last executing test programs: 1m31.718288084s ago: executing program 1 (id=1726): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="12000000010000000400000002"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x20) 1m29.427080649s ago: executing program 3 (id=2071): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x4, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x9, 0x4, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x5, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x80}, [@map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x400, @void, @value}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2505, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000580081044e81f782db44b904021d080009000300e8fe", 0x1a}], 0x1}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d0800fe067c05e8fe55a10a0005000140020003600e41b0000900ac0006fc111f000016000500014002000000035c3b61c1d67f6f94007174cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001b14d6d930dfe1d9d322fe7c4650b5b9bd6ee6f63f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b4ff010000000000000dd6e4edef3d93452a09004b43370e9703920723f97e46bb5c07540d3b", 0xd8}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e14f00800", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000090000000008eb1caaba5120304f27b4e7d11ada3d8209ea05b07b630afbc5", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80100, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x100904, 0x401, 0x25, 0x0, 0x1, 0x200, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x80, 0x4, 0x9, 0x3, 0xd4, 0x0, 0x5, 0x80020, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xfffffff7, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x10041c, 0x80, 0x0, 0x5, 0x1, 0x22d, 0x9, 0x0, 0x7, 0x0, 0xacc}, 0x0, 0xa, r6, 0xb) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r7, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0xff, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0017db3d947dd14e010017a43100ffea00000000"], 0x18}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1900000004000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00004000000000000000000000000000000000000000000000000000668166c57ecb946adc288397d6018a914533bb4e86d4afa414098eb9f6a2efa062ac339086c3cb793ae3a701edc9ebe37e81c22d88a4730ef61b3a83679126a3163b7ae4069406d5d23802a1207b7bdab13ccce9262dcd1d8d47d85e4e6767fbcb50fa0219d129a48013abfefb26b7e7baa997bb2833e4f35e855a35989089aed8fdfc99f8d784f36cb7b86eea9203fc3c84d8bb54e60c35f04738cc46069423a20aafdb01a9a7c7"], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000b40)={r9, 0x0, 0x0}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="364000001a00913a"], 0x82d7) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x4, 0x0, 0x6, 0x0, 0x0, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x4, @perf_config_ext={0x1, 0x8}, 0xa128, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1m16.09779081s ago: executing program 1 (id=1726): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="12000000010000000400000002"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x20) 1m13.786146595s ago: executing program 3 (id=2071): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x4, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x9, 0x4, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x5, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x80}, [@map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x400, @void, @value}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2505, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000580081044e81f782db44b904021d080009000300e8fe", 0x1a}], 0x1}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d0800fe067c05e8fe55a10a0005000140020003600e41b0000900ac0006fc111f000016000500014002000000035c3b61c1d67f6f94007174cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001b14d6d930dfe1d9d322fe7c4650b5b9bd6ee6f63f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b4ff010000000000000dd6e4edef3d93452a09004b43370e9703920723f97e46bb5c07540d3b", 0xd8}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e14f00800", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000090000000008eb1caaba5120304f27b4e7d11ada3d8209ea05b07b630afbc5", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80100, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x100904, 0x401, 0x25, 0x0, 0x1, 0x200, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x80, 0x4, 0x9, 0x3, 0xd4, 0x0, 0x5, 0x80020, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xfffffff7, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x10041c, 0x80, 0x0, 0x5, 0x1, 0x22d, 0x9, 0x0, 0x7, 0x0, 0xacc}, 0x0, 0xa, r6, 0xb) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r7, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0xff, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0017db3d947dd14e010017a43100ffea00000000"], 0x18}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1900000004000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00004000000000000000000000000000000000000000000000000000668166c57ecb946adc288397d6018a914533bb4e86d4afa414098eb9f6a2efa062ac339086c3cb793ae3a701edc9ebe37e81c22d88a4730ef61b3a83679126a3163b7ae4069406d5d23802a1207b7bdab13ccce9262dcd1d8d47d85e4e6767fbcb50fa0219d129a48013abfefb26b7e7baa997bb2833e4f35e855a35989089aed8fdfc99f8d784f36cb7b86eea9203fc3c84d8bb54e60c35f04738cc46069423a20aafdb01a9a7c7"], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000b40)={r9, 0x0, 0x0}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="364000001a00913a"], 0x82d7) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x4, 0x0, 0x6, 0x0, 0x0, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x4, @perf_config_ext={0x1, 0x8}, 0xa128, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 57.235408445s ago: executing program 1 (id=1726): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="12000000010000000400000002"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x20) 56.769967672s ago: executing program 3 (id=2071): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x4, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x9, 0x4, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x5, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x80}, [@map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x400, @void, @value}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2505, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000580081044e81f782db44b904021d080009000300e8fe", 0x1a}], 0x1}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d0800fe067c05e8fe55a10a0005000140020003600e41b0000900ac0006fc111f000016000500014002000000035c3b61c1d67f6f94007174cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001b14d6d930dfe1d9d322fe7c4650b5b9bd6ee6f63f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b4ff010000000000000dd6e4edef3d93452a09004b43370e9703920723f97e46bb5c07540d3b", 0xd8}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e14f00800", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000090000000008eb1caaba5120304f27b4e7d11ada3d8209ea05b07b630afbc5", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80100, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x100904, 0x401, 0x25, 0x0, 0x1, 0x200, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x80, 0x4, 0x9, 0x3, 0xd4, 0x0, 0x5, 0x80020, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xfffffff7, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x10041c, 0x80, 0x0, 0x5, 0x1, 0x22d, 0x9, 0x0, 0x7, 0x0, 0xacc}, 0x0, 0xa, r6, 0xb) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r7, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0xff, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0017db3d947dd14e010017a43100ffea00000000"], 0x18}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1900000004000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00004000000000000000000000000000000000000000000000000000668166c57ecb946adc288397d6018a914533bb4e86d4afa414098eb9f6a2efa062ac339086c3cb793ae3a701edc9ebe37e81c22d88a4730ef61b3a83679126a3163b7ae4069406d5d23802a1207b7bdab13ccce9262dcd1d8d47d85e4e6767fbcb50fa0219d129a48013abfefb26b7e7baa997bb2833e4f35e855a35989089aed8fdfc99f8d784f36cb7b86eea9203fc3c84d8bb54e60c35f04738cc46069423a20aafdb01a9a7c7"], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000b40)={r9, 0x0, 0x0}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="364000001a00913a"], 0x82d7) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x4, 0x0, 0x6, 0x0, 0x0, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x4, @perf_config_ext={0x1, 0x8}, 0xa128, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 46.024023374s ago: executing program 1 (id=1726): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="12000000010000000400000002"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x20) 45.292391075s ago: executing program 3 (id=2071): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x4, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x9, 0x4, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x5, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x80}, [@map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x400, @void, @value}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2505, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000580081044e81f782db44b904021d080009000300e8fe", 0x1a}], 0x1}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d0800fe067c05e8fe55a10a0005000140020003600e41b0000900ac0006fc111f000016000500014002000000035c3b61c1d67f6f94007174cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001b14d6d930dfe1d9d322fe7c4650b5b9bd6ee6f63f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b4ff010000000000000dd6e4edef3d93452a09004b43370e9703920723f97e46bb5c07540d3b", 0xd8}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e14f00800", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000090000000008eb1caaba5120304f27b4e7d11ada3d8209ea05b07b630afbc5", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80100, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x100904, 0x401, 0x25, 0x0, 0x1, 0x200, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x80, 0x4, 0x9, 0x3, 0xd4, 0x0, 0x5, 0x80020, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xfffffff7, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x10041c, 0x80, 0x0, 0x5, 0x1, 0x22d, 0x9, 0x0, 0x7, 0x0, 0xacc}, 0x0, 0xa, r6, 0xb) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r7, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0xff, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0017db3d947dd14e010017a43100ffea00000000"], 0x18}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1900000004000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00004000000000000000000000000000000000000000000000000000668166c57ecb946adc288397d6018a914533bb4e86d4afa414098eb9f6a2efa062ac339086c3cb793ae3a701edc9ebe37e81c22d88a4730ef61b3a83679126a3163b7ae4069406d5d23802a1207b7bdab13ccce9262dcd1d8d47d85e4e6767fbcb50fa0219d129a48013abfefb26b7e7baa997bb2833e4f35e855a35989089aed8fdfc99f8d784f36cb7b86eea9203fc3c84d8bb54e60c35f04738cc46069423a20aafdb01a9a7c7"], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000b40)={r9, 0x0, 0x0}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="364000001a00913a"], 