809][T18294] ? generic_map_delete_batch+0x5c0/0x5c0 [ 779.546435][T18294] ? generic_map_delete_batch+0x5c0/0x5c0 [ 779.552076][T18294] bpf_map_do_batch+0x4cc/0x630 [ 779.556771][T18294] __sys_bpf+0x66b/0x7f0 [ 779.560843][T18294] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 779.566052][T18294] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 779.572039][T18294] __x64_sys_bpf+0x7c/0x90 [ 779.576292][T18294] x64_sys_call+0x87f/0x9a0 [ 779.580627][T18294] do_syscall_64+0x3b/0xb0 [ 779.584877][T18294] ? clear_bhb_loop+0x55/0xb0 [ 779.589391][T18294] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 779.595129][T18294] RIP: 0033:0x7fa4c2d7def9 [ 779.599606][T18294] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 779.619036][T18294] RSP: 002b:00007fa4c3aaa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 779.627277][T18294] RAX: ffffffffffffffda RBX: 00007fa4c2f35f80 RCX: 00007fa4c2d7def9 [ 779.635172][T18294] RDX: 0000000000000038 RSI: 0000000020000200 RDI: 000000000000001a [ 779.643072][T18294] RBP: 00007fa4c3aaa090 R08: 0000000000000000 R09: 0000000000000000 [ 779.650883][T18294] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 779.658781][T18294] R13: 0000000000000000 R14: 00007fa4c2f35f80 R15: 00007ffc5df03ca8 [ 779.666599][T18294] [ 780.651505][T18325] FAULT_INJECTION: forcing a failure. [ 780.651505][T18325] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 780.699210][T18325] CPU: 0 PID: 18325 Comm: syz.4.5781 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 780.709037][T18325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 780.718929][T18325] Call Trace: [ 780.722045][T18325] [ 780.724824][T18325] dump_stack_lvl+0x151/0x1b7 [ 780.729464][T18325] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 780.734756][T18325] dump_stack+0x15/0x1c [ 780.738747][T18325] should_fail_ex+0x3d0/0x520 [ 780.743271][T18325] should_fail+0xb/0x10 [ 780.747258][T18325] should_fail_usercopy+0x1a/0x20 [ 780.752117][T18325] _copy_from_user+0x1e/0xc0 [ 780.756540][T18325] generic_map_delete_batch+0x2c7/0x5c0 [ 780.761935][T18325] ? bpf_map_inc_not_zero+0x120/0x120 [ 780.767232][T18325] ? bpf_map_inc_not_zero+0x120/0x120 [ 780.772422][T18325] bpf_map_do_batch+0x4cc/0x630 [ 780.777125][T18325] __sys_bpf+0x66b/0x7f0 [ 780.781191][T18325] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 780.786403][T18325] ? __ia32_sys_read+0x90/0x90 [ 780.791004][T18325] ? debug_smp_processor_id+0x17/0x20 [ 780.796206][T18325] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 780.802109][T18325] __x64_sys_bpf+0x7c/0x90 [ 780.806362][T18325] x64_sys_call+0x87f/0x9a0 [ 780.810703][T18325] do_syscall_64+0x3b/0xb0 [ 780.814953][T18325] ? clear_bhb_loop+0x55/0xb0 [ 780.819464][T18325] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 780.825194][T18325] RIP: 0033:0x7f175b57def9 [ 780.829446][T18325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 780.848900][T18325] RSP: 002b:00007f175c428038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 780.857134][T18325] RAX: ffffffffffffffda RBX: 00007f175b735f80 RCX: 00007f175b57def9 [ 780.864946][T18325] RDX: 0000000000000038 RSI: 0000000020000080 RDI: 000000000000001b [ 780.872757][T18325] RBP: 00007f175c428090 R08: 0000000000000000 R09: 0000000000000000 [ 780.880568][T18325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 780.888376][T18325] R13: 0000000000000000 R14: 00007f175b735f80 R15: 00007ffe42d04da8 [ 780.896196][T18325] [ 781.014974][T18333] FAULT_INJECTION: forcing a failure. [ 781.014974][T18333] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 781.075414][T18333] CPU: 0 PID: 18333 Comm: syz.3.5792 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 781.085059][T18333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 781.094954][T18333] Call Trace: [ 781.098077][T18333] [ 781.100850][T18333] dump_stack_lvl+0x151/0x1b7 [ 781.105367][T18333] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 781.110669][T18333] ? migrate_enable+0x1cb/0x2b0 [ 781.115433][T18333] dump_stack+0x15/0x1c [ 781.119425][T18333] should_fail_ex+0x3d0/0x520 [ 781.123941][T18333] should_fail+0xb/0x10 [ 781.127927][T18333] should_fail_usercopy+0x1a/0x20 [ 781.132785][T18333] _copy_to_user+0x1e/0x90 [ 781.137041][T18333] generic_map_lookup_batch+0x778/0xcc0 [ 781.142521][T18333] ? bpf_map_update_value+0x410/0x410 [ 781.147730][T18333] ? __fdget+0x1b7/0x240 [ 781.151802][T18333] ? bpf_map_update_value+0x410/0x410 [ 781.157024][T18333] bpf_map_do_batch+0x2e2/0x630 [ 781.161699][T18333] __sys_bpf+0x66b/0x7f0 [ 781.165778][T18333] ? clockevents_program_event+0x22f/0x300 [ 781.171423][T18333] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 781.176733][T18333] ? __sched_clock_gtod_offset+0x100/0x100 [ 781.182375][T18333] ? debug_smp_processor_id+0x17/0x20 [ 781.187675][T18333] __x64_sys_bpf+0x7c/0x90 [ 781.191919][T18333] x64_sys_call+0x87f/0x9a0 [ 781.196259][T18333] do_syscall_64+0x3b/0xb0 [ 781.200509][T18333] ? clear_bhb_loop+0x55/0xb0 [ 781.205023][T18333] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 781.210752][T18333] RIP: 0033:0x7f378b17def9 [ 781.215005][T18333] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 781.234452][T18333] RSP: 002b:00007f378bff8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 781.242691][T18333] RAX: ffffffffffffffda RBX: 00007f378b335f80 RCX: 00007f378b17def9 [ 781.250503][T18333] RDX: 0000000000000038 RSI: 00000000200003c0 RDI: 0000000000000018 [ 781.258314][T18333] RBP: 00007f378bff8090 R08: 0000000000000000 R09: 0000000000000000 [ 781.266211][T18333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 781.274025][T18333] R13: 0000000000000000 R14: 00007f378b335f80 R15: 00007fffaad2deb8 [ 781.281843][T18333] [ 783.349346][T18411] FAULT_INJECTION: forcing a failure. [ 783.349346][T18411] name failslab, interval 1, probability 0, space 0, times 0 [ 783.380241][T18411] CPU: 1 PID: 18411 Comm: syz.3.5802 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 783.389884][T18411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 783.399778][T18411] Call Trace: [ 783.402900][T18411] [ 783.405678][T18411] dump_stack_lvl+0x151/0x1b7 [ 783.410196][T18411] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 783.415488][T18411] ? security_inode_alloc+0x29/0x120 [ 783.420705][T18411] ? proc_pid_make_inode+0x27/0x1d0 [ 783.425726][T18411] ? proc_pident_lookup+0x1c5/0x270 [ 783.430766][T18411] ? proc_tid_base_lookup+0x2b/0x30 [ 783.435794][T18411] ? path_openat+0x10fd/0x2d60 [ 783.440397][T18411] ? do_sys_openat2+0x151/0x870 [ 783.445083][T18411] dump_stack+0x15/0x1c [ 783.449074][T18411] should_fail_ex+0x3d0/0x520 [ 783.453592][T18411] ? kvmalloc_node+0x221/0x640 [ 783.458188][T18411] __should_failslab+0xaf/0xf0 [ 783.462878][T18411] should_failslab+0x9/0x20 [ 783.467213][T18411] __kmem_cache_alloc_node+0x3d/0x250 [ 783.472434][T18411] ? kvmalloc_node+0x221/0x640 [ 783.477110][T18411] __kmalloc_node+0xa3/0x1e0 [ 783.481538][T18411] ? is_bpf_text_address+0x172/0x190 [ 783.486658][T18411] kvmalloc_node+0x221/0x640 [ 783.491092][T18411] ? __kernel_text_address+0xd/0x40 [ 783.496425][T18411] ? vm_mmap+0xb0/0xb0 [ 783.500329][T18411] ? arch_stack_walk+0xf3/0x140 [ 783.505098][T18411] ? bpf_test_run_xdp_live+0x30/0x1f70 [ 783.510396][T18411] bpf_test_run_xdp_live+0x213/0x1f70 [ 783.515610][T18411] ? stack_trace_snprint+0xf0/0xf0 [ 783.520553][T18411] ? __stack_depot_save+0x36/0x480 [ 783.525599][T18411] ? kasan_set_track+0x60/0x70 [ 783.530196][T18411] ? kasan_set_track+0x4b/0x70 [ 783.534884][T18411] ? kasan_save_alloc_info+0x1f/0x30 [ 783.540005][T18411] ? __kasan_kmalloc+0x9c/0xb0 [ 783.544604][T18411] ? __kmalloc+0xb4/0x1e0 [ 783.548773][T18411] ? bpf_prog_test_run_xdp+0x414/0x1130 [ 783.554149][T18411] ? xdp_convert_md_to_buff+0x360/0x360 [ 783.559529][T18411] ? x64_sys_call+0x87f/0x9a0 [ 783.564049][T18411] ? do_syscall_64+0x3b/0xb0 [ 783.568468][T18411] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 783.574383][T18411] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 783.580455][T18411] ? __kasan_check_write+0x14/0x20 [ 783.585400][T18411] ? _copy_from_user+0x90/0xc0 [ 783.590166][T18411] ? bpf_test_init+0x169/0x190 [ 783.594776][T18411] ? xdp_convert_md_to_buff+0x5d/0x360 [ 783.600079][T18411] bpf_prog_test_run_xdp+0x7d1/0x1130 [ 783.605393][T18411] ? dev_put+0x80/0x80 [ 783.609290][T18411] ? __kasan_check_write+0x14/0x20 [ 783.614226][T18411] ? fput+0x15b/0x1b0 [ 783.618051][T18411] ? dev_put+0x80/0x80 [ 783.621951][T18411] bpf_prog_test_run+0x3b0/0x630 [ 783.626812][T18411] ? bpf_prog_query+0x260/0x260 [ 783.631496][T18411] ? selinux_bpf+0xd2/0x100 [ 783.635933][T18411] ? security_bpf+0x82/0xb0 [ 783.640271][T18411] __sys_bpf+0x59f/0x7f0 [ 783.644361][T18411] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 783.649566][T18411] ? __ia32_sys_read+0x90/0x90 [ 783.654160][T18411] ? debug_smp_processor_id+0x17/0x20 [ 783.659361][T18411] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 783.665264][T18411] __x64_sys_bpf+0x7c/0x90 [ 783.669521][T18411] x64_sys_call+0x87f/0x9a0 [ 783.673855][T18411] do_syscall_64+0x3b/0xb0 [ 783.678108][T18411] ? clear_bhb_loop+0x55/0xb0 [ 783.682625][T18411] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 783.688442][T18411] RIP: 0033:0x7f378b17def9 [ 783.692692][T18411] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 783.712131][T18411] RSP: 002b:00007f378bff8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 783.720379][T18411] RAX: ffffffffffffffda RBX: 00007f378b335f80 RCX: 00007f378b17def9 [ 783.728198][T18411] RDX: 0000000000000069 RSI: 00000000200002c0 RDI: 000000000000000a [ 783.735999][T18411] RBP: 00007f378bff8090 R08: 0000000000000000 R09: 0000000000000000 [ 783.743814][T18411] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 783.751630][T18411] R13: 0000000000000000 R14: 00007f378b335f80 R15: 00007fffaad2deb8 [ 783.759441][T18411] [ 785.078360][T18447] FAULT_INJECTION: forcing a failure. [ 785.078360][T18447] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 785.123130][T18447] CPU: 1 PID: 18447 Comm: syz.4.5810 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 785.132786][T18447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 785.142705][T18447] Call Trace: [ 785.145801][T18447] [ 785.148578][T18447] dump_stack_lvl+0x151/0x1b7 [ 785.153091][T18447] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 785.158386][T18447] ? kstrtoull+0x1cd/0x2e0 [ 785.162647][T18447] ? _parse_integer+0x40/0x40 [ 785.167150][T18447] ? sched_clock_cpu+0x71/0x2b0 [ 785.171843][T18447] dump_stack+0x15/0x1c [ 785.175829][T18447] should_fail_ex+0x3d0/0x520 [ 785.180345][T18447] should_fail+0xb/0x10 [ 785.184335][T18447] should_fail_usercopy+0x1a/0x20 [ 785.189285][T18447] _copy_from_user+0x1e/0xc0 [ 785.193709][T18447] iovec_from_user+0xc7/0x320 [ 785.198230][T18447] __import_iovec+0x70/0x430 [ 785.202681][T18447] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 785.208644][T18447] import_iovec+0xe5/0x120 [ 785.212902][T18447] copy_msghdr_from_user+0x527/0x670 [ 785.218010][T18447] ? __kasan_check_write+0x14/0x20 [ 785.222961][T18447] ? sendmsg_copy_msghdr+0x70/0x70 [ 785.228160][T18447] __sys_recvmsg+0x24b/0x3d0 [ 785.232582][T18447] ? ____sys_recvmsg+0x530/0x530 [ 785.237359][T18447] ? __kasan_check_write+0x14/0x20 [ 785.242302][T18447] ? __ia32_sys_read+0x90/0x90 [ 785.246990][T18447] ? debug_smp_processor_id+0x17/0x20 [ 785.252193][T18447] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 785.258102][T18447] __x64_sys_recvmsg+0x7f/0x90 [ 785.262712][T18447] x64_sys_call+0x171/0x9a0 [ 785.267042][T18447] do_syscall_64+0x3b/0xb0 [ 785.271287][T18447] ? clear_bhb_loop+0x55/0xb0 [ 785.275803][T18447] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 785.281530][T18447] RIP: 0033:0x7f175b57def9 [ 785.285875][T18447] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 785.305398][T18447] RSP: 002b:00007f175c428038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 785.313736][T18447] RAX: ffffffffffffffda RBX: 00007f175b735f80 RCX: 00007f175b57def9 [ 785.321541][T18447] RDX: 