0x82d7) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x4, 0x0, 0x6, 0x0, 0x0, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x4, @perf_config_ext={0x1, 0x8}, 0xa128, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 29.894594288s ago: executing program 1 (id=1726): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="12000000010000000400000002"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x20) 28.185672624s ago: executing program 3 (id=2071): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x4, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x9, 0x4, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x5, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x80}, [@map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x400, @void, @value}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2505, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000580081044e81f782db44b904021d080009000300e8fe", 0x1a}], 0x1}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d0800fe067c05e8fe55a10a0005000140020003600e41b0000900ac0006fc111f000016000500014002000000035c3b61c1d67f6f94007174cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001b14d6d930dfe1d9d322fe7c4650b5b9bd6ee6f63f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b4ff010000000000000dd6e4edef3d93452a09004b43370e9703920723f97e46bb5c07540d3b", 0xd8}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e14f00800", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000090000000008eb1caaba5120304f27b4e7d11ada3d8209ea05b07b630afbc5", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80100, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x100904, 0x401, 0x25, 0x0, 0x1, 0x200, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x80, 0x4, 0x9, 0x3, 0xd4, 0x0, 0x5, 0x80020, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xfffffff7, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x10041c, 0x80, 0x0, 0x5, 0x1, 0x22d, 0x9, 0x0, 0x7, 0x0, 0xacc}, 0x0, 0xa, r6, 0xb) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r7, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0xff, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0017db3d947dd14e010017a43100ffea00000000"], 0x18}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1900000004000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00004000000000000000000000000000000000000000000000000000668166c57ecb946adc288397d6018a914533bb4e86d4afa414098eb9f6a2efa062ac339086c3cb793ae3a701edc9ebe37e81c22d88a4730ef61b3a83679126a3163b7ae4069406d5d23802a1207b7bdab13ccce9262dcd1d8d47d85e4e6767fbcb50fa0219d129a48013abfefb26b7e7baa997bb2833e4f35e855a35989089aed8fdfc99f8d784f36cb7b86eea9203fc3c84d8bb54e60c35f04738cc46069423a20aafdb01a9a7c7"], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000b40)={r9, 0x0, 0x0}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="364000001a00913a"], 0x82d7) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x4, 0x0, 0x6, 0x0, 0x0, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x4, @perf_config_ext={0x1, 0x8}, 0xa128, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14.745682367s ago: executing program 1 (id=1726): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="12000000010000000400000002"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x20) 13.150437771s ago: executing program 3 (id=2071): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x4, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x9, 0x4, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x5, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x80}, [@map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x400, @void, @value}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2505, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000580081044e81f782db44b904021d080009000300e8fe", 0x1a}], 0x1}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d0800fe067c05e8fe55a10a0005000140020003600e41b0000900ac0006fc111f000016000500014002000000035c3b61c1d67f6f94007174cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001b14d6d930dfe1d9d322fe7c4650b5b9bd6ee6f63f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b4ff010000000000000dd6e4edef3d93452a09004b43370e9703920723f97e46bb5c07540d3b", 0xd8}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e14f00800", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000090000000008eb1caaba5120304f27b4e7d11ada3d8209ea05b07b630afbc5", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80100, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x100904, 0x401, 0x25, 0x0, 0x1, 0x200, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x80, 0x4, 0x9, 0x3, 0xd4, 0x0, 0x5, 0x80020, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xfffffff7, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x10041c, 0x80, 0x0, 0x5, 0x1, 0x22d, 0x9, 0x0, 0x7, 0x0, 0xacc}, 0x0, 0xa, r6, 0xb) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r7, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0xff, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0017db3d947dd14e010017a43100ffea00000000"], 0x18}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1900000004000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00004000000000000000000000000000000000000000000000000000668166c57ecb946adc288397d6018a914533bb4e86d4afa414098eb9f6a2efa062ac339086c3cb793ae3a701edc9ebe37e81c22d88a4730ef61b3a83679126a3163b7ae4069406d5d23802a1207b7bdab13ccce9262dcd1d8d47d85e4e6767fbcb50fa0219d129a48013abfefb26b7e7baa997bb2833e4f35e855a35989089aed8fdfc99f8d784f36cb7b86eea9203fc3c84d8bb54e60c35f04738cc46069423a20aafdb01a9a7c7"], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000b40)={r9, 0x0, 0x0}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="364000001a00913a"], 0x82d7) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x4, 0x0, 0x6, 0x0, 0x0, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x4, @perf_config_ext={0x1, 0x8}, 0xa128, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2.895340076s ago: executing program 0 (id=2661): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x0, 0x0, 0xf4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0xc8, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000000400000009"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xd, 0x5, 0x4, 0x1, 0x0, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r3, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)=r2}, 0x20) (async, rerun: 64) r5 = socket$kcm(0x10, 0x3, 0x10) (rerun: 64) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="1400000017000b63d25a80648c2594f905a3c92b", 0x14}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) recvmsg(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f00000002c0)=""/110, 0x6e}, {&(0x7f00000047c0)=""/4060, 0xfdc}, {&(0x7f00000037c0)=""/4069, 0xfe5}, {&(0x7f0000000700)=""/244, 0xf4}, {&(0x7f0000000140)=""/120, 0x78}, {&(0x7f00000012c0)=""/126, 0x7e}, {&(0x7f00000004c0)=""/38, 0x26}], 0x7}, 0x40000100) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001640)={{r2, 0xffffffffffffffff}, &(0x7f00000015c0), &(0x7f0000001600)='%pK \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001700)={0x9, 0x1f, &(0x7f0000001440)=@raw=[@alu={0x4, 0x0, 0x4, 0x2, 0x2, 0x30, 0xfffffffffffffffc}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4257}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @ldst={0x1, 0x3, 0x0, 0x3, 0x4, 0x0, 0x10}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000001540)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001580)={0x0, 0xa, 0x0, 0x7}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000001680)=[r4, r7, r3, r4], &(0x7f00000016c0)=[{0x2, 0x5, 0x9, 0x5}, {0x3, 0x4, 0x0, 0xa}, {0x3, 0x3, 0xf, 0x3}], 0x10, 0xfffffe00, @void, @value}, 0x94) (async) sendmsg$inet(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000900)="5c00000012006bab9a3fe3d86e17aa0a046b4877c4aaf68187bae53dca2ba35bda6a876c1d0048007ea608649e7524765f0ef82e3c0000a705259a3651f60a84c9f4d4938037e70e4509c5bb00000000e513aeac9bf2bee150d5fe86", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x20000000) recvmsg$kcm(r6, &(0x7f0000000e80)={0x0, 0x0, 0x0}, 0x40000002) (async, rerun: 64) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="850000006100000054000000000000009500000000000000b4a8b1541206000000e9c79077fa15ba36eca61299de54cf77c9062c30bc068829afff36b31fa7e358e95cfa"], &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) (rerun: 64) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000200)={r8, 0x2000000, 0x1b, 0x0, &(0x7f0000000080)="13435c46632b5f1e0000bc6a5c73e4e71c9b050000070500080001", 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r3, &(0x7f0000000240)="b3", 0x0}, 0x20) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) r10 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e000f000000e8bd6efb250314000e000100240248ff05000500", 0x2c}, {&(0x7f00000019c0)="06bb", 0x2}], 0x2}, 0x0) (async) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x7400}, 0x4008054) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00', 0x20}) (async) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0x0) (async, rerun: 64) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) r12 = socket$kcm(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r12, 0x541b, &(0x7f0000000000)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x89f9, &(0x7f0000000080)) (async) recvmsg(r1, &(0x7f0000000340)={&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000240)=""/100, 0x64}, {&(0x7f00000002c0)=""/107, 0x6b}, {&(0x7f0000000440)=""/4096, 0x1000}], 0x3}, 0x2102) (async, rerun: 64) write$cgroup_subtree(r9, &(0x7f0000000180)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63fc80fc020c2f00db5b686158bbcfe8875a060300000023000000000000000000000000ac1414aa3a2008"], 0xfdef) (rerun: 64) 2.549268182s ago: executing program 0 (id=2662): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000a00)='fib_table_lookup\x00', r4}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112b0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01ac69398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc786b409ac930c90ff90f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d858952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ef6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b6214912a517810200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09e3187a10d905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367638cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734837ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a6d072034cecc457776c5fa1f33b0203c07052c6bc314b0ac5c63bc2083c9cda0b7480e0b17854ffcc76176ce266bc698f7921b8afe798a7a5ed33ab0374455ee368fda99a0e681bf9426831b193395cb01a7332a50aac841cb7d48a1768a7640a9820631ba775a2d4f12e8e717eaaa2a6d14fee0c15f36c203dbc7c06128bec84231d43e152ef19ce027436fb4ebb9fce431b913f4817597a6f53d1626f9d1cb7b36fb18ac19547a8b20ede70c81a75686cea85dcd34408128da7cab045541bc6b9a0a79f63f2e7646356e04b977c9f47467537015240b974184be9c54b7c628ae4d97ebdb06070344468994afbaac71e5ffac2c61d9af66f9de2760a38e968a781528531c1c936a02065be48f1eee77be878873206d65bd0b1241fab9139abd7f40febe81fed3684e6b59273da01f1743c6a5df300ec59c65e8174fc2d95a62ca7b937289ad14107333007eab833a5849eb19f18ae41743dfb949377e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xfe, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 2.325524715s ago: executing program 2 (id=2664): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2501, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43, 0x0, @perf_bp={0x0, 0x8}, 0x390, 0x0, 0x0, 0x2, 0x3, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x2, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x13, 0x4, &(0x7f0000000700)=@framed={{}, [@ldst={0x3, 0x2, 0x3, 0x1, 0x0, 0x82}]}, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, 0x0, 0x0, 0x10, 0x1, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x16, 0x11, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}, {}, {}, [@map_fd], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000180)='syzkaller\x00', 0x2, 0xc0, &(0x7f00000001c0)=""/192, 0x41000, 0x1, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xe, 0x2, 0x80000001}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff], 0x0, 0x10, 0x1000, @void, @value}, 0x94) r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x804, 0x14c9, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, @perf_config_ext={0x1}, 0xa0, 0x58, 0x0, 0x4, 0x2, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={@cgroup, 0x4, 0x1, 0x10001, &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0], 0x0}, 0x40) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, r0, 0x0, 0x1, &(0x7f0000000600)='\x00', 0x0}, 0x30) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000001c0)="d8000000180081054e81f782db44b904021d005c06007c09e8fe55a10a0015400300142603600e1208000b0000000401a80008000800014003001100036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xef8a, 0xff}, 0x19080, 0x0, 0x0, 0x0, 0x0, 0x3945a1b7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={@cgroup=r8, 0x14, 0x1, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r10}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000540)={@map=r5, r1, 0xc, 0x20, r3, @void, @void, @void, @value=r6, r4}, 0x20) r12 = socket$kcm(0x10, 0x2, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000b40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r13, 0x8b04, &(0x7f0000000000)={'wlan1\x00', @random="020000000500"}) sendmsg$kcm(r12, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000900)="89000000120081ae08060cdc030ec0007f03e3f7feff000000e2ffca1b1f0000000004c00e72f750375ed08a56331dbf00d7815e381ad6e706033a0093b837dc6cc01e32efaec8c7a6ec08123d000200354001000400446b9bbc7a46e3988285dcdf12f21308f868fece01951fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000680)={r12}) 2.037398579s ago: executing program 0 (id=2665): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2501, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43, 0x0, @perf_bp={0x0, 0x8}, 0x390, 0x0, 0x0, 0x2, 0x3, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x2, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x16, 0x11, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}, {}, {}, [@map_fd], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000180)='syzkaller\x00', 0x2, 0xc0, &(0x7f00000001c0)=""/192, 0x41000, 0x1, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xe, 0x2, 0x80000001}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff], 0x0, 0x10, 0x1000, @void, @value}, 0x94) r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x804, 0x14c9, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, @perf_config_ext={0x1}, 0xa0, 0x58, 0x0, 0x4, 0x2, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={@cgroup, 0x4, 0x1, 0x10001, &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0], 0x0}, 0x40) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, r0, 0x0, 0x1, &(0x7f0000000600)='\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000540)={@map=r5, r1, 0xc, 0x20, r3, @void, @void, @void, @value=r6, r4}, 0x20) r7 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000900)="89000000120081ae08060cdc030ec0007f03e3f7feff000000e2ffca1b1f0000000004c00e72f750375ed08a56331dbf00d7815e381ad6e706033a0093b837dc6cc01e32efaec8c7a6ec08123d000200354001000400446b9bbc7a46e3988285dcdf12f21308f868fece01951fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) 1.696402714s ago: executing program 2 (id=2666): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x3, 0x3, &(0x7f0000000ac0)=ANY=[@ANYBLOB="660a000000000000691174000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = gettid() sendmsg$unix(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@cred={{0x1c, 0x1, 0x2, {r3, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee01, 0xee00}}}], 0x40}, 0x40000) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x4, 0x5, 0x0, 0x2, 0x14044, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x400, 0xc8, 0x0, 0x1, 0xfffffffffffffffc, 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x800000000000}, 0x0, 0x0, r5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000300)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1000}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9, 0xfe00}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x8}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x6, 0x1, 0xb, 0x8, 0x9}, {0x4, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x8, 0x2, 0x0, r0}, {}, {0x46, 0x0, 0x0, 0x76}}], {{}, {0x6, 0x0, 0x7, 0x8}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000980)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg=0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1.574535586s ago: executing program 0 (id=2667): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0xc000000, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0900000004000000563c00000100000002000000", @ANYRES32, @ANYBLOB="0000000000fbffffff00080000002200c500000000", @ANYRES32=0x0, @ANYBLOB='\x00'/17], 0x48) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffdf2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0xc000000, 0x2101, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="2e00000010008188040f80ec59acbc0413a181014100000000010000000000000e0041000f00000002800200121f", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000009df7000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b50400000000000085000000030000009500000000000000144cf1ce5e9fd54f2fb0db2b52ccee471ccac4ac1e8dd6421c41e04201b2484da3be89d03669dd125692b731e5941d2115cca8254d8cfabe18b96d088cf775bdcdf15e6826a63d0b4e73aa46e23f7976b045168d225c22f802cfaa996ffbececec3ca78ecf03f730a3aaf9"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = socket$kcm(0xa, 0x2, 0x88) sendmsg$kcm(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x200ce0c0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000200)=ANY=[], 0x12) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r2}, 0x8) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000280)={'caif0\x00', @remote}) 948.148586ms ago: executing program 2 (id=2668): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x14869, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xf, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="180800000000000000000000000000008510000005000000850000000f0000005f0000000000000018000000000000000000000000000000950000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0500000004000000080000000a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 722.533839ms ago: executing program 2 (id=2669): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x103000, 0x4, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) close(r0) 610.733231ms ago: executing program 0 (id=2670): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2501, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43, 0x0, @perf_bp={0x0, 0x8}, 0x390, 0x0, 0x0, 0x2, 0x3, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x2, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x16, 0x11, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}, {}, {}, [@map_fd], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000180)='syzkaller\x00', 0x2, 0xc0, &(0x7f00000001c0)=""/192, 0x41000, 0x1, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xe, 0x2, 0x80000001}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff], 0x0, 0x10, 0x1000, @void, @value}, 0x94) r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x804, 0x14c9, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, @perf_config_ext={0x1}, 0xa0, 0x58, 0x0, 0x4, 0x2, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={@cgroup, 0x4, 0x1, 0x10001, &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0], 0x0}, 0x40) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, r0, 0x0, 0x1, &(0x7f0000000600)='\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000540)={@map=r5, r1, 0xc, 0x20, r3, @void, @void, @void, @value=r6, r4}, 0x20) r7 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000900)="89000000120081ae08060cdc030ec0007f03e3f7feff000000e2ffca1b1f0000000004c00e72f750375ed08a56331dbf00d7815e381ad6e706033a0093b837dc6cc01e32efaec8c7a6ec08123d000200354001000400446b9bbc7a46e3988285dcdf12f21308f868fece01951fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) (fail_nth: 1) 152.493748ms ago: executing program 0 (id=2671): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x3a, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffd}, 0x50) close(r1) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xfdef) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000180)='W', 0x1}], 0x1}, 0x0) close(r0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r0, 0xc008744c, &(0x7f0000000180)) 117.918968ms ago: executing program 2 (id=2672): r0 = socket$kcm(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000001000000080000000c"], 0x50) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') sendmsg$inet(r0, &(0x7f0000000500)={&(0x7f0000000040)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000180)="dd4ba5ea4a703b202975faea2d3e0c2ca081d97aa0c615b7bf71a0f4aef66f10e25f2a383b565c64c7a1c011396676903860826e0be2c71e8d61d66f28029d55234d937af8468c269a2e3ca6cf44510dbccc089d7230b3701b2951a959890855f9598c47c547c97fd1997b87bcbb0999ee4ef5e6f395effa4e", 0x79}, {&(0x7f0000000200)="bbc9ac9aa1605ac9d0c1e8d1e4", 0xd}, {&(0x7f0000000240)="7600cde2a5b248944a9144612aaf414886be5178020ac97333c5043f3b6a0a4e2537e504190983c6640d426f317b983918a96e15da1ade193f3148476d04956d28d652bb2b562edeed4046d3d8d25feb8cb325ffe48c05f5dd1736f00300f7cdf173573cfe2f103ec1c289b536e521e326ea3ac099d4628637fcc03ea7d9a94db6e2146583f3041c94d51563674a5425cd5af28f702861e1f216cb05205375", 0x9f}], 0x3, &(0x7f0000000380)=[@ip_retopts={{0xa8, 0x0, 0x7, {[@cipso={0x86, 0x3a, 0x3, [{0x3, 0x2}, {0x1, 0x8, "b97100fcd712"}, {0x7, 0x12, "5522428ce601aa30cd48da8a2ee1f3c8"}, {0x6, 0x10, "6a15740cd0fb15bc9b8a234430cb"}, {0x0, 0x8, "67786ad75826"}]}, @ssrr={0x89, 0x17, 0x81, [@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast]}, @generic={0x86, 0xa, "d31dd72a0422ee6b"}, @noop, @cipso={0x86, 0x3a, 0x3, [{0x1, 0xb, "9cbff76a709144d5f0"}, {0x0, 0xb, "ad7328a7093bc680a0"}, {0x0, 0x6, "7cf6d621"}, {0x1, 0x11, "606c3321b82e423a28d71216ccd680"}, {0x1, 0x4, "27f3"}, {0x7, 0x3, "03"}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}, @ip_retopts={{0x14, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}]}}}, @ip_retopts={{0x38, 0x0, 0x7, {[@cipso={0x86, 0x16, 0x1, [{0x2, 0x10, "69f02117d77f80908e5eae8265d2"}]}, @lsrr={0x83, 0xf, 