0000000000001f00 RSI: 0000000020000500 RDI: 0000000000000003 [ 785.329363][T18447] RBP: 00007f175c428090 R08: 0000000000000000 R09: 0000000000000000 [ 785.337174][T18447] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 785.345068][T18447] R13: 0000000000000000 R14: 00007f175b735f80 R15: 00007ffe42d04da8 [ 785.352965][T18447] [ 789.679916][T18577] FAULT_INJECTION: forcing a failure. [ 789.679916][T18577] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 789.699247][T18577] CPU: 0 PID: 18577 Comm: syz.3.5852 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 789.708906][T18577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 789.718796][T18577] Call Trace: [ 789.721934][T18577] [ 789.724698][T18577] dump_stack_lvl+0x151/0x1b7 [ 789.729209][T18577] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 789.734498][T18577] ? perf_swevent_hrtimer+0x449/0x4f0 [ 789.739712][T18577] dump_stack+0x15/0x1c [ 789.743698][T18577] should_fail_ex+0x3d0/0x520 [ 789.748267][T18577] should_fail+0xb/0x10 [ 789.752209][T18577] should_fail_usercopy+0x1a/0x20 [ 789.757063][T18577] _copy_to_user+0x1e/0x90 [ 789.761323][T18577] simple_read_from_buffer+0xc7/0x150 [ 789.766530][T18577] proc_fail_nth_read+0x1a3/0x210 [ 789.771386][T18577] ? proc_fault_inject_write+0x390/0x390 [ 789.776855][T18577] ? fsnotify_perm+0x269/0x5b0 [ 789.781454][T18577] ? security_file_permission+0x86/0xb0 [ 789.786836][T18577] ? proc_fault_inject_write+0x390/0x390 [ 789.792312][T18577] vfs_read+0x26c/0xae0 [ 789.796297][T18577] ? kernel_read+0x1f0/0x1f0 [ 789.800726][T18577] ? mutex_lock+0xb1/0x1e0 [ 789.804978][T18577] ? bit_wait_io_timeout+0x120/0x120 [ 789.810107][T18577] ? __fdget_pos+0x2e2/0x390 [ 789.814525][T18577] ? ksys_read+0x77/0x2c0 [ 789.818690][T18577] ksys_read+0x199/0x2c0 [ 789.822768][T18577] ? vfs_write+0xed0/0xed0 [ 789.827028][T18577] __x64_sys_read+0x7b/0x90 [ 789.831450][T18577] x64_sys_call+0x28/0x9a0 [ 789.835699][T18577] do_syscall_64+0x3b/0xb0 [ 789.839949][T18577] ? clear_bhb_loop+0x55/0xb0 [ 789.844469][T18577] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 789.850236][T18577] RIP: 0033:0x7f378b17c93c [ 789.854456][T18577] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 789.873888][T18577] RSP: 002b:00007f378bff8030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 789.882145][T18577] RAX: ffffffffffffffda RBX: 00007f378b335f80 RCX: 00007f378b17c93c [ 789.889947][T18577] RDX: 000000000000000f RSI: 00007f378bff80a0 RDI: 000000000000000d [ 789.897756][T18577] RBP: 00007f378bff8090 R08: 0000000000000000 R09: 0000000000000000 [ 789.905567][T18577] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 789.913381][T18577] R13: 0000000000000000 R14: 00007f378b335f80 R15: 00007fffaad2deb8 [ 789.921200][T18577] [ 789.977407][T18579] device pim6reg1 entered promiscuous mode [ 795.798886][T18769] FAULT_INJECTION: forcing a failure. [ 795.798886][T18769] name failslab, interval 1, probability 0, space 0, times 0 [ 795.919260][T18769] CPU: 1 PID: 18769 Comm: syz.1.5907 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 795.928996][T18769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 795.938889][T18769] Call Trace: [ 795.942121][T18769] [ 795.944890][T18769] dump_stack_lvl+0x151/0x1b7 [ 795.949400][T18769] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 795.954706][T18769] dump_stack+0x15/0x1c [ 795.958689][T18769] should_fail_ex+0x3d0/0x520 [ 795.963215][T18769] ? dup_fd+0x7a/0x980 [ 795.967106][T18769] __should_failslab+0xaf/0xf0 [ 795.971708][T18769] should_failslab+0x9/0x20 [ 795.976046][T18769] kmem_cache_alloc+0x3b/0x2c0 [ 795.980648][T18769] dup_fd+0x7a/0x980 [ 795.984380][T18769] ? avc_has_perm_noaudit+0x430/0x430 [ 795.989595][T18769] ? perf_event_init_task+0x591/0x5f0 [ 795.994828][T18769] copy_files+0xe6/0x200 [ 795.998977][T18769] ? dup_task_struct+0x7d0/0x7d0 [ 796.003734][T18769] ? security_task_alloc+0xf9/0x130 [ 796.008770][T18769] copy_process+0x11e9/0x3530 [ 796.013297][T18769] ? __kasan_check_write+0x14/0x20 [ 796.018237][T18769] ? proc_fail_nth_write+0x20b/0x290 [ 796.023353][T18769] ? idle_dummy+0x10/0x10 [ 796.027514][T18769] ? vfs_write+0x952/0xed0 [ 796.031768][T18769] ? __hrtimer_run_queues+0x46b/0xad0 [ 796.037150][T18769] kernel_clone+0x229/0x890 [ 796.041487][T18769] ? __kasan_check_write+0x14/0x20 [ 796.046436][T18769] ? mutex_unlock+0xb2/0x260 [ 796.050862][T18769] ? create_io_thread+0x180/0x180 [ 796.055827][T18769] __x64_sys_clone+0x231/0x280 [ 796.060419][T18769] ? __do_sys_vfork+0x110/0x110 [ 796.065109][T18769] ? syscall_enter_from_user_mode+0x19/0x190 [ 796.070925][T18769] x64_sys_call+0x1b0/0x9a0 [ 796.075260][T18769] do_syscall_64+0x3b/0xb0 [ 796.079516][T18769] ? clear_bhb_loop+0x55/0xb0 [ 796.084126][T18769] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 796.089858][T18769] RIP: 0033:0x7fa4c2d7def9 [ 796.094190][T18769] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 796.113721][T18769] RSP: 002b:00007fa4c3aa9fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 796.122057][T18769] RAX: ffffffffffffffda RBX: 00007fa4c2f35f80 RCX: 00007fa4c2d7def9 [ 796.129863][T18769] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000630c1000 [ 796.137675][T18769] RBP: 00007fa4c3aaa090 R08: 0000000000000000 R09: 0000000000000000 [ 796.145488][T18769] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 796.153301][T18769] R13: 0000000000000000 R14: 00007fa4c2f35f80 R15: 00007ffc5df03ca8 [ 796.161292][T18769] [ 801.262783][T18945] device syzkaller0 entered promiscuous mode [ 802.015513][T18974] FAULT_INJECTION: forcing a failure. [ 802.015513][T18974] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 802.072188][T18974] CPU: 1 PID: 18974 Comm: syz.4.5967 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 802.081843][T18974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 802.091742][T18974] Call Trace: [ 802.094861][T18974] [ 802.097639][T18974] dump_stack_lvl+0x151/0x1b7 [ 802.102262][T18974] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 802.107625][T18974] dump_stack+0x15/0x1c [ 802.111615][T18974] should_fail_ex+0x3d0/0x520 [ 802.116303][T18974] should_fail+0xb/0x10 [ 802.120294][T18974] should_fail_usercopy+0x1a/0x20 [ 802.125153][T18974] _copy_from_user+0x1e/0xc0 [ 802.129581][T18974] generic_map_update_batch+0x4d9/0x8c0 [ 802.135103][T18974] ? generic_map_delete_batch+0x5c0/0x5c0 [ 802.140643][T18974] ? generic_map_delete_batch+0x5c0/0x5c0 [ 802.146197][T18974] bpf_map_do_batch+0x4cc/0x630 [ 802.150896][T18974] __sys_bpf+0x66b/0x7f0 [ 802.154958][T18974] ? clockevents_program_event+0x22f/0x300 [ 802.160604][T18974] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 802.165825][T18974] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 802.171817][T18974] __x64_sys_bpf+0x7c/0x90 [ 802.176186][T18974] x64_sys_call+0x87f/0x9a0 [ 802.180609][T18974] do_syscall_64+0x3b/0xb0 [ 802.185139][T18974] ? clear_bhb_loop+0x55/0xb0 [ 802.189903][T18974] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 802.195735][T18974] RIP: 0033:0x7f175b57def9 [ 802.199986][T18974] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 802.219434][T18974] RSP: 002b:00007f175c428038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 802.227671][T18974] RAX: ffffffffffffffda RBX: 00007f175b735f80 RCX: 00007f175b57def9 [ 802.235486][T18974] RDX: 0000000000000038 RSI: 0000000020000200 RDI: 000000000000001a [ 802.243290][T18974] RBP: 00007f175c428090 R08: 0000000000000000 R09: 0000000000000000 [ 802.251102][T18974] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 802.258912][T18974] R13: 0000000000000000 R14: 00007f175b735f80 R15: 00007ffe42d04da8 [ 802.266731][T18974] [ 804.179583][T19037] syz.3.5979[19037] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 804.179663][T19037] syz.3.5979[19037] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 805.068278][T19051] FAULT_INJECTION: forcing a failure. [ 805.068278][T19051] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 805.093419][T19051] CPU: 0 PID: 19051 Comm: syz.0.5986 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 805.103143][T19051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 805.113040][T19051] Call Trace: [ 805.116171][T19051] [ 805.119030][T19051] dump_stack_lvl+0x151/0x1b7 [ 805.124193][T19051] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 805.129588][T19051] ? vfs_write+0x952/0xed0 [ 805.133910][T19051] ? __kasan_slab_free+0x11/0x20 [ 805.138940][T19051] dump_stack+0x15/0x1c [ 805.143016][T19051] should_fail_ex+0x3d0/0x520 [ 805.147533][T19051] should_fail+0xb/0x10 [ 805.151534][T19051] should_fail_usercopy+0x1a/0x20 [ 805.156385][T19051] _copy_from_user+0x1e/0xc0 [ 805.160814][T19051] __sys_bpf+0x23b/0x7f0 [ 805.164888][T19051] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 805.170186][T19051] ? __ia32_sys_read+0x90/0x90 [ 805.174787][T19051] ? debug_smp_processor_id+0x17/0x20 [ 805.180074][T19051] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 805.186000][T19051] __x64_sys_bpf+0x7c/0x90 [ 805.190239][T19051] x64_sys_call+0x87f/0x9a0 [ 805.194586][T19051] do_syscall_64+0x3b/0xb0 [ 805.199183][T19051] ? clear_bhb_loop+0x55/0xb0 [ 805.203917][T19051] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 805.209718][T19051] RIP: 0033:0x7fd44657def9 [ 805.214183][T19051] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 805.233865][T19051] RSP: 002b:00007fd44740e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 805.242800][T19051] RAX: ffffffffffffffda RBX: 00007fd446735f80 RCX: 00007fd44657def9 [ 805.250613][T19051] RDX: 0000000000000090 RSI: 0000000020000a40 RDI: 0000000000000005 [ 805.258575][T19051] RBP: 00007fd44740e090 R08: 0000000000000000 R09: 0000000000000000 [ 805.266385][T19051] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 805.274276][T19051] R13: 0000000000000000 R14: 00007fd446735f80 R15: 00007ffdb2a2fc08 [ 805.283214][T19051] [ 807.151833][T19095] device veth1_macvtap left promiscuous mode [ 807.225446][T19097] bridge0: port 2(bridge_slave_1) entered disabled state [ 812.853193][T19204] FAULT_INJECTION: forcing a failure. [ 812.853193][T19204] name failslab, interval 1, probability 0, space 0, times 0 [ 812.909246][T19204] CPU: 1 PID: 19204 Comm: syz.1.6033 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 812.919008][T19204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 812.928904][T19204] Call Trace: [ 812.932023][T19204] [ 812.934818][T19204] dump_stack_lvl+0x151/0x1b7 [ 812.939317][T19204] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 812.944630][T19204] dump_stack+0x15/0x1c [ 812.948618][T19204] should_fail_ex+0x3d0/0x520 [ 812.953122][T19204] ? kernfs_fop_open+0x70e/0xb10 [ 812.957895][T19204] __should_failslab+0xaf/0xf0 [ 812.962496][T19204] should_failslab+0x9/0x20 [ 812.966829][T19204] __kmem_cache_alloc_node+0x3d/0x250 [ 812.972036][T19204] ? memset+0x35/0x40 [ 812.975865][T19204] ? kernfs_fop_open+0x70e/0xb10 [ 812.980648][T19204] kmalloc_trace+0x2a/0xa0 [ 812.984894][T19204] kernfs_fop_open+0x70e/0xb10 [ 812.989483][T19204] ? fsnotify_perm+0x269/0x5b0 [ 812.994085][T19204] ? kernfs_fop_mmap+0x440/0x440 [ 812.998874][T19204] do_dentry_open+0x891/0x1250 [ 813.003463][T19204] vfs_open+0x73/0x80 [ 813.007277][T19204] path_openat+0x2532/0x2d60 [ 813.011793][T19204] ? kasan_save_alloc_info+0x1f/0x30 [ 813.016930][T19204] ? slab_post_alloc_hook+0x53/0x2c0 [ 813.022031][T19204] ? getname+0x19/0x20 [ 813.025938][T19204] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 813.031855][T19204] ? do_filp_open+0x480/0x480 [ 813.036358][T19204] do_filp_open+0x230/0x480 [ 813.040693][T19204] ? vfs_tmpfile+0x480/0x480 [ 813.045126][T19204] ? alloc_fd+0x4fa/0x5a0 [ 813.049286][T19204] do_sys_openat2+0x151/0x870 [ 813.053890][T19204] ? bit_wait_io_timeout+0x120/0x120 [ 813.059005][T19204] ? __mutex_lock_slowpath+0x10/0x10 [ 813.064124][T19204] ? do_sys_open+0x220/0x220 [ 813.068560][T19204] ? fput+0x15b/0x1b0 [ 813.072377][T19204] ? ksys_write+0x260/0x2c0 [ 813.076711][T19204] ? __this_cpu_preempt_check+0x13/0x20 [ 813.082094][T19204] __x64_sys_openat+0x243/0x290 [ 813.086778][T19204] ? __ia32_sys_open+0x270/0x270 [ 813.091551][T19204] ? debug_smp_processor_id+0x17/0x20 [ 813.096762][T19204] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 813.102664][T19204] ? exit_to_user_mode_prepare+0x39/0xa0 [ 813.108306][T19204] x64_sys_call+0x6bf/0x9a0 [ 813.112645][T19204] do_syscall_64+0x3b/0xb0 [ 813.116893][T19204] ? clear_bhb_loop+0x55/0xb0 [ 813.121420][T19204] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 813.127136][T19204] RIP: 0033:0x7fa4c2d7def9 [ 813.131388][T19204] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 813.150834][T19204] RSP: 002b:00007fa4c3aaa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 813.159079][T19204] RAX: ffffffffffffffda RBX: 00007fa4c2f35f80 RCX: 00007fa4c2d7def9 [ 813.166888][T19204] RDX: 0000000000000002 RSI: 0000000020000080 RDI: 0000000000000007 [ 813.174701][T19204] RBP: 00007fa4c3aaa090 R08: 0000000000000000 R09: 0000000000000000 [ 813.182511][T19204] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 813.190324][T19204] R13: 0000000000000000 R14: 00007fa4c2f35f80 R15: 00007ffc5df03ca8 [ 813.198141][T19204] [ 813.579362][T19222] bridge0: port 1(bridge_slave_0) entered disabled state [ 813.591654][T19222] FAULT_INJECTION: forcing a failure. [ 813.591654][T19222] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 813.614823][T19222] CPU: 0 PID: 19222 Comm: syz.3.6041 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 813.624482][T19222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 813.634379][T19222] Call Trace: [ 813.637514][T19222] [ 813.640282][T19222] dump_stack_lvl+0x151/0x1b7 [ 813.644794][T19222] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 813.650263][T19222] dump_stack+0x15/0x1c [ 813.654247][T19222] should_fail_ex+0x3d0/0x520 [ 813.658755][T19222] should_fail+0xb/0x10 [ 813.662749][T19222] should_fail_usercopy+0x1a/0x20 [ 813.667609][T19222] _copy_from_user+0x1e/0xc0 [ 813.672120][T19222] get_user_ifreq+0xd5/0x230 [ 813.676551][T19222] sock_do_ioctl+0x1a7/0x450 [ 813.680974][T19222] ? has_cap_mac_admin+0x3c0/0x3c0 [ 813.685919][T19222] ? sock_show_fdinfo+0xa0/0xa0 [ 813.690613][T19222] ? selinux_file_ioctl+0x3cc/0x540 [ 813.695761][T19222] sock_ioctl+0x455/0x740 [ 813.700016][T19222] ? sock_poll+0x400/0x400 [ 813.704268][T19222] ? __fget_files+0x2cb/0x330 [ 813.708795][T19222] ? security_file_ioctl+0x84/0xb0 [ 813.713736][T19222] ? sock_poll+0x400/0x400 [ 813.717979][T19222] __se_sys_ioctl+0x114/0x190 [ 813.722505][T19222] __x64_sys_ioctl+0x7b/0x90 [ 813.726925][T19222] x64_sys_call+0x98/0x9a0 [ 813.731370][T19222] do_syscall_64+0x3b/0xb0 [ 813.735622][T19222] ? clear_bhb_loop+0x55/0xb0 [ 813.740222][T19222] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 813.746137][T19222] RIP: 0033:0x7f378b17def9 [ 813.750391][T19222] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 813.770254][T19222] RSP: 002b:00007f378bff8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 813.778445][T19222] RAX: ffffffffffffffda RBX: 00007f378b335f80 RCX: 00007f378b17def9 [ 813.786344][T19222] RDX: 0000000020000900 RSI: 0000000000008914 RDI: 0000000000000007 [ 813.794155][T19222] RBP: 00007f378bff8090 R08: 0000000000000000 R09: 0000000000000000 [ 813.801965][T19222] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 813.809770][T19222] R13: 0000000000000000 R14: 00007f378b335f80 R15: 00007fffaad2deb8 [ 813.817593][T19222] [ 814.881929][T19253] FAULT_INJECTION: forcing a failure. [ 814.881929][T19253] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 814.930728][T19253] CPU: 1 PID: 19253 Comm: syz.0.6052 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 814.940378][T19253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 814.950271][T19253] Call Trace: [ 814.953396][T19253] [ 814.956170][T19253] dump_stack_lvl+0x151/0x1b7 [ 814.960684][T19253] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 814.965979][T19253] ? vfs_write+0x952/0xed0 [ 814.970238][T19253] ? __kasan_slab_free+0x11/0x20 [ 814.975007][T19253] dump_stack+0x15/0x1c [ 814.978995][T19253] should_fail_ex+0x3d0/0x520 [ 814.983513][T19253] should_fail+0xb/0x10 [ 814.987594][T19253] should_fail_usercopy+0x1a/0x20 [ 814.992457][T19253] _copy_from_user+0x1e/0xc0 [ 814.996890][T19253] __sys_bpf+0x23b/0x7f0 [ 815.000965][T19253] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 815.006270][T19253] ? __ia32_sys_read+0x90/0x90 [ 815.010868][T19253] ? debug_smp_processor_id+0x17/0x20 [ 815.016078][T19253] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 815.021980][T19253] __x64_sys_bpf+0x7c/0x90 [ 815.026235][T19253] x64_sys_call+0x87f/0x9a0 [ 815.030569][T19253] do_syscall_64+0x3b/0xb0 [ 815.034822][T19253] ? clear_bhb_loop+0x55/0xb0 [ 815.039339][T19253] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 815.045066][T19253] RIP: 0033:0x7fd44657def9 [ 815.049319][T19253] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 815.068762][T19253] RSP: 002b:00007fd44740e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 815.077004][T19253] RAX: ffffffffffffffda RBX: 00007fd446735f80 RCX: 00007fd44657def9 [ 815.084815][T19253] RDX: 0000000000000050 RSI: 0000000020000600 RDI: 000000000000000a [ 815.092627][T19253] RBP: 00007fd44740e090 R08: 0000000000000000 R09: 0000000000000000 [ 815.100440][T19253] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 815.108250][T19253] R13: 0000000000000000 R14: 00007fd446735f80 R15: 00007ffdb2a2fc08 [ 815.116070][T19253] [ 816.500790][T19281] bridge0: port 1(bridge_slave_0) entered blocking state [ 816.507809][T19281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 816.547995][T19281] device bridge0 entered promiscuous mode [ 816.572436][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 817.798144][T19324] device sit0 left promiscuous mode [ 817.970956][T19324] device sit0 entered promiscuous mode [ 818.248104][T19336] FAULT_INJECTION: forcing a failure. [ 818.248104][T19336] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 818.262852][T19336] CPU: 1 PID: 19336 Comm: syz.1.6079 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 818.272501][T19336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 818.282489][T19336] Call Trace: [ 818.285605][T19336] [ 818.288384][T19336] dump_stack_lvl+0x151/0x1b7 [ 818.292902][T19336] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 818.298197][T19336] ? check_stack_object+0x23/0x130 [ 818.303141][T19336] dump_stack+0x15/0x1c [ 818.307135][T19336] should_fail_ex+0x3d0/0x520 [ 818.311742][T19336] should_fail+0xb/0x10 [ 818.315809][T19336] should_fail_usercopy+0x1a/0x20 [ 818.320669][T19336] _copy_from_user+0x1e/0xc0 [ 818.325099][T19336] generic_map_update_batch+0x54c/0x8c0 [ 818.330483][T19336] ? generic_map_delete_batch+0x5c0/0x5c0 [ 818.336036][T19336] ? generic_map_delete_batch+0x5c0/0x5c0 [ 818.341588][T19336] bpf_map_do_batch+0x4cc/0x630 [ 818.346277][T19336] __sys_bpf+0x66b/0x7f0 [ 818.350359][T19336] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 818.355567][T19336] ? __ia32_sys_read+0x90/0x90 [ 818.360162][T19336] ? debug_smp_processor_id+0x17/0x20 [ 818.365367][T19336] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 818.371273][T19336] __x64_sys_bpf+0x7c/0x90 [ 818.375528][T19336] x64_sys_call+0x87f/0x9a0 [ 818.379864][T19336] do_syscall_64+0x3b/0xb0 [ 818.384119][T19336] ? clear_bhb_loop+0x55/0xb0 [ 818.388629][T19336] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 818.394358][T19336] RIP: 0033:0x7fa4c2d7def9 [ 818.398614][T19336] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 818.418057][T19336] RSP: 002b:00007fa4c3aaa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 818.426300][T19336] RAX: ffffffffffffffda RBX: 00007fa4c2f35f80 RCX: 00007fa4c2d7def9 [ 818.434113][T19336] RDX: 0000000000000038 RSI: 0000000020000200 RDI: 000000000000001a [ 818.441925][T19336] RBP: 00007fa4c3aaa090 R08: 0000000000000000 R09: 0000000000000000 [ 818.449735][T19336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 818.457544][T19336] R13: 0000000000000000 R14: 00007fa4c2f35f80 R15: 00007ffc5df03ca8 [ 818.465363][T19336] [ 819.476515][T19365] FAULT_INJECTION: forcing a failure. [ 819.476515][T19365] name failslab, interval 1, probability 0, space 0, times 0 [ 819.489884][T19365] CPU: 1 PID: 19365 Comm: syz.3.6090 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 819.499516][T19365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 819.509412][T19365] Call Trace: [ 819.512534][T19365] [ 819.515314][T19365] dump_stack_lvl+0x151/0x1b7 [ 819.519832][T19365] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 819.525213][T19365] dump_stack+0x15/0x1c [ 819.529204][T19365] should_fail_ex+0x3d0/0x520 [ 819.533712][T19365] ? __alloc_skb+0xcc/0x2d0 [ 819.538049][T19365] __should_failslab+0xaf/0xf0 [ 819.542653][T19365] should_failslab+0x9/0x20 [ 819.547000][T19365] kmem_cache_alloc_node+0x3e/0x2d0 [ 819.552026][T19365] __alloc_skb+0xcc/0x2d0 [ 819.556204][T19365] alloc_skb_with_frags+0xa6/0x680 [ 819.561146][T19365] sock_alloc_send_pskb+0x915/0xa50 [ 819.566180][T19365] ? sock_kzfree_s+0x60/0x60 [ 819.570605][T19365] ? avc_has_perm+0x16f/0x260 [ 819.575116][T19365] ? security_socket_getpeersec_dgram+0xaa/0xc0 [ 819.581188][T19365] unix_stream_sendmsg+0x4b4/0x1070 [ 819.586233][T19365] ? unix_show_fdinfo+0x2f0/0x2f0 [ 819.591093][T19365] ? security_socket_sendmsg+0x82/0xb0 [ 819.596376][T19365] ? unix_show_fdinfo+0x2f0/0x2f0 [ 819.601337][T19365] ____sys_sendmsg+0x5d3/0x9a0 [ 819.605928][T19365] ? __sys_sendmsg_sock+0x40/0x40 [ 819.610791][T19365] __sys_sendmsg+0x2a9/0x390 [ 819.615213][T19365] ? ____sys_sendmsg+0x9a0/0x9a0 [ 819.619988][T19365] ? __kasan_check_write+0x14/0x20 [ 819.624929][T19365] ? mutex_unlock+0xb2/0x260 [ 819.629373][T19365] __x64_sys_sendmsg+0x7f/0x90 [ 819.633967][T19365] x64_sys_call+0x16a/0x9a0 [ 819.638294][T19365] do_syscall_64+0x3b/0xb0 [ 819.642554][T19365] ? clear_bhb_loop+0x55/0xb0 [ 819.647077][T19365] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 819.652795][T19365] RIP: 0033:0x7f378b17def9 [ 819.657046][T19365] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 819.676485][T19365] RSP: 002b:00007f378bff8038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 819.684729][T19365] RAX: ffffffffffffffda RBX: 00007f378b335f80 RCX: 00007f378b17def9 [ 819.692543][T19365] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000008 [ 819.700351][T19365] RBP: 00007f378bff8090 R08: 0000000000000000 R09: 0000000000000000 [ 819.708177][T19365] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 819.715980][T19365] R13: 0000000000000000 R14: 00007f378b335f80 R15: 00007fffaad2deb8 [ 819.723804][T19365] [ 822.838195][T19436] FAULT_INJECTION: forcing a failure. [ 822.838195][T19436] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 822.875393][T19436] CPU: 1 PID: 19436 Comm: syz.1.6112 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 822.885127][T19436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 822.895023][T19436] Call Trace: [ 822.898148][T19436] [ 822.900925][T19436] dump_stack_lvl+0x151/0x1b7 [ 822.905439][T19436] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 822.910747][T19436] ? bpf_trace_run4+0x192/0x2f0 [ 822.915416][T19436] dump_stack+0x15/0x1c [ 822.919413][T19436] should_fail_ex+0x3d0/0x520 [ 822.923921][T19436] should_fail+0xb/0x10 [ 822.927916][T19436] should_fail_usercopy+0x1a/0x20 [ 822.932775][T19436] _copy_from_iter+0x18d/0xe00 [ 822.937554][T19436] ? __alloc_pages+0x727/0x780 [ 822.942153][T19436] ? copyout_mc+0x80/0x80 [ 822.946325][T19436] ? __kasan_check_write+0x14/0x20 [ 822.951265][T19436] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 822.956211][T19436] ? _raw_spin_lock_irqsave+0x210/0x210 [ 822.961600][T19436] copy_page_from_iter+0x1d7/0x2b0 [ 822.966542][T19436] pipe_write+0x7c1/0x1990 [ 822.970801][T19436] ? pipe_read+0x1040/0x1040 [ 822.975218][T19436] ? selinux_file_permission+0x440/0x560 [ 822.980693][T19436] ? fsnotify_perm+0x6a/0x5b0 [ 822.985203][T19436] vfs_write+0xaf6/0xed0 [ 822.989281][T19436] ? __kasan_slab_free+0x11/0x20 [ 822.994057][T19436] ? file_end_write+0x1c0/0x1c0 [ 822.998741][T19436] ? __fget_files+0x2cb/0x330 [ 823.003253][T19436] ? __fdget_pos+0x204/0x390 [ 823.007679][T19436] ? ksys_write+0x77/0x2c0 [ 823.011933][T19436] ksys_write+0x199/0x2c0 [ 823.016096][T19436] ? __this_cpu_preempt_check+0x13/0x20 [ 823.021479][T19436] ? __ia32_sys_read+0x90/0x90 [ 823.026079][T19436] ? debug_smp_processor_id+0x17/0x20 [ 823.031287][T19436] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 823.037191][T19436] __x64_sys_write+0x7b/0x90 [ 823.041702][T19436] x64_sys_call+0x2f/0x9a0 [ 823.046041][T19436] do_syscall_64+0x3b/0xb0 [ 823.050560][T19436] ? clear_bhb_loop+0x55/0xb0 [ 823.055074][T19436] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 823.060795][T19436] RIP: 0033:0x7fa4c2d7def9 [ 823.065050][T19436] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 823.084578][T19436] RSP: 002b:00007fa4c3aaa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 823.092824][T19436] RAX: ffffffffffffffda RBX: 00007fa4c2f35f80 RCX: 00007fa4c2d7def9 [ 823.100632][T19436] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 0000000000000000 [ 823.108451][T19436] RBP: 00007fa4c3aaa090 R08: 0000000000000000 R09: 0000000000000000 [ 823.116256][T19436] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 823.124079][T19436] R13: 0000000000000000 R14: 00007fa4c2f35f80 R15: 00007ffc5df03ca8 [ 823.131889][T19436] [ 824.639880][ T3059] device bridge_slave_1 left promiscuous mode [ 824.645827][ T3059] bridge0: port 2(bridge_slave_1) entered disabled state [ 824.653459][ T3059] device bridge_slave_0 left promiscuous mode [ 824.659506][ T3059] bridge0: port 1(bridge_slave_0) entered disabled state [ 824.667285][ T3059] device veth1_macvtap left promiscuous mode [ 824.673167][ T3059] device veth0_vlan left promiscuous mode [ 825.214818][T19462] bridge0: port 1(bridge_slave_0) entered blocking state [ 825.222357][T19462] bridge0: port 1(bridge_slave_0) entered disabled state [ 825.230243][T19462] device bridge_slave_0 entered promiscuous mode [ 825.283192][T19462] bridge0: port 2(bridge_slave_1) entered blocking state [ 825.310728][T19462] bridge0: port 2(bridge_slave_1) entered disabled state [ 825.371113][T19462] device bridge_slave_1 entered promiscuous mode [ 826.169170][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 826.176531][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 826.234729][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 826.285277][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 826.335876][T18168] bridge0: port 1(bridge_slave_0) entered blocking state [ 826.342780][T18168] bridge0: port 1(bridge_slave_0) entered forwarding state [ 826.350061][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 826.358245][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 826.366582][T18168] bridge0: port 2(bridge_slave_1) entered blocking state [ 826.373477][T18168] bridge0: port 2(bridge_slave_1) entered forwarding state [ 826.439334][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 826.446983][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 826.475712][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 826.495929][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 826.516183][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 826.562463][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 826.571683][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 826.588001][T18241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 826.597146][T18241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 826.641164][T19462] device veth0_vlan entered promiscuous mode [ 826.648488][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 826.656093][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 826.678704][T19462] device veth1_macvtap entered promiscuous mode [ 826.689414][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 826.697540][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 826.706180][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 826.768240][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 826.776540][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 826.785007][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 826.793367][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 827.630861][T19508] device sit0 entered promiscuous mode [ 830.023402][T19547] device syzkaller0 entered promiscuous mode [ 830.756938][T19569] device syzkaller0 entered promiscuous mode [ 834.111443][T19621] device syzkaller0 entered promiscuous mode [ 886.049820][ T1294] device bridge_slave_1 left promiscuous mode [ 886.055807][ T1294] bridge0: port 2(bridge_slave_1) entered disabled state [ 886.063240][ T1294] device bridge_slave_0 left promiscuous mode [ 886.069309][ T1294] bridge0: port 1(bridge_slave_0) entered disabled state [ 886.077200][ T1294] device veth1_macvtap left promiscuous mode [ 886.083104][ T1294] device veth0_vlan left promiscuous mode [ 887.173599][T20530] bridge0: port 1(bridge_slave_0) entered blocking state [ 887.216965][T20530] bridge0: port 1(bridge_slave_0) entered disabled state [ 887.321054][T20530] device bridge_slave_0 entered promiscuous mode [ 887.378353][T20530] bridge0: port 2(bridge_slave_1) entered blocking state [ 887.436451][T20530] bridge0: port 2(bridge_slave_1) entered disabled state [ 887.499173][T20530] device bridge_slave_1 entered promiscuous mode [ 887.845532][ T1884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 887.879807][ T1884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 887.930792][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 887.938994][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 887.989370][T18168] bridge0: port 1(bridge_slave_0) entered blocking state [ 887.996342][T18168] bridge0: port 1(bridge_slave_0) entered forwarding state [ 888.049243][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 888.079444][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 888.119401][T18168] bridge0: port 2(bridge_slave_1) entered blocking state [ 888.126282][T18168] bridge0: port 2(bridge_slave_1) entered forwarding state [ 888.179216][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 888.209649][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 888.252301][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 888.260843][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 888.272450][T20530] device veth0_vlan entered promiscuous mode [ 888.319509][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 888.370545][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 888.377844][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 888.475503][T20530] device veth1_macvtap entered promiscuous mode [ 888.544782][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 888.576501][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 888.679685][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 888.896435][T18241] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 888.955357][T18241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 889.005022][T18241] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 889.052683][T18241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 947.153906][ T1294] device bridge_slave_1 left promiscuous mode [ 947.159957][ T1294] bridge0: port 2(bridge_slave_1) entered disabled state [ 947.167724][ T1294] device bridge_slave_0 left promiscuous mode [ 947.174606][ T1294] bridge0: port 1(bridge_slave_0) entered disabled state [ 947.183375][ T1294] device veth1_macvtap left promiscuous mode [ 947.189771][ T1294] device veth0_vlan left promiscuous mode [ 948.825815][T21481] bridge0: port 1(bridge_slave_0) entered blocking state [ 948.889228][T21481] bridge0: port 1(bridge_slave_0) entered disabled state [ 948.896708][T21481] device bridge_slave_0 entered promiscuous mode [ 948.929923][T21481] bridge0: port 2(bridge_slave_1) entered blocking state [ 948.936882][T21481] bridge0: port 2(bridge_slave_1) entered disabled state [ 948.944489][T21481] device bridge_slave_1 entered promiscuous mode [ 949.220433][T21481] bridge0: port 2(bridge_slave_1) entered blocking state [ 949.227335][T21481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 949.809290][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 949.821562][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 949.832466][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 949.910326][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 949.933058][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 949.991815][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 949.998706][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 950.090530][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 950.126315][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 950.139495][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 950.146475][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 950.154073][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 950.162275][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 950.230502][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 950.250068][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 950.268989][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 950.277834][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 950.294064][T21481] device veth0_vlan entered promiscuous mode [ 950.330146][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 950.340282][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 950.366120][T21481] device veth1_macvtap entered promiscuous mode [ 950.402382][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 950.413781][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 950.433908][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 950.458847][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 950.487157][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 950.536211][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 950.551392][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 950.584106][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 950.614599][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1009.239854][T13921] device bridge_slave_1 left promiscuous mode [ 1009.245829][T13921] bridge0: port 2(bridge_slave_1) entered disabled state [ 1009.253220][T13921] device bridge_slave_0 left promiscuous mode [ 1009.259342][T13921] bridge0: port 1(bridge_slave_0) entered disabled state [ 1009.267187][T13921] device veth1_macvtap left promiscuous mode [ 1009.273104][T13921] device veth0_vlan left promiscuous mode [ 1010.907713][T22396] bridge0: port 1(bridge_slave_0) entered blocking state [ 1010.966510][T22396] bridge0: port 1(bridge_slave_0) entered disabled state [ 1011.027665][T22396] device bridge_slave_0 entered promiscuous mode [ 1011.099879][T22396] bridge0: port 2(bridge_slave_1) entered blocking state [ 1011.168328][T22396] bridge0: port 2(bridge_slave_1) entered disabled state [ 1011.244772][T22396] device bridge_slave_1 entered promiscuous mode [ 1011.763316][T22396] bridge0: port 2(bridge_slave_1) entered blocking state [ 1011.770216][T22396] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1011.777383][T22396] bridge0: port 1(bridge_slave_0) entered blocking state [ 1011.784190][T22396] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1011.959183][ T40] bridge0: port 1(bridge_slave_0) entered disabled state [ 1011.967299][ T40] bridge0: port 2(bridge_slave_1) entered disabled state [ 1012.269107][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1012.276403][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1012.328426][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1012.392865][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1012.431201][ T40] bridge0: port 1(bridge_slave_0) entered blocking state [ 1012.438321][ T40] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1012.493035][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1012.531948][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1012.581646][ T40] bridge0: port 