0x47, [@empty, @rand_addr=0x64010100, @multicast1]}]}}}, @ip_tos_int={{0x14}}], 0x140}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x200, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000280), 0x0}, 0x20) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="1400000016000b63d25a80648c2594f921240685", 0x14}], 0x1}, 0x0) 0s ago: executing program 2 (id=2673): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000a00)='fib_table_lookup\x00', r4}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112b0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01ac69398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc786b409ac930c90ff90f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d858952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ef6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b6214912a517810200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09e3187a10d905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367638cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734837ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a6d072034cecc457776c5fa1f33b0203c07052c6bc314b0ac5c63bc2083c9cda0b7480e0b17854ffcc76176ce266bc698f7921b8afe798a7a5ed33ab0374455ee368fda99a0e681bf9426831b193395cb01a7332a50aac841cb7d48a1768a7640a9820631ba775a2d4f12e8e717eaaa2a6d14fee0c15f36c203dbc7c06128bec84231d43e152ef19ce027436fb4ebb9fce431b913f4817597a6f53d1626f9d1cb7b36fb18ac19547a8b20ede70c81a75686cea85dcd34408128da7cab045541bc6b9a0a79f63f2e7646356e04b977c9f47467537015240b974184be9c54b7c628ae4d97ebdb06070344468994afbaac71e5ffac2c61d9af66f9de2760a38e968a781528531c1c936a02065be48f1eee77be878873206d65bd0b1241fab9139abd7f40febe81fed3684e6b59273da01f1743c6a5df300ec59c65e8174fc2d95a62ca7b937289ad14107333007eab833a5849eb19f18ae41743dfb949377e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xfe, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) kernel console output (not intermixed with test programs): on+0x98/0x150 [ 387.585421][T12829] do_syscall_64+0x55/0xb0 [ 387.589945][T12829] ? clear_bhb_loop+0x40/0x90 [ 387.594633][T12829] ? clear_bhb_loop+0x40/0x90 [ 387.599327][T12829] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 387.605244][T12829] RIP: 0033:0x7f8a7b58e929 [ 387.609780][T12829] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 387.629402][T12829] RSP: 002b:00007f8a7c393038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 387.637833][T12829] RAX: ffffffffffffffda RBX: 00007f8a7b7b5fa0 RCX: 00007f8a7b58e929 [ 387.645819][T12829] RDX: 0000000000000000 RSI: 0000200000000380 RDI: 0000000000000003 [ 387.653799][T12829] RBP: 00007f8a7c393090 R08: 0000000000000000 R09: 0000000000000000 [ 387.661783][T12829] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 387.669764][T12829] R13: 0000000000000000 R14: 00007f8a7b7b5fa0 R15: 00007ffc77050298 [ 387.677770][T12829] [ 387.776094][ T1069] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 387.821711][T12777] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.830214][T12777] bridge0: port 1(bridge_slave_0) entered disabled state [ 387.837712][T12777] bridge_slave_0: entered allmulticast mode [ 387.844875][T12777] bridge_slave_0: entered promiscuous mode [ 387.853555][T12777] bridge0: port 2(bridge_slave_1) entered blocking state [ 387.862108][T12777] bridge0: port 2(bridge_slave_1) entered disabled state [ 387.870494][T12777] bridge_slave_1: entered allmulticast mode [ 387.877943][T12777] bridge_slave_1: entered promiscuous mode [ 387.889581][T12756] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 387.902288][T12756] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 387.927854][ T1069] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 388.060642][ T1069] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 388.077806][T12777] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 388.091575][T12756] team0: Port device team_slave_0 added [ 388.104387][T12756] team0: Port device team_slave_1 added [ 388.129399][T12777] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 388.191810][T12756] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 388.214198][T12756] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 388.241409][T12756] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 388.303750][T12777] team0: Port device team_slave_0 added [ 388.318379][T12777] team0: Port device team_slave_1 added [ 388.338867][T12756] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 388.348491][T12756] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 388.375112][T12756] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 388.422903][T12777] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 388.431347][T12777] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 388.458154][T12777] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 388.483292][T12777] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 388.491942][T12777] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 388.519457][T12777] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 388.716257][T12756] hsr_slave_0: entered promiscuous mode [ 388.742493][T12756] hsr_slave_1: entered promiscuous mode [ 388.752886][T12756] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 388.776169][T12756] Cannot create hsr debugfs directory [ 388.957576][T12854] syz.0.2398[12854] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 388.958124][T12854] syz.0.2398[12854] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 389.037619][T12777] hsr_slave_0: entered promiscuous mode [ 389.083129][ T5786] Bluetooth: hci3: command tx timeout [ 389.099442][T12777] hsr_slave_1: entered promiscuous mode [ 389.165281][T12777] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 389.182287][T12777] Cannot create hsr debugfs directory [ 389.475885][ T5786] Bluetooth: hci2: command tx timeout [ 389.772924][T12876] FAULT_INJECTION: forcing a failure. [ 389.772924][T12876] name failslab, interval 1, probability 0, space 0, times 0 [ 389.803237][T12876] CPU: 1 PID: 12876 Comm: syz.0.2403 Not tainted 6.6.94-syzkaller #0 [ 389.811390][T12876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 389.821521][T12876] Call Trace: [ 389.824835][T12876] [ 389.827804][T12876] dump_stack_lvl+0x16c/0x230 [ 389.832530][T12876] ? show_regs_print_info+0x20/0x20 [ 389.837771][T12876] ? load_image+0x3b0/0x3b0 [ 389.842318][T12876] ? __might_sleep+0xe0/0xe0 [ 389.846960][T12876] ? __lock_acquire+0x7c80/0x7c80 [ 389.852039][T12876] should_fail_ex+0x39d/0x4d0 [ 389.856767][T12876] should_failslab+0x9/0x20 [ 389.861300][T12876] slab_pre_alloc_hook+0x59/0x310 [ 389.866372][T12876] ? aa_get_newest_label+0xf8/0x5c0 [ 389.871614][T12876] ? sk_prot_alloc+0xe7/0x210 [ 389.876325][T12876] ? sk_prot_alloc+0xe7/0x210 [ 389.881051][T12876] __kmem_cache_alloc_node+0x53/0x260 [ 389.886463][T12876] ? sk_prot_alloc+0xe7/0x210 [ 389.891181][T12876] __kmalloc+0xa4/0x240 [ 389.895374][T12876] sk_prot_alloc+0xe7/0x210 [ 389.899911][T12876] ? sk_alloc+0x24/0x360 [ 389.904192][T12876] sk_alloc+0x3a/0x360 [ 389.908298][T12876] xsk_create+0x102/0x680 [ 389.912661][T12876] __sock_create+0x4a6/0x940 [ 389.917287][T12876] __sys_socket+0xd7/0x1a0 [ 389.921729][T12876] __x64_sys_socket+0x7a/0x90 [ 389.926434][T12876] do_syscall_64+0x55/0xb0 [ 389.930875][T12876] ? clear_bhb_loop+0x40/0x90 [ 389.935581][T12876] ? clear_bhb_loop+0x40/0x90 [ 389.940273][T12876] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 389.946197][T12876] RIP: 0033:0x7f6fdd78e929 [ 389.950628][T12876] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 389.970253][T12876] RSP: 002b:00007f6fde611038 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 389.978686][T12876] RAX: ffffffffffffffda RBX: 00007f6fdd9b5fa0 RCX: 00007f6fdd78e929 [ 389.986678][T12876] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 000000000000002c [ 389.994746][T12876] RBP: 00007f6fde611090 R08: 0000000000000000 R09: 0000000000000000 [ 390.002729][T12876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 390.010715][T12876] R13: 0000000000000000 R14: 00007f6fdd9b5fa0 R15: 00007ffdf06a3ad8 [ 390.018724][T12876] [ 391.145417][ T5786] Bluetooth: hci3: command tx timeout [ 391.284651][ T1069] hsr_slave_0: left promiscuous mode [ 391.310323][ T1069] hsr_slave_1: left promiscuous mode [ 391.338353][ T1069] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 391.355565][ T1069] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 391.364771][ T1069] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 391.396342][ T1069] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 391.415741][T12907] syz.0.2409[12907] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 391.416120][T12907] syz.0.2409[12907] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 391.436058][ T1069] bridge_slave_1: left allmulticast mode [ 391.461971][ T1069] bridge_slave_1: left promiscuous mode [ 391.470182][ T1069] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.517966][ T1069] bridge_slave_0: left allmulticast mode [ 391.523678][ T1069] bridge_slave_0: left promiscuous mode [ 391.539886][ T1069] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.555625][ T5786] Bluetooth: hci2: command tx timeout [ 391.647521][T12915] FAULT_INJECTION: forcing a failure. [ 391.647521][T12915] name failslab, interval 1, probability 0, space 0, times 0 [ 391.660389][T12915] CPU: 1 PID: 12915 Comm: syz.2.2412 Not tainted 6.6.94-syzkaller #0 [ 391.668603][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 391.678770][T12915] Call Trace: [ 391.682088][T12915] [ 391.685052][T12915] dump_stack_lvl+0x16c/0x230 [ 391.689798][T12915] ? show_regs_print_info+0x20/0x20 [ 391.695043][T12915] ? load_image+0x3b0/0x3b0 [ 391.699594][T12915] ? __lock_acquire+0x7c80/0x7c80 [ 391.704763][T12915] should_fail_ex+0x39d/0x4d0 [ 391.709575][T12915] should_failslab+0x9/0x20 [ 391.714098][T12915] slab_pre_alloc_hook+0x59/0x310 [ 391.719145][T12915] kmem_cache_alloc+0x5a/0x2e0 [ 391.723936][T12915] ? alloc_empty_file+0x9e/0x1d0 [ 391.728900][T12915] alloc_empty_file+0x9e/0x1d0 [ 391.733682][T12915] path_openat+0x100/0x3190 [ 391.738243][T12915] ? perf_trace_lock+0xf7/0x380 [ 391.743125][T12915] ? __x64_sys_openat+0x139/0x160 [ 391.748185][T12915] ? verify_lock_unused+0x140/0x140 [ 391.753407][T12915] ? do_filp_open+0x3d0/0x3d0 [ 391.758105][T12915] ? perf_trace_lock+0xf7/0x380 [ 391.762992][T12915] ? trace_event_raw_event_lock+0x230/0x230 [ 391.768929][T12915] do_filp_open+0x1c5/0x3d0 [ 391.773469][T12915] ? vfs_tmpfile+0x490/0x490 [ 391.778108][T12915] ? _raw_spin_unlock+0x28/0x40 [ 391.782990][T12915] ? alloc_fd+0x58f/0x630 [ 391.787359][T12915] do_sys_openat2+0x12c/0x1c0 [ 391.792083][T12915] ? do_sys_open+0xe0/0xe0 [ 391.796522][T12915] ? lockdep_hardirqs_on_prepare+0x400/0x760 [ 391.802521][T12915] ? lock_chain_count+0x20/0x20 [ 391.807396][T12915] __x64_sys_openat+0x139/0x160 [ 391.812273][T12915] do_syscall_64+0x55/0xb0 [ 391.816712][T12915] ? clear_bhb_loop+0x40/0x90 [ 391.821408][T12915] ? clear_bhb_loop+0x40/0x90 [ 391.826106][T12915] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 391.832027][T12915] RIP: 0033:0x7f8a7b58e929 [ 391.836462][T12915] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 391.856093][T12915] RSP: 002b:00007f8a7c393038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 