2(bridge_slave_1) entered blocking state [ 1012.588578][ T40] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1012.643966][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1012.675569][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1012.749433][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1012.775338][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1012.851948][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1012.878288][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1012.960486][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1012.981640][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1013.000009][T22396] device veth0_vlan entered promiscuous mode [ 1013.055783][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1013.125101][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1013.190938][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1013.269191][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1013.375004][T22396] device veth1_macvtap entered promiscuous mode [ 1013.430549][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1013.446965][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1013.533537][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1013.578007][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1070.590071][ T43] device bridge_slave_1 left promiscuous mode [ 1070.596029][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 1070.603480][ T43] device bridge_slave_0 left promiscuous mode [ 1070.609510][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 1070.617256][ T43] device veth1_macvtap left promiscuous mode [ 1070.623151][ T43] device veth0_vlan left promiscuous mode [ 1072.568555][T23278] bridge0: port 1(bridge_slave_0) entered blocking state [ 1072.630663][T23278] bridge0: port 1(bridge_slave_0) entered disabled state [ 1072.674128][T23278] device bridge_slave_0 entered promiscuous mode [ 1072.714794][T23278] bridge0: port 2(bridge_slave_1) entered blocking state [ 1072.739124][T23278] bridge0: port 2(bridge_slave_1) entered disabled state [ 1072.746575][T23278] device bridge_slave_1 entered promiscuous mode [ 1073.039906][T23278] bridge0: port 2(bridge_slave_1) entered blocking state [ 1073.046793][T23278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1073.053950][T23278] bridge0: port 1(bridge_slave_0) entered blocking state [ 1073.060819][T23278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1073.245669][T18168] bridge0: port 1(bridge_slave_0) entered disabled state [ 1073.258331][T18168] bridge0: port 2(bridge_slave_1) entered disabled state [ 1073.303086][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1073.344184][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1073.406907][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1073.456151][T18168] bridge0: port 1(bridge_slave_0) entered blocking state [ 1073.463052][T18168] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1073.544446][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1073.621397][T18168] bridge0: port 2(bridge_slave_1) entered blocking state [ 1073.628285][T18168] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1073.707628][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1073.726668][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1073.789326][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1073.831883][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1073.896046][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1073.961893][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1073.970803][T23278] device veth0_vlan entered promiscuous mode [ 1073.986726][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1074.035326][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1074.095013][T23278] device veth1_macvtap entered promiscuous mode [ 1074.122145][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1074.140581][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1074.179346][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1074.224406][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1074.260957][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1074.321442][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1074.372087][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1132.509766][T23838] device bridge_slave_1 left promiscuous mode [ 1132.515723][T23838] bridge0: port 2(bridge_slave_1) entered disabled state [ 1132.523349][T23838] device bridge_slave_0 left promiscuous mode [ 1132.529349][T23838] bridge0: port 1(bridge_slave_0) entered disabled state [ 1132.537043][T23838] device veth1_macvtap left promiscuous mode [ 1132.542955][T23838] device veth0_vlan left promiscuous mode [ 1134.211660][T24238] bridge0: port 1(bridge_slave_0) entered blocking state [ 1134.250919][T24238] bridge0: port 1(bridge_slave_0) entered disabled state [ 1134.289962][T24238] device bridge_slave_0 entered promiscuous mode [ 1134.416016][T24238] bridge0: port 2(bridge_slave_1) entered blocking state [ 1134.425032][T24238] bridge0: port 2(bridge_slave_1) entered disabled state [ 1134.470973][T24238] device bridge_slave_1 entered promiscuous mode [ 1135.071758][T24238] bridge0: port 2(bridge_slave_1) entered blocking state [ 1135.078658][T24238] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1135.085953][T24238] bridge0: port 1(bridge_slave_0) entered blocking state [ 1135.092829][T24238] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1135.130976][ T9050] bridge0: port 1(bridge_slave_0) entered disabled state [ 1135.150849][ T9050] bridge0: port 2(bridge_slave_1) entered disabled state [ 1135.270029][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1135.279699][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1135.318242][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1135.400197][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1135.443851][ T40] bridge0: port 1(bridge_slave_0) entered blocking state [ 1135.450769][ T40] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1135.498567][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1135.539315][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1135.579743][ T40] bridge0: port 2(bridge_slave_1) entered blocking state [ 1135.586787][ T40] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1135.664953][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1135.715696][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1135.753400][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1135.761483][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1135.891611][T18241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1135.921755][T18241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1135.998099][T18241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1136.058119][T18241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1136.078608][T18241] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1136.097053][T18241] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1136.145251][T24238] device veth0_vlan entered promiscuous mode [ 1136.211633][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1136.230795][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1136.364934][T24238] device veth1_macvtap entered promiscuous mode [ 1136.403148][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1136.424611][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1136.479257][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1136.506906][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1194.909820][ T1294] device bridge_slave_1 left promiscuous mode [ 1194.915777][ T1294] bridge0: port 2(bridge_slave_1) entered disabled state [ 1194.923146][ T1294] device bridge_slave_0 left promiscuous mode [ 1194.929193][ T1294] bridge0: port 1(bridge_slave_0) entered disabled state [ 1194.936841][ T1294] device veth1_macvtap left promiscuous mode [ 1194.942702][ T1294] device veth0_vlan left promiscuous mode [ 1196.618471][T25230] bridge0: port 1(bridge_slave_0) entered blocking state [ 1196.630764][T25230] bridge0: port 1(bridge_slave_0) entered disabled state [ 1196.638449][T25230] device bridge_slave_0 entered promiscuous mode [ 1196.646212][T25230] bridge0: port 2(bridge_slave_1) entered blocking state [ 1196.673073][T25230] bridge0: port 2(bridge_slave_1) entered disabled state [ 1196.690119][T25230] device bridge_slave_1 entered promiscuous mode [ 1197.278816][T25230] bridge0: port 2(bridge_slave_1) entered blocking state [ 1197.285731][T25230] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1197.292857][T25230] bridge0: port 1(bridge_slave_0) entered blocking state [ 1197.300074][T25230] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1197.486458][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 1197.512114][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 1197.557344][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1197.599120][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1197.688232][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1197.698271][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1197.760731][ T40] bridge0: port 1(bridge_slave_0) entered blocking state [ 1197.767636][ T40] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1197.847705][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1197.901125][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1197.948440][ T40] bridge0: port 2(bridge_slave_1) entered blocking state [ 1197.955457][ T40] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1198.004003][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1198.012232][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1198.042345][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1198.050554][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1198.146651][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1198.169540][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1198.240414][T25230] device veth0_vlan entered promiscuous mode [ 1198.246935][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1198.255161][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1198.286001][T25230] device veth1_macvtap entered promiscuous mode [ 1198.304540][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1198.312673][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1198.320429][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1198.328602][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1198.337989][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1198.369178][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1198.377684][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1198.386255][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1198.442173][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1256.460335][T25230] syz-executor (25230) used greatest stack depth: 19176 bytes left [ 1256.909657][ T1294] device bridge_slave_1 left promiscuous mode [ 1256.915589][ T1294] bridge0: port 2(bridge_slave_1) entered disabled state [ 1256.923082][ T1294] device bridge_slave_0 left promiscuous mode [ 1256.929111][ T1294] bridge0: port 1(bridge_slave_0) entered disabled state [ 1256.936938][ T1294] device veth1_macvtap left promiscuous mode [ 1256.942824][ T1294] device veth0_vlan left promiscuous mode [ 1258.727597][T26123] bridge0: port 1(bridge_slave_0) entered blocking state [ 1258.764421][T26123] bridge0: port 1(bridge_slave_0) entered disabled state [ 1258.811768][T26123] device bridge_slave_0 entered promiscuous mode [ 1258.913001][T26123] bridge0: port 2(bridge_slave_1) entered blocking state [ 1258.924856][T26123] bridge0: port 2(bridge_slave_1) entered disabled state [ 1258.932238][T26123] device bridge_slave_1 entered promiscuous mode [ 1259.395410][T26123] bridge0: port 2(bridge_slave_1) entered blocking state [ 1259.402517][T26123] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1259.409958][T26123] bridge0: port 1(bridge_slave_0) entered blocking state [ 1259.416804][T26123] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1259.621485][ T295] bridge0: port 1(bridge_slave_0) entered disabled state [ 1259.634010][ T295] bridge0: port 2(bridge_slave_1) entered disabled state [ 1259.651287][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1259.672699][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1259.735644][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1259.780782][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1259.810029][ T295] bridge0: port 1(bridge_slave_0) entered blocking state [ 1259.816909][ T295] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1259.824525][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1259.859330][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1259.867862][ T295] bridge0: port 2(bridge_slave_1) entered blocking state [ 1259.874831][ T295] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1259.897068][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1259.936263][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1259.978563][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1259.986686][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1259.994627][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1260.003341][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1260.025544][T26123] device veth0_vlan entered promiscuous mode [ 1260.040947][T26123] device veth1_macvtap entered promiscuous mode [ 1260.108208][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1260.143656][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1260.209237][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1260.279556][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1260.287646][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1260.369860][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1260.378113][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1260.386683][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1260.395332][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1260.403885][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1260.411285][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1266.427295][T26262] FAULT_INJECTION: forcing a failure. [ 1266.427295][T26262] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1266.472087][T26262] CPU: 0 PID: 26262 Comm: syz.1.8458 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 1266.481840][T26262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1266.491722][T26262] Call Trace: [ 1266.494843][T26262] [ 1266.497621][T26262] dump_stack_lvl+0x151/0x1b7 [ 1266.502139][T26262] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1266.507440][T26262] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 1266.512724][T26262] ? exc_general_protection+0x32d/0x4c0 [ 1266.518103][T26262] ? asm_exc_general_protection+0x27/0x30 [ 1266.523665][T26262] ? _raw_spin_lock+0x1b0/0x1b0 [ 1266.528350][T26262] dump_stack+0x15/0x1c [ 1266.532343][T26262] should_fail_ex+0x3d0/0x520 [ 1266.536858][T26262] should_fail+0xb/0x10 [ 1266.540842][T26262] should_fail_usercopy+0x1a/0x20 [ 1266.545703][T26262] copy_fpstate_to_sigframe+0x92a/0xba0 [ 1266.551106][T26262] ? copy_fpstate_to_sigframe+0x1b8/0xba0 [ 1266.556641][T26262] ? fpregs_set+0x7a0/0x7a0 [ 1266.560979][T26262] ? bpf_trace_run3+0x17c/0x2e0 [ 1266.565753][T26262] ? bpf_trace_run2+0x290/0x290 [ 1266.570445][T26262] ? ____kasan_slab_free+0x13c/0x180 [ 1266.575572][T26262] ? __kasan_slab_free+0x11/0x20 [ 1266.580335][T26262] ? get_signal+0x1274/0x1820 [ 1266.584851][T26262] ? fpu__alloc_mathframe+0xc3/0x150 [ 1266.589968][T26262] get_sigframe+0x378/0x4b0 [ 1266.594310][T26262] ? restore_sigcontext+0x700/0x700 [ 1266.599345][T26262] ? ptrace_notify+0x350/0x350 [ 1266.603945][T26262] ? __sigqueue_alloc+0x130/0x200 [ 1266.608808][T26262] arch_do_signal_or_restart+0x2ac/0x16f0 [ 1266.614362][T26262] ? __send_signal_locked+0x923/0xc30 [ 1266.619566][T26262] ? send_signal_locked+0x43a/0x590 [ 1266.624599][T26262] ? get_sigframe_size+0x10/0x10 [ 1266.629375][T26262] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 1266.635011][T26262] ? force_sig_info_to_task+0x31c/0x440 [ 1266.640399][T26262] ? force_sig+0x114/0x1d0 [ 1266.644648][T26262] ? send_sig+0x60/0x60 [ 1266.648640][T26262] exit_to_user_mode_loop+0x74/0xa0 [ 1266.653760][T26262] exit_to_user_mode_prepare+0x5a/0xa0 [ 1266.659057][T26262] irqentry_exit_to_user_mode+0x9/0x10 [ 1266.664526][T26262] irqentry_exit+0x12/0x40 [ 1266.668775][T26262] exc_general_protection+0x32d/0x4c0 [ 1266.673988][T26262] ? __ia32_sys_read+0x90/0x90 [ 1266.678588][T26262] ? debug_smp_processor_id+0x17/0x20 [ 1266.683973][T26262] ? syscall_exit_to_user_mode+0x2b/0x130 [ 1266.689521][T26262] asm_exc_general_protection+0x27/0x30 [ 1266.694903][T26262] RIP: 0033:0x7fa4c2d56779 [ 1266.699156][T26262] Code: f8 77 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 0f 00 00 0f 87 27 01 00 00 fd 74 0f c5 fd d7 c1 85 c0 74 5b f3 0f bc c0 e9 30 01 00 00 66 [ 1266.718686][T26262] RSP: 002b:00007fa4c3aa97c8 EFLAGS: 00010283 [ 1266.724586][T26262] RAX: 0000000000000999 RBX: 00007fa4c3aa9d30 RCX: 00007fa4c2efc160 [ 1266.732398][T26262] RDX: 9999999999999999 RSI: 00007fa4c2df0934 RDI: 9999999999999999 [ 1266.740207][T26262] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 1266.748021][T26262] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 1266.755917][T26262] R13: 00007fa4c3aa9eb0 R14: 9999999999999999 R15: 0000000000000000 [ 1266.763824][T26262] [ 1266.900802][T26273] FAULT_INJECTION: forcing a failure. [ 1266.900802][T26273] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1266.939278][T26273] CPU: 0 PID: 26273 Comm: syz.3.8464 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 1266.948934][T26273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1266.958828][T26273] Call Trace: [ 1266.961951][T26273] [ 1266.964727][T26273] dump_stack_lvl+0x151/0x1b7 [ 1266.969240][T26273] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1266.974533][T26273] ? _kstrtol+0x150/0x150 [ 1266.978698][T26273] ? avc_has_perm_noaudit+0x348/0x430 [ 1266.983911][T26273] dump_stack+0x15/0x1c [ 1266.987898][T26273] should_fail_ex+0x3d0/0x520 [ 1266.992422][T26273] should_fail+0xb/0x10 [ 1266.996495][T26273] should_fail_usercopy+0x1a/0x20 [ 1267.001445][T26273] strncpy_from_user+0x24/0x2b0 [ 1267.006132][T26273] bpf_prog_load+0x1fb/0x1bf0 [ 1267.010643][T26273] ? map_freeze+0x3a0/0x3a0 [ 1267.014991][T26273] ? selinux_bpf+0xcb/0x100 [ 1267.019318][T26273] ? security_bpf+0x82/0xb0 [ 1267.023671][T26273] __sys_bpf+0x52c/0x7f0 [ 1267.027869][T26273] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1267.033073][T26273] ? __ia32_sys_read+0x90/0x90 [ 1267.037757][T26273] ? debug_smp_processor_id+0x17/0x20 [ 1267.042968][T26273] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1267.048866][T26273] __x64_sys_bpf+0x7c/0x90 [ 1267.053203][T26273] x64_sys_call+0x87f/0x9a0 [ 1267.057542][T26273] do_syscall_64+0x3b/0xb0 [ 1267.061796][T26273] ? clear_bhb_loop+0x55/0xb0 [ 1267.066310][T26273] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1267.072037][T26273] RIP: 0033:0x7f378b17def9 [ 1267.076292][T26273] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1267.095824][T26273] RSP: 002b:00007f378bff8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1267.104067][T26273] RAX: ffffffffffffffda RBX: 00007f378b335f80 RCX: 00007f378b17def9 [ 1267.111879][T26273] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 1267.119870][T26273] RBP: 00007f378bff8090 R08: 0000000000000000 R09: 0000000000000000 [ 1267.127686][T26273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1267.135496][T26273] R13: 0000000000000001 R14: 00007f378b335f80 R15: 00007fffaad2deb8 [ 1267.143309][T26273] [ 1271.108273][T26367] syz.3.8498[26367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1271.108347][T26367] syz.3.8498[26367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1271.145656][T26367] FAULT_INJECTION: forcing a failure. [ 1271.145656][T26367] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1271.169713][T26367] CPU: 0 PID: 26367 Comm: syz.3.8498 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 1271.179342][T26367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1271.189233][T26367] Call Trace: [ 1271.192361][T26367] [ 1271.195149][T26367] dump_stack_lvl+0x151/0x1b7 [ 1271.199652][T26367] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1271.204944][T26367] ? newidle_balance+0x8bd/0x1090 [ 1271.209894][T26367] dump_stack+0x15/0x1c [ 1271.213889][T26367] should_fail_ex+0x3d0/0x520 [ 1271.218402][T26367] should_fail+0xb/0x10 [ 1271.222389][T26367] should_fail_usercopy+0x1a/0x20 [ 1271.227253][T26367] copy_to_user_nofault+0x7c/0x140 [ 1271.232320][T26367] bpf_probe_write_user+0x96/0xf0 [ 1271.237262][T26367] bpf_prog_5cb5524816e22ab1+0x3f/0x45 [ 1271.242642][T26367] bpf_trace_run4+0x18d/0x2f0 [ 1271.247153][T26367] ? psi_group_change+0xa7b/0x1340 [ 1271.252119][T26367] ? bpf_trace_run3+0x2e0/0x2e0 [ 1271.256792][T26367] ? __this_cpu_preempt_check+0x13/0x20 [ 1271.262184][T26367] ? tracing_record_taskinfo_sched_switch+0x84/0x390 [ 1271.268681][T26367] ? probe_sched_switch+0x60/0x80 [ 1271.273663][T26367] ? __bpf_trace_sched_wakeup_template+0x10/0x10 [ 1271.279802][T26367] __bpf_trace_sched_switch+0xe/0x10 [ 1271.284911][T26367] __traceiter_sched_switch+0x91/0xc0 [ 1271.290132][T26367] __schedule+0x1313/0x1560 [ 1271.294466][T26367] ? release_firmware_map_entry+0x191/0x191 [ 1271.300185][T26367] ? __mutex_add_waiter+0x1b5/0x310 [ 1271.305219][T26367] ? trace_contention_begin+0xa0/0xa0 [ 1271.310479][T26367] ? arch_stack_walk+0xf3/0x140 [ 1271.315122][T26367] schedule+0xc3/0x180 [ 1271.319017][T26367] schedule_preempt_disabled+0x13/0x20 [ 1271.324311][T26367] __mutex_lock+0xa3c/0x1ca0 [ 1271.328741][T26367] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 1271.335346][T26367] ? avc_denied+0x1b0/0x1b0 [ 1271.339770][T26367] ? kstrtouint+0xf6/0x180 [ 1271.344030][T26367] ? irqentry_exit+0x30/0x40 [ 1271.348454][T26367] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 1271.354089][T26367] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1271.360397][T26367] __mutex_lock_slowpath+0xe/0x10 [ 1271.365332][T26367] mutex_lock+0x130/0x1e0 [ 1271.369504][T26367] ? bit_wait_io_timeout+0x120/0x120 [ 1271.374621][T26367] rtnl_lock+0x15/0x20 [ 1271.378523][T26367] dev_ioctl+0x531/0xe60 [ 1271.382693][T26367] sock_do_ioctl+0x26b/0x450 [ 1271.387114][T26367] ? has_cap_mac_admin+0x3c0/0x3c0 [ 1271.392074][T26367] ? sock_show_fdinfo+0xa0/0xa0 [ 1271.396768][T26367] ? selinux_file_ioctl+0x3cc/0x540 [ 1271.401791][T26367] sock_ioctl+0x455/0x740 [ 1271.405955][T26367] ? sock_poll+0x400/0x400 [ 1271.410206][T26367] ? __fget_files+0x2cb/0x330 [ 1271.414722][T26367] ? security_file_ioctl+0x84/0xb0 [ 1271.419664][T26367] ? sock_poll+0x400/0x400 [ 1271.423916][T26367] __se_sys_ioctl+0x114/0x190 [ 1271.428432][T26367] __x64_sys_ioctl+0x7b/0x90 [ 1271.432860][T26367] x64_sys_call+0x98/0x9a0 [ 1271.437108][T26367] do_syscall_64+0x3b/0xb0 [ 1271.441361][T26367] ? clear_bhb_loop+0x55/0xb0 [ 1271.445874][T26367] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1271.451602][T26367] RIP: 0033:0x7f378b17def9 [ 1271.455861][T26367] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1271.475557][T26367] RSP: 002b:00007f378bff8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1271.483805][T26367] RAX: ffffffffffffffda RBX: 00007f378b335f80 RCX: 00007f378b17def9 [ 1271.491614][T26367] RDX: 0000000020000280 RSI: 0000000000008914 RDI: 0000000000000004 [ 1271.499426][T26367] RBP: 00007f378bff8090 R08: 0000000000000000 R09: 0000000000000000 [ 1271.507240][T26367] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1271.515049][T26367] R13: 0000000000000000 R14: 00007f378b335f80 R15: 00007fffaad2deb8 [ 1271.522882][T26367] [ 1271.544499][T26367] device wg2 entered promiscuous mode [ 1271.760658][T26377] device pim6reg1 entered promiscuous mode [ 1274.294237][T26442] FAULT_INJECTION: forcing a failure. [ 1274.294237][T26442] name failslab, interval 1, probability 0, space 0, times 0 [ 1274.350717][T26442] CPU: 1 PID: 26442 