391.864529][T12915] RAX: ffffffffffffffda RBX: 00007f8a7b7b5fa0 RCX: 00007f8a7b58e929 [ 391.872688][T12915] RDX: 0000000000000001 RSI: 0000200000000080 RDI: ffffffffffffff9c [ 391.880676][T12915] RBP: 00007f8a7c393090 R08: 0000000000000000 R09: 0000000000000000 [ 391.888661][T12915] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 391.896649][T12915] R13: 0000000000000001 R14: 00007f8a7b7b5fa0 R15: 00007ffc77050298 [ 391.904674][T12915] [ 391.910390][ T1069] veth1_macvtap: left promiscuous mode [ 391.917216][ T1069] veth0_macvtap: left promiscuous mode [ 391.923031][ T1069] veth1_vlan: left promiscuous mode [ 391.932237][ T1069] veth0_vlan: left promiscuous mode [ 392.509514][ T1069] team0 (unregistering): Port device team_slave_1 removed [ 392.550902][ T1069] team0 (unregistering): Port device team_slave_0 removed [ 392.594583][ T1069] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 392.638387][ T1069] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 393.099791][ T1069] bond0 (unregistering): Released all slaves [ 393.225524][ T5786] Bluetooth: hci3: command tx timeout [ 393.561631][T12777] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 393.585645][T12777] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 393.603167][T12777] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 393.670920][T12777] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 393.882031][T12949] syz.2.2419[12949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 393.882820][T12949] syz.2.2419[12949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 393.906036][T12756] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 393.937897][T12756] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 393.961663][T12756] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 393.993968][T12756] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 394.164829][T12777] 8021q: adding VLAN 0 to HW filter on device bond0 [ 394.221881][T12777] 8021q: adding VLAN 0 to HW filter on device team0 [ 394.256395][ T8412] bridge0: port 1(bridge_slave_0) entered blocking state [ 394.263774][ T8412] bridge0: port 1(bridge_slave_0) entered forwarding state [ 394.310387][ T8412] bridge0: port 2(bridge_slave_1) entered blocking state [ 394.317630][ T8412] bridge0: port 2(bridge_slave_1) entered forwarding state [ 394.419573][T12968] syzkaller0: entered promiscuous mode [ 394.430602][T12968] syzkaller0: entered allmulticast mode [ 394.452820][T12756] 8021q: adding VLAN 0 to HW filter on device bond0 [ 396.461845][T12756] 8021q: adding VLAN 0 to HW filter on device team0 [ 396.492245][ T1069] bridge0: port 1(bridge_slave_0) entered blocking state [ 396.499480][ T1069] bridge0: port 1(bridge_slave_0) entered forwarding state [ 396.537621][ T8412] bridge0: port 2(bridge_slave_1) entered blocking state [ 396.544956][ T8412] bridge0: port 2(bridge_slave_1) entered forwarding state [ 396.624720][T13017] FAULT_INJECTION: forcing a failure. [ 396.624720][T13017] name failslab, interval 1, probability 0, space 0, times 0 [ 396.640253][T13017] CPU: 1 PID: 13017 Comm: syz.2.2426 Not tainted 6.6.94-syzkaller #0 [ 396.648386][T13017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 396.658487][T13017] Call Trace: [ 396.661801][T13017] [ 396.664759][T13017] dump_stack_lvl+0x16c/0x230 [ 396.669492][T13017] ? show_regs_print_info+0x20/0x20 [ 396.674731][T13017] ? load_image+0x3b0/0x3b0 [ 396.679356][T13017] ? __might_sleep+0xe0/0xe0 [ 396.683979][T13017] ? __lock_acquire+0x7c80/0x7c80 [ 396.689038][T13017] should_fail_ex+0x39d/0x4d0 [ 396.693758][T13017] should_failslab+0x9/0x20 [ 396.698284][T13017] slab_pre_alloc_hook+0x59/0x310 [ 396.703333][T13017] ? bpf_prog_array_copy+0x198/0x370 [ 396.708645][T13017] ? bpf_prog_array_copy+0x198/0x370 [ 396.713952][T13017] __kmem_cache_alloc_node+0x53/0x260 [ 396.719347][T13017] ? perf_event_attach_bpf_prog+0xc8/0x3a0 [ 396.725194][T13017] ? bpf_prog_array_copy+0x198/0x370 [ 396.730513][T13017] __kmalloc+0xa4/0x240 [ 396.734698][T13017] bpf_prog_array_copy+0x198/0x370 [ 396.739856][T13017] perf_event_attach_bpf_prog+0x257/0x3a0 [ 396.745609][T13017] ? pe_prog_convert_ctx_access+0x5b0/0x5b0 [ 396.751526][T13017] ? trace_event_get_offsets+0x72/0x100 [ 396.757104][T13017] ? __perf_event_set_bpf_prog+0x4a4/0x6e0 [ 396.762948][T13017] perf_ioctl+0x7d3/0x2440 [ 396.767394][T13017] ? tomoyo_path_number_perm+0x1ba/0x590 [ 396.773055][T13017] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 396.778553][T13017] ? perf_poll+0x1b0/0x1b0 [ 396.783040][T13017] ? __fget_files+0x28/0x4d0 [ 396.787680][T13017] ? bpf_lsm_file_ioctl+0x9/0x10 [ 396.792637][T13017] ? security_file_ioctl+0x80/0xa0 [ 396.797776][T13017] ? perf_poll+0x1b0/0x1b0 [ 396.802221][T13017] __se_sys_ioctl+0xfd/0x170 [ 396.806854][T13017] do_syscall_64+0x55/0xb0 [ 396.811310][T13017] ? clear_bhb_loop+0x40/0x90 [ 396.816012][T13017] ? clear_bhb_loop+0x40/0x90 [ 396.820717][T13017] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 396.826644][T13017] RIP: 0033:0x7f8a7b58e929 [ 396.831085][T13017] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 396.850720][T13017] RSP: 002b:00007f8a7c393038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 396.859163][T13017] RAX: ffffffffffffffda RBX: 00007f8a7b7b5fa0 RCX: 00007f8a7b58e929 [ 396.867163][T13017] RDX: 0000000000000004 RSI: 0000000040042408 RDI: 0000000000000003 [ 396.875157][T13017] RBP: 00007f8a7c393090 R08: 0000000000000000 R09: 0000000000000000 [ 396.883149][T13017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 396.891142][T13017] R13: 0000000000000000 R14: 00007f8a7b7b5fa0 R15: 00007ffc77050298 [ 396.899163][T13017] [ 397.127979][T13024] FAULT_INJECTION: forcing a failure. [ 397.127979][T13024] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 397.157705][T13024] CPU: 0 PID: 13024 Comm: syz.2.2427 Not tainted 6.6.94-syzkaller #0 [ 397.165846][T13024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 397.175944][T13024] Call Trace: [ 397.179267][T13024] [ 397.182243][T13024] dump_stack_lvl+0x16c/0x230 [ 397.186985][T13024] ? show_regs_print_info+0x20/0x20 [ 397.192349][T13024] ? load_image+0x3b0/0x3b0 [ 397.196908][T13024] ? __lock_acquire+0x7c80/0x7c80 [ 397.202078][T13024] ? snprintf+0xdb/0x120 [ 397.206379][T13024] should_fail_ex+0x39d/0x4d0 [ 397.211222][T13024] _copy_to_user+0x2f/0xa0 [ 397.215693][T13024] simple_read_from_buffer+0xe7/0x150 [ 397.221125][T13024] proc_fail_nth_read+0x1e3/0x250 [ 397.226222][T13024] ? proc_fault_inject_write+0x340/0x340 [ 397.231912][T13024] ? fsnotify_perm+0x271/0x5e0 [ 397.236721][T13024] ? proc_fault_inject_write+0x340/0x340 [ 397.241166][T13026] syz.0.2428[13026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 397.242398][T13024] vfs_read+0x27e/0x920 [ 397.242467][T13024] ? kernel_read+0x1e0/0x1e0 [ 397.262650][T13024] ? __fget_files+0x28/0x4d0 [ 397.267296][T13024] ? __fget_files+0x44a/0x4d0 [ 397.272027][T13024] ? __fdget_pos+0x2a3/0x330 [ 397.276644][T13024] ? ksys_read+0x75/0x250 [ 397.281000][T13024] ksys_read+0x147/0x250 [ 397.285275][T13024] ? vfs_write+0x940/0x940 [ 397.289721][T13024] ? lockdep_hardirqs_on+0x98/0x150 [ 397.294942][T13024] do_syscall_64+0x55/0xb0 [ 397.299376][T13024] ? clear_bhb_loop+0x40/0x90 [ 397.304199][T13024] ? clear_bhb_loop+0x40/0x90 [ 397.308893][T13024] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 397.314813][T13024] RIP: 0033:0x7f8a7b58d33c [ 397.319242][T13024] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 397.339041][T13024] RSP: 002b:00007f8a7c393030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 397.347470][T13024] RAX: ffffffffffffffda RBX: 00007f8a7b7b5fa0 RCX: 00007f8a7b58d33c [ 397.355453][T13024] RDX: 000000000000000f RSI: 00007f8a7c3930a0 RDI: 0000000000000005 [ 397.363436][T13024] RBP: 00007f8a7c393090 R08: 0000000000000000 R09: 0000000000000000 [ 397.371504][T13024] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 397.379488][T13024] R13: 0000000000000000 R14: 00007f8a7b7b5fa0 R15: 00007ffc77050298 [ 397.387496][T13024] [ 397.404930][T13026] syz.0.2428[13026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 397.550204][T12756] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 397.681960][T12777] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 397.754232][T12756] veth0_vlan: entered promiscuous mode [ 397.789456][T12777] veth0_vlan: entered promiscuous mode [ 397.802109][T12756] veth1_vlan: entered promiscuous mode [ 397.819508][T12777] veth1_vlan: entered promiscuous mode [ 397.870630][T12756] veth0_macvtap: entered promiscuous mode [ 397.883192][T12777] veth0_macvtap: entered promiscuous mode [ 397.894948][T12756] veth1_macvtap: entered promiscuous mode [ 397.902841][T12777] veth1_macvtap: entered promiscuous mode [ 397.936759][T12777] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 397.954393][T12756] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 397.966825][T12756] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 397.980520][T12756] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 398.001989][T12777] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 398.013112][T12756] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 398.026914][T12756] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 398.038907][T12756] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 398.058166][T12777] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 398.068964][T12777] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 398.078371][T12777] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 398.087595][T12777] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 398.106810][T12756] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 398.116793][T12756] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 398.126287][T12756] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 398.135292][T12756] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 398.264969][ T8406] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 398.276535][ T8406] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 398.301665][ T8406] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 398.312907][ T8406] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 398.345461][ T8412] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 398.353477][ T8412] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 398.370704][ T8412] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 398.378817][ T8412] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 398.875743][T13054] syz.2.2437[13054] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.876556][T13054] syz.2.2437[13054] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.823674][ T1069] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 400.351141][T13077] syz.2.2446[13077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.351694][T13077] syz.2.2446[13077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.533503][ T5776] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 400.553437][ T5776] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 400.561604][ T5776] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 400.569856][ T5776] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 400.579173][ T5776] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 400.587221][ T5776] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 400.760557][T13078] chnl_net:caif_netlink_parms(): no params data found [ 400.831331][T13078] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.838603][T13078] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.845979][T13078] bridge_slave_0: entered allmulticast mode [ 400.852966][T13078] bridge_slave_0: entered promiscuous mode [ 400.862185][T13078] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.869806][T13078] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.877407][T13078] bridge_slave_1: entered allmulticast mode [ 400.884383][T13078] bridge_slave_1: entered promiscuous mode [ 400.917072][T13078] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 400.929474][T13078] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 400.969187][T13078] team0: Port device team_slave_0 added [ 400.978415][T13078] team0: Port device team_slave_1 added [ 401.008078][T13078] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 401.015446][T13078] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 401.042237][T13078] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 401.055583][T13078] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 401.062699][T13078] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 401.092312][T13078] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 401.176155][ T1069] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 401.334757][T13078] hsr_slave_0: entered promiscuous mode [ 401.353786][T13078] hsr_slave_1: entered promiscuous mode [ 401.369395][T13078] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 401.385325][T13078] Cannot create hsr debugfs directory [ 401.427752][ T1069] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 401.539774][ T1069] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 401.602306][ T5776] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 401.612440][ T5776] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 401.621111][ T5776] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 401.630403][ T5776] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 401.650347][ T5776] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 401.663608][ T5776] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 402.465844][T13097] chnl_net:caif_netlink_parms(): no params data found [ 402.665401][ T5786] Bluetooth: hci2: command tx timeout [ 402.704320][T13097] bridge0: port 1(bridge_slave_0) entered blocking state [ 402.724515][T13097] bridge0: port 1(bridge_slave_0) entered disabled state [ 402.758709][T13097] bridge_slave_0: entered allmulticast mode [ 402.783598][T13097] bridge_slave_0: entered promiscuous mode [ 402.851077][T13097] bridge0: port 2(bridge_slave_1) entered blocking state [ 402.864496][T13097] bridge0: port 2(bridge_slave_1) entered disabled state [ 402.882898][T13097] bridge_slave_1: entered allmulticast mode [ 402.891286][T13097] bridge_slave_1: entered promiscuous mode [ 403.069023][T13097] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 403.142760][T13097] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 403.294092][T13137] syz.2.2457[13137] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 403.299712][T13137] syz.2.2457[13137] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 403.331733][T13097] team0: Port device team_slave_0 added [ 403.396989][T13078] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 403.421389][T13097] team0: Port device team_slave_1 added [ 403.451104][T13078] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 403.477093][T13078] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 403.531055][T13078] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 403.569664][ T1069] hsr_slave_0: left promiscuous mode [ 403.584092][ T1069] hsr_slave_1: left promiscuous mode [ 403.590837][ T1069] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 403.599930][ T1069] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 403.608709][ T1069] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 403.616507][ T1069] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 403.624332][ T1069] bridge_slave_1: left allmulticast mode [ 403.631283][ T1069] bridge_slave_1: left promiscuous mode [ 403.637172][ T1069] bridge0: port 2(bridge_slave_1) entered disabled state [ 403.646929][T13149] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2461'. [ 403.647762][ T1069] bridge_slave_0: left allmulticast mode [ 403.661733][ T1069] bridge_slave_0: left promiscuous mode [ 403.668583][ T1069] bridge0: port 1(bridge_slave_0) entered disabled state [ 403.698230][ T1069] veth1_macvtap: left promiscuous mode [ 403.703771][ T1069] veth0_macvtap: left promiscuous mode [ 403.710149][ T1069] veth1_vlan: left promiscuous mode [ 403.714207][ T5786] Bluetooth: hci3: command tx timeout [ 403.715565][ T1069] veth0_vlan: left promiscuous mode [ 404.249925][ T1069] team0 (unregistering): Port device team_slave_1 removed [ 404.292484][ T1069] team0 (unregistering): Port device team_slave_0 removed [ 404.335400][ T1069] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 404.382612][ T1069] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 404.750132][ T5786] Bluetooth: hci2: command tx timeout [ 404.790075][ T1069] bond0 (unregistering): Released all slaves [ 404.881664][T13097] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 404.888917][T13097] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 404.916016][T13097] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 404.942025][T13149] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2461'. [ 404.970310][T13097] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 404.978215][T13097] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 405.035904][T13097] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 405.223583][T13164] netlink: 60 bytes leftover after parsing attributes in process `syz.2.2464'. [ 405.253254][T13097] hsr_slave_0: entered promiscuous mode [ 405.264278][T13097] hsr_slave_1: entered promiscuous mode [ 405.283321][T13097] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 405.291392][T13097] Cannot create hsr debugfs directory [ 405.336494][T13164] netlink: 60 bytes leftover after parsing attributes in process `syz.2.2464'. [ 405.365565][T13162] netlink: 60 bytes leftover after parsing attributes in process `syz.2.2464'. [ 405.418399][T13166] netlink: 60 bytes leftover after parsing attributes in process `syz.2.2464'. [ 405.745007][T13097] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 405.785244][ T5786] Bluetooth: hci3: command tx timeout [ 405.799556][T13078] 8021q: adding VLAN 0 to HW filter on device bond0 [ 405.841411][T13097] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 405.878958][T13078] 8021q: adding VLAN 0 to HW filter on device team0 [ 405.895114][ T8412] bridge0: port 1(bridge_slave_0) entered blocking state [ 405.902335][ T8412] bridge0: port 1(bridge_slave_0) entered forwarding state [ 405.935418][T13097] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 405.966553][ T8412] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.973717][ T8412] bridge0: port 2(bridge_slave_1) entered forwarding state [ 406.012354][T13097] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 406.391879][T13097] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 406.403200][T13097] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 406.432661][T13097] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 406.445942][T13097] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 406.557362][T13196] syz.2.2468[13196] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 406.557930][T13196] syz.2.2468[13196] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 406.581451][T13078] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 406.802897][T13078] veth0_vlan: entered promiscuous mode [ 406.825381][ T5786] Bluetooth: hci2: command tx timeout [ 406.900755][T13078] veth1_vlan: entered promiscuous mode [ 407.023958][T13097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 407.044208][T13207] FAULT_INJECTION: forcing a failure. [ 407.044208][T13207] name failslab, interval 1, probability 0, space 0, times 0 [ 407.058223][T13207] CPU: 0 PID: 13207 Comm: syz.2.2472 Not tainted 6.6.94-syzkaller #0 [ 407.066354][T13207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 407.076445][T13207] Call Trace: [ 407.077389][T13078] veth0_macvtap: entered promiscuous mode [ 407.079737][T13207] [ 407.079749][T13207] dump_stack_lvl+0x16c/0x230 [ 407.079789][T13207] ? show_regs_print_info+0x20/0x20 [ 407.092006][T13078] veth1_macvtap: entered promiscuous mode [ 407.093133][T13207] ? load_image+0x3b0/0x3b0 [ 407.093170][T13207] ? __might_sleep+0xe0/0xe0 [ 407.113274][T13207] ? __lock_acquire+0x7c80/0x7c80 [ 407.117288][T13078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 407.118334][T13207] should_fail_ex+0x39d/0x4d0 [ 407.130781][T13078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 407.133457][T13207] should_failslab+0x9/0x20 [ 407.133483][T13207] slab_pre_alloc_hook+0x59/0x310 [ 407.146675][T13078] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 407.147953][T13207] ? sk_prot_alloc+0xe7/0x210 [ 407.147992][T13207] ? sk_prot_alloc+0xe7/0x210 [ 407.169689][T13207] __kmem_cache_alloc_node+0x53/0x260 [ 407.175095][T13207] ? sk_prot_alloc+0xe7/0x210 [ 407.179798][T13207] __kmalloc+0xa4/0x240 [ 407.183995][T13207] sk_prot_alloc+0xe7/0x210 [ 407.188515][T13207] ? sk_alloc+0x24/0x360 [ 407.192772][T13207] sk_alloc+0x3a/0x360 [ 407.196860][T13207] pfkey_create+0xdc/0x570 [ 407.201286][T13207] __sock_create+0x4a6/0x940 [ 407.205894][T13207] __sys_socket+0xd7/0x1a0 [ 407.210320][T13207] __x64_sys_socket+0x7a/0x90 [ 407.215015][T13207] do_syscall_64+0x55/0xb0 [ 407.219463][T13207] ? clear_bhb_loop+0x40/0x90 [ 407.224140][T13207] ? clear_bhb_loop+0x40/0x90 [ 407.228827][T13207] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 407.234750][T13207] RIP: 0033:0x7f8a7b58e929 [ 407.239185][T13207] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 407.258800][T13207] RSP: 002b:00007f8a7c393038 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 407.267222][T13207] RAX: ffffffffffffffda RBX: 00007f8a7b7b5fa0 RCX: 00007f8a7b58e929 [ 407.275199][T13207] RDX: 0000000000000002 RSI: 0000000000000003 RDI: 000000000000000f [ 407.283177][T13207] RBP: 00007f8a7c393090 R08: 0000000000000000 R09: 0000000000000000 [ 407.291153][T13207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 407.299128][T13207] R13: 0000000000000001 R14: 00007f8a7b7b5fa0 R15: 00007ffc77050298 [ 407.307229][T13207] [ 407.362633][T13078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 407.374857][T13078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 407.393189][T13078] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 407.426609][T13097] 8021q: adding VLAN 0 to HW filter on device team0 [ 407.478143][ T1069] hsr_slave_0: left promiscuous mode [ 407.488564][ T1069] hsr_slave_1: left promiscuous mode [ 407.495009][ T1069] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 407.504988][ T1069] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 407.513456][ T1069] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 