Comm: syz.1.8521 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 1274.360548][T26442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1274.370538][T26442] Call Trace: [ 1274.373663][T26442] [ 1274.376428][T26442] dump_stack_lvl+0x151/0x1b7 [ 1274.380948][T26442] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1274.386238][T26442] dump_stack+0x15/0x1c [ 1274.390314][T26442] should_fail_ex+0x3d0/0x520 [ 1274.395004][T26442] ? __alloc_skb+0xcc/0x2d0 [ 1274.399341][T26442] __should_failslab+0xaf/0xf0 [ 1274.404028][T26442] should_failslab+0x9/0x20 [ 1274.408366][T26442] kmem_cache_alloc_node+0x3e/0x2d0 [ 1274.413402][T26442] ? ____kasan_slab_free+0x13c/0x180 [ 1274.418613][T26442] __alloc_skb+0xcc/0x2d0 [ 1274.422783][T26442] ? inetdev_event+0x7f7/0x1110 [ 1274.427476][T26442] inet_netconf_notify_devconf+0x173/0x230 [ 1274.433107][T26442] inetdev_event+0x823/0x1110 [ 1274.437623][T26442] ? ipv4_doint_and_flush+0x150/0x150 [ 1274.442839][T26442] ? arp_netdev_event+0xd4/0x2a0 [ 1274.447691][T26442] raw_notifier_call_chain+0x8c/0xf0 [ 1274.452809][T26442] unregister_netdevice_many+0xe2a/0x1740 [ 1274.458363][T26442] ? kasan_save_stack+0x4d/0x60 [ 1274.463053][T26442] ? x64_sys_call+0x3d/0x9a0 [ 1274.467475][T26442] ? alloc_netdev_mqs+0xf90/0xf90 [ 1274.472336][T26442] ? locks_remove_posix+0x610/0x610 [ 1274.477375][T26442] ? __kasan_check_read+0x11/0x20 [ 1274.482229][T26442] unregister_netdevice_queue+0x2e6/0x350 [ 1274.487799][T26442] ? bit_wait_io_timeout+0x120/0x120 [ 1274.492903][T26442] ? list_netdevice+0x710/0x710 [ 1274.497597][T26442] ppp_release+0xed/0x1e0 [ 1274.501763][T26442] ? ppp_open+0x70/0x70 [ 1274.505850][T26442] __fput+0x1e5/0x870 [ 1274.509675][T26442] ____fput+0x15/0x20 [ 1274.513593][T26442] task_work_run+0x24d/0x2e0 [ 1274.518001][T26442] ? task_work_cancel+0x2b0/0x2b0 [ 1274.522859][T26442] ? filp_close+0x105/0x150 [ 1274.527198][T26442] exit_to_user_mode_loop+0x94/0xa0 [ 1274.532227][T26442] exit_to_user_mode_prepare+0x5a/0xa0 [ 1274.537541][T26442] syscall_exit_to_user_mode+0x26/0x130 [ 1274.542903][T26442] do_syscall_64+0x47/0xb0 [ 1274.547168][T26442] ? clear_bhb_loop+0x55/0xb0 [ 1274.551747][T26442] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1274.557410][T26442] RIP: 0033:0x7fa4c2d7def9 [ 1274.561653][T26442] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1274.581185][T26442] RSP: 002b:00007fa4c3aaa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 1274.589426][T26442] RAX: 0000000000000000 RBX: 00007fa4c2f35f80 RCX: 00007fa4c2d7def9 [ 1274.597237][T26442] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1274.605050][T26442] RBP: 00007fa4c3aaa090 R08: 0000000000000000 R09: 0000000000000000 [ 1274.612866][T26442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1274.620670][T26442] R13: 0000000000000000 R14: 00007fa4c2f35f80 R15: 00007ffc5df03ca8 [ 1274.628489][T26442] [ 1276.532687][T26481] syz.0.8534[26481] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1276.532766][T26481] syz.0.8534[26481] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1276.647065][T26481] device wg2 entered promiscuous mode [ 1277.044061][T26490] FAULT_INJECTION: forcing a failure. [ 1277.044061][T26490] name failslab, interval 1, probability 0, space 0, times 0 [ 1277.056726][T26490] CPU: 0 PID: 26490 Comm: syz.0.8537 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 1277.066409][T26490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1277.076254][T26490] Call Trace: [ 1277.079377][T26490] [ 1277.082154][T26490] dump_stack_lvl+0x151/0x1b7 [ 1277.086671][T26490] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1277.091964][T26490] ? htab_lru_map_update_elem+0xbb0/0xbb0 [ 1277.097520][T26490] dump_stack+0x15/0x1c [ 1277.101510][T26490] should_fail_ex+0x3d0/0x520 [ 1277.106026][T26490] ? getname_flags+0xba/0x520 [ 1277.110537][T26490] __should_failslab+0xaf/0xf0 [ 1277.115135][T26490] should_failslab+0x9/0x20 [ 1277.119475][T26490] kmem_cache_alloc+0x3b/0x2c0 [ 1277.124076][T26490] ? __ia32_sys_read+0x90/0x90 [ 1277.128769][T26490] getname_flags+0xba/0x520 [ 1277.133101][T26490] __x64_sys_mkdirat+0x7c/0xa0 [ 1277.137704][T26490] x64_sys_call+0x6c6/0x9a0 [ 1277.142040][T26490] do_syscall_64+0x3b/0xb0 [ 1277.146295][T26490] ? clear_bhb_loop+0x55/0xb0 [ 1277.150810][T26490] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1277.156550][T26490] RIP: 0033:0x7fd44657def9 [ 1277.160788][T26490] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1277.180236][T26490] RSP: 002b:00007fd44740e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1277.188475][T26490] RAX: ffffffffffffffda RBX: 00007fd446735f80 RCX: 00007fd44657def9 [ 1277.196286][T26490] RDX: 00000000000001ff RSI: 0000000000000000 RDI: ffffffffffffff9c [ 1277.204221][T26490] RBP: 00007fd44740e090 R08: 0000000000000000 R09: 0000000000000000 [ 1277.211996][T26490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1277.219807][T26490] R13: 0000000000000000 R14: 00007fd446735f80 R15: 00007ffdb2a2fc08 [ 1277.229748][T26490] [ 1277.336285][T26494] FAULT_INJECTION: forcing a failure. [ 1277.336285][T26494] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1277.349267][T26494] CPU: 0 PID: 26494 Comm: syz.4.8539 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 1277.359022][T26494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1277.369009][T26494] Call Trace: [ 1277.372127][T26494] [ 1277.374905][T26494] dump_stack_lvl+0x151/0x1b7 [ 1277.379420][T26494] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1277.384799][T26494] ? kstrtouint+0xf6/0x180 [ 1277.389054][T26494] ? kasan_save_free_info+0x2b/0x40 [ 1277.394086][T26494] dump_stack+0x15/0x1c [ 1277.398077][T26494] should_fail_ex+0x3d0/0x520 [ 1277.402680][T26494] should_fail+0xb/0x10 [ 1277.406670][T26494] should_fail_usercopy+0x1a/0x20 [ 1277.411530][T26494] strncpy_from_user+0x24/0x2b0 [ 1277.416226][T26494] bpf_raw_tp_link_attach+0x129/0x6b0 [ 1277.421430][T26494] ? bpf_insn_prepare_dump+0x950/0x950 [ 1277.426902][T26494] ? __kasan_check_write+0x14/0x20 [ 1277.431845][T26494] ? fput+0x15b/0x1b0 [ 1277.435662][T26494] bpf_raw_tracepoint_open+0x22d/0x4a0 [ 1277.440955][T26494] ? bpf_obj_get_info_by_fd+0x3e60/0x3e60 [ 1277.446608][T26494] ? selinux_bpf+0xd2/0x100 [ 1277.450934][T26494] ? security_bpf+0x82/0xb0 [ 1277.455277][T26494] __sys_bpf+0x4f5/0x7f0 [ 1277.459355][T26494] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1277.464567][T26494] ? __ia32_sys_read+0x90/0x90 [ 1277.469257][T26494] ? debug_smp_processor_id+0x17/0x20 [ 1277.474646][T26494] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1277.480827][T26494] __x64_sys_bpf+0x7c/0x90 [ 1277.485074][T26494] x64_sys_call+0x87f/0x9a0 [ 1277.489413][T26494] do_syscall_64+0x3b/0xb0 [ 1277.493712][T26494] ? clear_bhb_loop+0x55/0xb0 [ 1277.498177][T26494] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1277.503909][T26494] RIP: 0033:0x7f175b57def9 [ 1277.508159][T26494] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1277.527604][T26494] RSP: 002b:00007f175c428038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1277.535846][T26494] RAX: ffffffffffffffda RBX: 00007f175b735f80 RCX: 00007f175b57def9 [ 1277.543661][T26494] RDX: 0000000000000010 RSI: 0000000020000200 RDI: 0000000000000011 [ 1277.551471][T26494] RBP: 00007f175c428090 R08: 0000000000000000 R09: 0000000000000000 [ 1277.559288][T26494] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1277.567264][T26494] R13: 0000000000000000 R14: 00007f175b735f80 R15: 00007ffe42d04da8 [ 1277.575085][T26494] [ 1280.012150][T26544] FAULT_INJECTION: forcing a failure. [ 1280.012150][T26544] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1280.026777][T26544] CPU: 1 PID: 26544 Comm: syz.1.8554 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 1280.036430][T26544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1280.046333][T26544] Call Trace: [ 1280.049437][T26544] [ 1280.052216][T26544] dump_stack_lvl+0x151/0x1b7 [ 1280.056819][T26544] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1280.062124][T26544] ? _kstrtol+0x150/0x150 [ 1280.066275][T26544] ? avc_has_perm_noaudit+0x348/0x430 [ 1280.071491][T26544] dump_stack+0x15/0x1c [ 1280.075477][T26544] should_fail_ex+0x3d0/0x520 [ 1280.079989][T26544] should_fail+0xb/0x10 [ 1280.083982][T26544] should_fail_usercopy+0x1a/0x20 [ 1280.089240][T26544] strncpy_from_user+0x24/0x2b0 [ 1280.093924][T26544] bpf_prog_load+0x1fb/0x1bf0 [ 1280.098442][T26544] ? map_freeze+0x3a0/0x3a0 [ 1280.102867][T26544] ? selinux_bpf+0xcb/0x100 [ 1280.107199][T26544] ? security_bpf+0x82/0xb0 [ 1280.111554][T26544] __sys_bpf+0x52c/0x7f0 [ 1280.115633][T26544] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1280.120835][T26544] ? __ia32_sys_read+0x90/0x90 [ 1280.125446][T26544] ? debug_smp_processor_id+0x17/0x20 [ 1280.130641][T26544] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1280.137157][T26544] __x64_sys_bpf+0x7c/0x90 [ 1280.141401][T26544] x64_sys_call+0x87f/0x9a0 [ 1280.145739][T26544] do_syscall_64+0x3b/0xb0 [ 1280.149988][T26544] ? clear_bhb_loop+0x55/0xb0 [ 1280.154504][T26544] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1280.160379][T26544] RIP: 0033:0x7fa4c2d7def9 [ 1280.164615][T26544] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1280.184071][T26544] RSP: 002b:00007fa4c3aaa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1280.192308][T26544] RAX: ffffffffffffffda RBX: 00007fa4c2f35f80 RCX: 00007fa4c2d7def9 [ 1280.200115][T26544] RDX: 0000000000000090 RSI: 0000000020000840 RDI: 0000000000000005 [ 1280.205890][T26540] device veth1_macvtap left promiscuous mode [ 1280.207922][T26544] RBP: 00007fa4c3aaa090 R08: 0000000000000000 R09: 0000000000000000 [ 1280.207940][T26544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1280.207953][T26544] R13: 0000000000000000 R14: 00007fa4c2f35f80 R15: 00007ffc5df03ca8 [ 1280.207974][T26544] [ 1280.266436][T26539] device veth1_macvtap entered promiscuous mode [ 1280.273082][T26539] device macsec0 entered promiscuous mode [ 1281.894311][T26572] device wg2 left promiscuous mode [ 1282.772567][T26588] syz.4.8569[26588] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1282.772644][T26588] syz.4.8569[26588] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1282.840901][T26588] device wg2 entered promiscuous mode [ 1283.029448][T26595] device veth0_vlan left promiscuous mode [ 1283.038777][T26595] device veth0_vlan entered promiscuous mode [ 1283.049750][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1283.061192][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1283.083104][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1283.579962][T26609] FAULT_INJECTION: forcing a failure. [ 1283.579962][T26609] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1283.600839][T26609] CPU: 1 PID: 26609 Comm: syz.0.8577 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 1283.610488][T26609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1283.620381][T26609] Call Trace: [ 1283.623504][T26609] [ 1283.626287][T26609] dump_stack_lvl+0x151/0x1b7 [ 1283.630809][T26609] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1283.636090][T26609] dump_stack+0x15/0x1c [ 1283.640078][T26609] should_fail_ex+0x3d0/0x520 [ 1283.644593][T26609] should_fail+0xb/0x10 [ 1283.648585][T26609] should_fail_usercopy+0x1a/0x20 [ 1283.653449][T26609] _copy_from_user+0x1e/0xc0 [ 1283.657877][T26609] __sys_bpf+0x23b/0x7f0 [ 1283.661956][T26609] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1283.667168][T26609] ? __ia32_sys_read+0x90/0x90 [ 1283.671759][T26609] ? debug_smp_processor_id+0x17/0x20 [ 1283.676965][T26609] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1283.682866][T26609] __x64_sys_bpf+0x7c/0x90 [ 1283.687117][T26609] x64_sys_call+0x87f/0x9a0 [ 1283.691462][T26609] do_syscall_64+0x3b/0xb0 [ 1283.695710][T26609] ? clear_bhb_loop+0x55/0xb0 [ 1283.700224][T26609] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1283.706048][T26609] RIP: 0033:0x7fd44657def9 [ 1283.710292][T26609] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1283.729737][T26609] RSP: 