407.521118][ T1069] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 407.529370][ T1069] bridge_slave_1: left allmulticast mode [ 407.535217][ T1069] bridge_slave_1: left promiscuous mode [ 407.541049][ T1069] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.551204][ T1069] bridge_slave_0: left allmulticast mode [ 407.558349][ T1069] bridge_slave_0: left promiscuous mode [ 407.564146][ T1069] bridge0: port 1(bridge_slave_0) entered disabled state [ 407.602697][ T1069] veth1_macvtap: left promiscuous mode [ 407.609217][ T1069] veth0_macvtap: left promiscuous mode [ 407.618320][ T1069] veth1_vlan: left promiscuous mode [ 407.623870][ T1069] veth0_vlan: left promiscuous mode [ 407.869015][ T5786] Bluetooth: hci3: command tx timeout [ 408.172500][ T1069] team0 (unregistering): Port device team_slave_1 removed [ 408.220212][ T1069] team0 (unregistering): Port device team_slave_0 removed [ 408.260682][ T1069] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 408.302751][ T1069] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 408.709639][ T1069] bond0 (unregistering): Released all slaves [ 408.787275][ T1082] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.794507][ T1082] bridge0: port 1(bridge_slave_0) entered forwarding state [ 408.837176][ T1082] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.844344][ T1082] bridge0: port 2(bridge_slave_1) entered forwarding state [ 408.863162][T13078] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 408.874152][T13078] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 408.886192][T13078] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 408.894951][T13078] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 408.905319][ T5786] Bluetooth: hci2: command tx timeout [ 409.150382][ T12] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 409.180001][ T12] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 409.224910][ T48] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 409.235296][ T48] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 409.509091][T13097] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 409.564535][T13097] veth0_vlan: entered promiscuous mode [ 409.579943][T13097] veth1_vlan: entered promiscuous mode [ 409.613564][T13097] veth0_macvtap: entered promiscuous mode [ 409.624286][T13097] veth1_macvtap: entered promiscuous mode [ 409.647898][T13097] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 409.658916][T13097] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 409.670730][T13097] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 409.686257][T13097] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 409.698767][T13097] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 409.710785][T13097] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 409.724320][T13097] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 409.734603][T13097] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 409.743401][T13097] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 409.753459][T13097] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 409.837027][ T8412] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 409.856832][ T8412] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 409.909358][ T1069] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 409.929105][ T1069] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 409.945390][ T5786] Bluetooth: hci3: command tx timeout [ 409.988846][T13229] syz.2.2477[13229] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.989367][T13229] syz.2.2477[13229] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.466669][T13243] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2482'. [ 410.489316][T13243] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2482'. [ 410.502416][T13240] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2482'. [ 410.518354][T13243] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2482'. [ 411.052276][ T1082] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 411.469551][ T1082] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 411.577112][ T1082] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 411.690411][ T1082] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 411.864219][T13257] syz.0.2487[13257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 411.864717][T13257] syz.0.2487[13257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.289284][ T5776] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 412.311164][ T5776] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 412.320786][ T5776] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 412.330240][ T5776] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 412.339737][ T5776] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 412.347582][ T5776] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 412.829667][T13267] chnl_net:caif_netlink_parms(): no params data found [ 413.179410][ T5776] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 413.189109][ T5776] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 413.197784][ T5776] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 413.206502][ T5776] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 413.215380][ T5776] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 413.222983][ T5776] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 413.830535][T13309] FAULT_INJECTION: forcing a failure. [ 413.830535][T13309] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 413.844211][T13309] CPU: 1 PID: 13309 Comm: syz.0.2492 Not tainted 6.6.94-syzkaller #0 [ 413.852506][T13309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 413.862608][T13309] Call Trace: [ 413.865925][T13309] [ 413.868894][T13309] dump_stack_lvl+0x16c/0x230 [ 413.873640][T13309] ? show_regs_print_info+0x20/0x20 [ 413.878898][T13309] ? load_image+0x3b0/0x3b0 [ 413.883456][T13309] ? __lock_acquire+0x7c80/0x7c80 [ 413.888527][T13309] ? snprintf+0xdb/0x120 [ 413.892848][T13309] should_fail_ex+0x39d/0x4d0 [ 413.897584][T13309] _copy_to_user+0x2f/0xa0 [ 413.902050][T13309] simple_read_from_buffer+0xe7/0x150 [ 413.907561][T13309] proc_fail_nth_read+0x1e3/0x250 [ 413.912659][T13309] ? proc_fault_inject_write+0x340/0x340 [ 413.918349][T13309] ? fsnotify_perm+0x271/0x5e0 [ 413.923179][T13309] ? proc_fault_inject_write+0x340/0x340 [ 413.928836][T13309] vfs_read+0x27e/0x920 [ 413.933026][T13309] ? kernel_read+0x1e0/0x1e0 [ 413.937645][T13309] ? __fget_files+0x28/0x4d0 [ 413.942259][T13309] ? __fget_files+0x44a/0x4d0 [ 413.946971][T13309] ? __fdget_pos+0x2a3/0x330 [ 413.951582][T13309] ? ksys_read+0x75/0x250 [ 413.955940][T13309] ksys_read+0x147/0x250 [ 413.960208][T13309] ? vfs_write+0x940/0x940 [ 413.964836][T13309] ? lockdep_hardirqs_on+0x98/0x150 [ 413.970087][T13309] do_syscall_64+0x55/0xb0 [ 413.974547][T13309] ? clear_bhb_loop+0x40/0x90 [ 413.979263][T13309] ? clear_bhb_loop+0x40/0x90 [ 413.983954][T13309] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 413.989868][T13309] RIP: 0033:0x7f6fdd78d33c [ 413.994308][T13309] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 414.013938][T13309] RSP: 002b:00007f6fde611030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 414.022370][T13309] RAX: ffffffffffffffda RBX: 00007f6fdd9b5fa0 RCX: 00007f6fdd78d33c [ 414.030389][T13309] RDX: 000000000000000f RSI: 00007f6fde6110a0 RDI: 0000000000000004 [ 414.038379][T13309] RBP: 00007f6fde611090 R08: 0000000000000000 R09: 0000000000000000 [ 414.046377][T13309] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 414.054362][T13309] R13: 0000000000000000 R14: 00007f6fdd9b5fa0 R15: 00007ffdf06a3ad8 [ 414.062366][T13309] [ 414.095619][T13267] bridge0: port 1(bridge_slave_0) entered blocking state [ 414.102934][T13267] bridge0: port 1(bridge_slave_0) entered disabled state [ 414.112967][T13267] bridge_slave_0: entered allmulticast mode [ 414.122217][T13267] bridge_slave_0: entered promiscuous mode [ 414.159233][T13267] bridge0: port 2(bridge_slave_1) entered blocking state [ 414.166894][T13267] bridge0: port 2(bridge_slave_1) entered disabled state [ 414.174093][T13267] bridge_slave_1: entered allmulticast mode [ 414.181796][T13267] bridge_slave_1: entered promiscuous mode [ 414.363463][ T1082] hsr_slave_0: left promiscuous mode [ 414.378089][ T1082] hsr_slave_1: left promiscuous mode [ 414.400080][ T1082] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 414.418867][ T1082] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 414.429780][ T5786] Bluetooth: hci2: command tx timeout [ 414.450051][ T1082] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 414.469437][ T1082] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 414.484400][ T1082] bridge_slave_1: left allmulticast mode [ 414.499020][ T1082] bridge_slave_1: left promiscuous mode [ 414.504946][ T1082] bridge0: port 2(bridge_slave_1) entered disabled state [ 414.528521][ T1082] bridge_slave_0: left allmulticast mode [ 414.545174][ T1082] bridge_slave_0: left promiscuous mode [ 414.551113][ T1082] bridge0: port 1(bridge_slave_0) entered disabled state [ 414.594105][ T1082] veth1_macvtap: left promiscuous mode [ 414.605294][ T1082] veth0_macvtap: left promiscuous mode [ 414.614427][ T1082] veth1_vlan: left promiscuous mode [ 414.624851][ T1082] veth0_vlan: left promiscuous mode [ 415.308815][ T5786] Bluetooth: hci3: command tx timeout [ 415.330189][ T1082] team0 (unregistering): Port device team_slave_1 removed [ 415.372622][ T1082] team0 (unregistering): Port device team_slave_0 removed [ 415.416043][ T1082] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 415.459669][ T1082] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 415.862676][ T1082] bond0 (unregistering): Released all slaves [ 415.983235][T13267] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 416.000750][T13267] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 416.160820][T13341] syz.2.2498[13341] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 416.161369][T13341] syz.2.2498[13341] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 416.161653][T13267] team0: Port device team_slave_0 added [ 416.223678][T13267] team0: Port device team_slave_1 added [ 416.378047][T13267] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 416.391325][T13267] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 416.445147][T13267] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 416.503244][T13267] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 416.510903][ T5786] Bluetooth: hci2: command tx timeout [ 416.533054][T13267] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 416.559496][T13267] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 416.830209][T13267] hsr_slave_0: entered promiscuous mode [ 416.852610][T13267] hsr_slave_1: entered promiscuous mode [ 416.860632][T13267] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 416.868605][T13267] Cannot create hsr debugfs directory [ 416.988352][T13369] FAULT_INJECTION: forcing a failure. [ 416.988352][T13369] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 417.030477][T13369] CPU: 0 PID: 13369 Comm: syz.2.2505 Not tainted 6.6.94-syzkaller #0 [ 417.032669][T13292] chnl_net:caif_netlink_parms(): no params data found [ 417.038592][T13369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 