002b:00007fd44740e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1283.738036][T26609] RAX: ffffffffffffffda RBX: 00007fd446735f80 RCX: 00007fd44657def9 [ 1283.745879][T26609] RDX: 0000000000000090 RSI: 0000000020000840 RDI: 0000000000000005 [ 1283.753690][T26609] RBP: 00007fd44740e090 R08: 0000000000000000 R09: 0000000000000000 [ 1283.761501][T26609] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1283.769318][T26609] R13: 0000000000000000 R14: 00007fd446735f80 R15: 00007ffdb2a2fc08 [ 1283.777228][T26609] [ 1287.551992][T26680] device wg2 left promiscuous mode [ 1290.162402][T26731] device veth1_macvtap left promiscuous mode [ 1290.249958][T26731] device macsec0 left promiscuous mode [ 1290.353927][T26737] device veth1_macvtap entered promiscuous mode [ 1290.406752][T26737] device macsec0 entered promiscuous mode [ 1290.480646][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1298.862847][T26859] device wg2 left promiscuous mode [ 1301.576237][T26894] syz.0.8670[26894] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1301.576320][T26894] syz.0.8670[26894] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1301.783240][T26894] device syzkaller0 entered promiscuous mode [ 1304.006636][T26945] FAULT_INJECTION: forcing a failure. [ 1304.006636][T26945] name failslab, interval 1, probability 0, space 0, times 0 [ 1304.019429][T26938] bridge0: port 1(bridge_slave_0) entered disabled state [ 1304.100383][T26938] device bridge0 left promiscuous mode [ 1304.134091][T26945] CPU: 0 PID: 26945 Comm: syz.3.8688 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 1304.143745][T26945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1304.153826][T26945] Call Trace: [ 1304.156948][T26945] [ 1304.159730][T26945] dump_stack_lvl+0x151/0x1b7 [ 1304.164242][T26945] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1304.169538][T26945] dump_stack+0x15/0x1c [ 1304.173532][T26945] should_fail_ex+0x3d0/0x520 [ 1304.178040][T26945] ? sk_prot_alloc+0xf9/0x330 [ 1304.182555][T26945] __should_failslab+0xaf/0xf0 [ 1304.187157][T26945] should_failslab+0x9/0x20 [ 1304.191491][T26945] __kmem_cache_alloc_node+0x3d/0x250 [ 1304.196705][T26945] ? sk_prot_alloc+0xf9/0x330 [ 1304.201221][T26945] __kmalloc+0xa3/0x1e0 [ 1304.205211][T26945] sk_prot_alloc+0xf9/0x330 [ 1304.209551][T26945] sk_alloc+0x38/0x440 [ 1304.213451][T26945] ? bpf_test_init+0x169/0x190 [ 1304.218071][T26945] bpf_prog_test_run_skb+0x384/0x13a0 [ 1304.223282][T26945] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 1304.228991][T26945] ? __kasan_check_write+0x14/0x20 [ 1304.233934][T26945] ? fput+0x15b/0x1b0 [ 1304.237753][T26945] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 1304.243482][T26945] bpf_prog_test_run+0x3b0/0x630 [ 1304.248258][T26945] ? bpf_prog_query+0x260/0x260 [ 1304.252942][T26945] ? selinux_bpf+0xd2/0x100 [ 1304.257281][T26945] ? security_bpf+0x82/0xb0 [ 1304.261621][T26945] __sys_bpf+0x59f/0x7f0 [ 1304.265705][T26945] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1304.270917][T26945] ? __ia32_sys_read+0x90/0x90 [ 1304.275514][T26945] ? debug_smp_processor_id+0x17/0x20 [ 1304.280713][T26945] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1304.286628][T26945] __x64_sys_bpf+0x7c/0x90 [ 1304.290916][T26945] x64_sys_call+0x87f/0x9a0 [ 1304.295217][T26945] do_syscall_64+0x3b/0xb0 [ 1304.299475][T26945] ? clear_bhb_loop+0x55/0xb0 [ 1304.304101][T26945] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1304.309825][T26945] RIP: 0033:0x7f378b17def9 [ 1304.314079][T26945] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1304.333523][T26945] RSP: 002b:00007f378bfd7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1304.341853][T26945] RAX: ffffffffffffffda RBX: 00007f378b336058 RCX: 00007f378b17def9 [ 1304.349664][T26945] RDX: 0000000000000050 RSI: 0000000020000440 RDI: 000000000000000a [ 1304.357480][T26945] RBP: 00007f378bfd7090 R08: 0000000000000000 R09: 0000000000000000 [ 1304.365287][T26945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1304.373097][T26945] R13: 0000000000000000 R14: 00007f378b336058 R15: 00007fffaad2deb8 [ 1304.380927][T26945] [ 1304.886662][T26955] device syzkaller0 entered promiscuous mode [ 1305.710888][T26980] bond_slave_1: mtu less than device minimum [ 1305.719147][T26982] syz.4.8701[26982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1305.721252][T26982] syz.4.8701[26982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1307.718619][T27023] device syzkaller0 entered promiscuous mode [ 1307.866616][T27030] bond_slave_1: mtu less than device minimum [ 1308.003563][T27033] FAULT_INJECTION: forcing a failure. [ 1308.003563][T27033] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1308.016674][T27033] CPU: 1 PID: 27033 Comm: syz.0.8715 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 1308.026310][T27033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1308.036208][T27033] Call Trace: [ 1308.039332][T27033] [ 1308.042104][T27033] dump_stack_lvl+0x151/0x1b7 [ 1308.046785][T27033] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1308.052079][T27033] dump_stack+0x15/0x1c [ 1308.056076][T27033] should_fail_ex+0x3d0/0x520 [ 1308.060587][T27033] should_fail+0xb/0x10 [ 1308.064575][T27033] should_fail_usercopy+0x1a/0x20 [ 1308.069432][T27033] _copy_to_user+0x1e/0x90 [ 1308.073868][T27033] bpf_test_finish+0x56f/0x950 [ 1308.078471][T27033] ? convert_skb_to___skb+0x4f0/0x4f0 [ 1308.083673][T27033] ? __kasan_check_write+0x14/0x20 [ 1308.088619][T27033] ? _copy_from_user+0x90/0xc0 [ 1308.093435][T27033] ? bpf_test_init+0x169/0x190 [ 1308.098025][T27033] bpf_prog_test_run_xdp+0x8ce/0x1130 [ 1308.103244][T27033] ? dev_put+0x80/0x80 [ 1308.107134][T27033] ? __kasan_check_write+0x14/0x20 [ 1308.112080][T27033] ? fput+0x15b/0x1b0 [ 1308.115895][T27033] ? dev_put+0x80/0x80 [ 1308.119815][T27033] bpf_prog_test_run+0x3b0/0x630 [ 1308.124581][T27033] ? bpf_prog_query+0x260/0x260 [ 1308.129273][T27033] ? selinux_bpf+0xd2/0x100 [ 1308.133607][T27033] ? security_bpf+0x82/0xb0 [ 1308.137945][T27033] __sys_bpf+0x59f/0x7f0 [ 1308.142156][T27033] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1308.147356][T27033] ? bpf_trace_run1+0x240/0x240 [ 1308.152051][T27033] ? __ia32_sys_read+0x90/0x90 [ 1308.156641][T27033] __x64_sys_bpf+0x7c/0x90 [ 1308.160894][T27033] x64_sys_call+0x87f/0x9a0 [ 1308.165230][T27033] do_syscall_64+0x3b/0xb0 [ 1308.169489][T27033] ? clear_bhb_loop+0x55/0xb0 [ 1308.174000][T27033] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1308.179732][T27033] RIP: 0033:0x7fd44657def9 [ 1308.184112][T27033] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1308.203507][T27033] RSP: 002b:00007fd44740e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1308.211753][T27033] RAX: ffffffffffffffda RBX: 00007fd446735f80 RCX: 00007fd44657def9 [ 1308.219566][T27033] RDX: 0000000000000069 RSI: 00000000200002c0 RDI: 000000000000000a [ 1308.227472][T27033] RBP: 00007fd44740e090 R08: 0000000000000000 R09: 0000000000000000 [ 1308.235287][T27033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1308.243099][T27033] R13: 0000000000000000 R14: 00007fd446735f80 R15: 00007ffdb2a2fc08 [ 1308.250911][T27033] [ 1309.446493][T27051] device veth1_macvtap left promiscuous mode [ 1309.482648][T27051] device macsec0 left promiscuous mode [ 1309.543140][T27052] device veth1_macvtap entered promiscuous mode [ 1309.580496][T27052] device macsec0 entered promiscuous mode [ 1309.620167][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1310.246739][T27064] bond_slave_1: mtu less than device minimum [ 1312.260669][T27101] FAULT_INJECTION: forcing a failure. [ 1312.260669][T27101] name failslab, interval 1, probability 0, space 0, times 0 [ 1312.273531][T27101] CPU: 1 PID: 27101 Comm: syz.1.8739 Not tainted 6.1.99-syzkaller-00076-g5c7d0d4f4a38 #0 [ 1312.283346][T27101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1312.293241][T27101] Call Trace: [ 1312.296368][T27101] [ 1312.299142][T27101] dump_stack_lvl+0x151/0x1b7 [ 1312.303653][T27101] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1312.308948][T27101] dump_stack+0x15/0x1c [ 1312.312939][T27101] should_fail_ex+0x3d0/0x520 [ 1312.317461][T27101] ? selinux_sk_alloc_security+0x7d/0x1a0 [ 1312.323094][T27101] __should_failslab+0xaf/0xf0 [ 1312.327693][T27101] should_failslab+0x9/0x20 [ 1312.332030][T27101] __kmem_cache_alloc_node+0x3d/0x250 [ 1312.337235][T27101] ? selinux_sk_alloc_security+0x7d/0x1a0 [ 1312.342789][T27101] kmalloc_trace+0x2a/0xa0 [ 1312.347042][T27101] selinux_sk_alloc_security+0x7d/0x1a0 [ 1312.352578][T27101] security_sk_alloc+0x72/0xb0 [ 1312.357172][T27101] sk_prot_alloc+0x114/0x330 [ 1312.361790][T27101] sk_alloc+0x38/0x440 [ 1312.365681][T27101] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1312.371676][T27101] pptp_create+0x33/0x300 [ 1312.375838][T27101] pppox_create+0x14a/0x1c0 [ 1312.380178][T27101] __sock_create+0x3a6/0x760 [ 1312.384690][T27101] __sys_socketpair+0x29f/0x6e0 [ 1312.389375][T27101] ? __ia32_sys_socket+0x90/0x90 [ 1312.394151][T27101] ? debug_smp_processor_id+0x17/0x20 [ 1312.399368][T27101] __x64_sys_socketpair+0x9b/0xb0 [ 1312.404227][T27101] x64_sys_call+0x19b/0x9a0 [ 1312.408561][T27101] do_syscall_64+0x3b/0xb0 [ 1312.412812][T27101] ? clear_bhb_loop+0x55/0xb0 [ 1312.417328][T27101] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1312.423053][T27101] RIP: 0033:0x7fa4c2d7def9 [ 1312.427310][T27101] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1312.446748][T27101] RSP: 002b:00007fa4c3aaa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 1312.454993][T27101] RAX: ffffffffffffffda RBX: 00007fa4c2f35f80 RCX: 00007fa4c2d7def9 [ 1312.462805][T27101] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000018 [ 1312.470613][T27101] RBP: 00007fa4c3aaa090 R08: 0000000000000000 R09: 0000000000000000 [ 1312.478638][T27101] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 1312.486441][T27101] R13: 0000000000000000 R14: 00007fa4c2f35f80 R15: 00007ffc5df03ca8 [ 1312.494261][T27101] [ 1312.841244][T27116] device syzkaller0 entered promiscuous mode [ 1314.493201][T27139] device veth1_macvtap left promiscuous mode [ 1314.499182][T27139] device macsec0 left promiscuous mode [ 1314.516913][T27139] device veth1_macvtap entered promiscuous mode [ 1314.523170][T27139] device macsec0 entered promiscuous mode [ 1314.532104][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready SYZFAIL: repeatedly failed to execute the program proc=2 req=89 state=1 status=9 (errno 11: Resource temporarily unavailable) [ 1322.390393][ T10] device bridge_slave_1 left promiscuous mode [ 1322.396334][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 1322.403582][ T10] device bridge_slave_0 left promiscuous mode [ 1322.409550][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 1322.417716][ T10] device bridge_slave_1 left promiscuous mode [ 1322.423735][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 1322.430966][ T10] device bridge_slave_0 left promiscuous mode [ 1322.436877][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 1322.444539][ T10] device bridge_slave_1 left promiscuous mode [ 1322.450555][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 1322.457658][ T10] device bridge_slave_0 left promiscuous mode [ 1322.463629][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 1322.471385][ T10] device bridge_slave_1 left promiscuous mode [ 1322.477298][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 1322.484625][ T10] device bridge_slave_0 left promiscuous mode [ 1322.490701][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 1322.499560][ T10] device veth1_macvtap left promiscuous mode [ 1322.505660][ T10] device veth1_macvtap left promiscuous mode [ 1322.511522][ T10] device veth0_vlan left promiscuous mode [ 1322.517329][ T10] device veth1_macvtap left promiscuous mode [ 1322.523312][ T10] device veth0_vlan left promiscuous mode [ 1322.529205][ T10] device veth0_vlan left promiscuous mode [ 1322.534964][ T10] device veth1_macvtap left promiscuous mode [ 1322.540880][ T10] device veth0_vlan left promiscuous mode