417.038635][T13369] Call Trace: [ 417.038643][T13369] [ 417.038652][T13369] dump_stack_lvl+0x16c/0x230 [ 417.038692][T13369] ? show_regs_print_info+0x20/0x20 [ 417.038722][T13369] ? load_image+0x3b0/0x3b0 [ 417.038750][T13369] ? __might_fault+0xaa/0x120 [ 417.038776][T13369] ? __lock_acquire+0x7c80/0x7c80 [ 417.038806][T13369] should_fail_ex+0x39d/0x4d0 [ 417.038853][T13369] _copy_from_user+0x2f/0xe0 [ 417.038883][T13369] strndup_user+0xb7/0x150 [ 417.038915][T13369] perf_uprobe_init+0x61/0x190 [ 417.038944][T13369] perf_uprobe_event_init+0x10b/0x190 [ 417.038970][T13369] perf_try_init_event+0x12b/0x3c0 [ 417.038996][T13369] perf_event_alloc+0xfa4/0x21b0 [ 417.039023][T13369] ? perf_event_alloc+0xc06/0x21b0 [ 417.039066][T13369] __se_sys_perf_event_open+0x5ed/0x1c20 [ 417.131322][T13369] ? mutex_unlock+0x10/0x10 [ 417.135887][T13369] ? __x64_sys_perf_event_open+0xc0/0xc0 [ 417.141587][T13369] ? lock_chain_count+0x20/0x20 [ 417.146482][T13369] ? lockdep_hardirqs_on+0x98/0x150 [ 417.151724][T13369] ? __x64_sys_perf_event_open+0x20/0xc0 [ 417.157426][T13369] do_syscall_64+0x55/0xb0 [ 417.161907][T13369] ? clear_bhb_loop+0x40/0x90 [ 417.166624][T13369] ? clear_bhb_loop+0x40/0x90 [ 417.171335][T13369] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 417.177271][T13369] RIP: 0033:0x7f8a7b58e929 [ 417.181720][T13369] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 417.201368][T13369] RSP: 002b:00007f8a7c393038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 417.209835][T13369] RAX: ffffffffffffffda RBX: 00007f8a7b7b5fa0 RCX: 00007f8a7b58e929 [ 417.217865][T13369] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000000 [ 417.225886][T13369] RBP: 00007f8a7c393090 R08: 000000000000000d R09: 0000000000000000 [ 417.233894][T13369] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 417.241938][T13369] R13: 0000000000000000 R14: 00007f8a7b7b5fa0 R15: 00007ffc77050298 [ 417.249983][T13369] [ 417.385449][ T5786] Bluetooth: hci3: command tx timeout [ 417.441690][ T1082] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 417.565843][ T1082] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 417.603751][T13292] bridge0: port 1(bridge_slave_0) entered blocking state [ 417.617197][T13292] bridge0: port 1(bridge_slave_0) entered disabled state [ 417.624659][T13292] bridge_slave_0: entered allmulticast mode [ 417.637968][T13292] bridge_slave_0: entered promiscuous mode [ 417.649826][T13292] bridge0: port 2(bridge_slave_1) entered blocking state [ 417.658691][T13292] bridge0: port 2(bridge_slave_1) entered disabled state [ 417.666467][T13292] bridge_slave_1: entered allmulticast mode [ 417.674187][T13292] bridge_slave_1: entered promiscuous mode [ 417.732678][ T1082] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 417.881149][ T1082] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 417.910132][T13292] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 418.002406][T13391] syz.2.2508[13391] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.002496][T13292] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 418.004532][T13391] syz.2.2508[13391] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.098032][T13292] team0: Port device team_slave_0 added [ 418.301743][T13292] team0: Port device team_slave_1 added [ 418.383997][T13292] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 418.405775][T13292] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 418.432477][T13292] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 418.494963][T13292] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 418.515339][T13292] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 418.552226][T13292] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 418.587556][ T5786] Bluetooth: hci2: command tx timeout [ 418.725006][T13292] hsr_slave_0: entered promiscuous mode [ 418.739288][T13292] hsr_slave_1: entered promiscuous mode [ 418.750753][T13292] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 418.758778][T13292] Cannot create hsr debugfs directory [ 419.399783][T13427] syz.0.2518[13427] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.400596][T13427] syz.0.2518[13427] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.475173][T13267] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 419.475290][ T5786] Bluetooth: hci3: command tx timeout [ 419.514355][T13267] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 419.578796][T13267] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 419.627593][T13267] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 420.402655][T13267] 8021q: adding VLAN 0 to HW filter on device bond0 [ 420.555305][T13460] netlink: 'syz.0.2524': attribute type 12 has an invalid length. [ 420.576315][T13460] netlink: 132 bytes leftover after parsing attributes in process `syz.0.2524'. [ 420.658688][ T1082] hsr_slave_0: left promiscuous mode [ 420.665285][ T5786] Bluetooth: hci2: command tx timeout [ 420.688984][ T1082] hsr_slave_1: left promiscuous mode [ 420.699321][ T1082] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 420.727730][ T1082] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 420.750385][ T1082] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 420.759284][ T1082] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 420.767380][ T1082] bridge_slave_1: left allmulticast mode [ 420.773094][ T1082] bridge_slave_1: left promiscuous mode [ 420.779109][ T1082] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.790046][ T1082] bridge_slave_0: left allmulticast mode [ 420.796233][ T1082] bridge_slave_0: left promiscuous mode [ 420.825416][ T1082] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.877823][T13468] syz.2.2527[13468] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.878788][T13468] syz.2.2527[13468] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.893392][ T1082] veth1_macvtap: left promiscuous mode [ 420.913169][ T1082] veth0_macvtap: left promiscuous mode [ 420.919411][ T1082] veth1_vlan: left promiscuous mode [ 420.924918][ T1082] veth0_vlan: left promiscuous mode [ 421.549570][ T5786] Bluetooth: hci3: command tx timeout [ 421.614485][ T1082] team0 (unregistering): Port device team_slave_1 removed [ 421.659180][ T1082] team0 (unregistering): Port device team_slave_0 removed [ 421.700318][ T1082] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 421.744099][ T1082] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 422.183497][ T1082] bond0 (unregistering): Released all slaves [ 422.292446][T13292] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 422.314844][T13292] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 422.379457][T13267] 8021q: adding VLAN 0 to HW filter on device team0 [ 422.413730][T13292] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 422.441236][T13292] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 422.474946][ T8412] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.482237][ T8412] bridge0: port 1(bridge_slave_0) entered forwarding state [ 422.538362][ T8412] bridge0: port 2(bridge_slave_1) entered blocking state [ 422.545653][ T8412] bridge0: port 2(bridge_slave_1) entered forwarding state [ 422.897985][T13292] 8021q: adding VLAN 0 to HW filter on device bond0 [ 422.949054][T13292] 8021q: adding VLAN 0 to HW filter on device team0 [ 422.976488][ T8406] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.983728][ T8406] bridge0: port 1(bridge_slave_0) entered forwarding state [ 423.023687][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 423.030966][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 423.314516][T13267] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 423.454022][T13267] veth0_vlan: entered promiscuous mode [ 423.494454][T13267] veth1_vlan: entered promiscuous mode [ 423.564431][T13525] syz.2.2536[13525] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 423.564949][T13525] syz.2.2536[13525] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 423.618152][T13267] veth0_macvtap: entered promiscuous mode [ 423.694630][T13267] veth1_macvtap: entered promiscuous mode [ 423.758244][T13267] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 423.770366][T13292] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 423.821810][T13267] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 423.873966][T13267] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 423.899359][T13267] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 423.921777][T13267] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 423.938095][T13267] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 424.204366][T13292] veth0_vlan: entered promiscuous mode [ 424.406176][T13292] veth1_vlan: entered promiscuous mode [ 424.455310][ T48] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 424.463200][ T48] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 424.578057][T13548] FAULT_INJECTION: forcing a failure. [ 424.578057][T13548] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 424.608655][ T48] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 424.620498][ T48] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 424.628573][T13548] CPU: 1 PID: 13548 Comm: syz.0.2541 Not tainted 6.6.94-syzkaller #0 [ 424.636691][T13548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 424.646783][T13548] Call Trace: [ 424.650099][T13548] [ 424.651323][T13292] veth0_macvtap: entered promiscuous mode [ 424.653042][T13548] dump_stack_lvl+0x16c/0x230 [ 424.663487][T13548] ? show_regs_print_info+0x20/0x20 [ 424.668740][T13548] ? load_image+0x3b0/0x3b0 [ 424.673297][T13548] ? __lock_acquire+0x7c80/0x7c80 [ 424.678369][T13548] ? snprintf+0xdb/0x120 [ 424.682660][T13548] should_fail_ex+0x39d/0x4d0 [ 424.687396][T13548] _copy_to_user+0x2f/0xa0 [ 424.691853][T13548] simple_read_from_buffer+0xe7/0x150 [ 424.697283][T13548] proc_fail_nth_read+0x1e3/0x250 [ 424.702334][T13548] ? proc_fault_inject_write+0x340/0x340 [ 424.707991][T13548] ? fsnotify_perm+0x271/0x5e0 [ 424.712771][T13548] ? proc_fault_inject_write+0x340/0x340 [ 424.718423][T13548] vfs_read+0x27e/0x920 [ 424.722610][T13548] ? kernel_read+0x1e0/0x1e0 [ 424.727221][T13548] ? __fget_files+0x28/0x4d0 [ 424.731835][T13548] ? __fget_files+0x44a/0x4d0 [ 424.736552][T13548] ? __fdget_pos+0x2a3/0x330 [ 424.741166][T13548] ? ksys_read+0x75/0x250 [ 424.745517][T13548] ksys_read+0x147/0x250 [ 424.749881][T13548] ? vfs_write+0x940/0x940 [ 424.754324][T13548] ? lockdep_hardirqs_on+0x98/0x150 [ 424.759542][T13548] do_syscall_64+0x55/0xb0 [ 424.763981][T13548] ? clear_bhb_loop+0x40/0x90 [ 424.768671][T13548] ? clear_bhb_loop+0x40/0x90 [ 424.773364][T13548] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 424.779283][T13548] RIP: 0033:0x7f6fdd78d33c [ 424.783817][T13548] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 424.803544][T13548] RSP: 002b:00007f6fde611030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 424.811986][T13548] RAX: ffffffffffffffda RBX: 00007f6fdd9b5fa0 RCX: 00007f6fdd78d33c [ 424.819972][T13548] RDX: 000000000000000f RSI: 00007f6fde6110a0 RDI: 0000000000000004 [ 424.827953][T13548] RBP: 00007f6fde611090 R08: 0000000000000000 R09: 0000000000000000 [ 424.835940][T13548] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 424.843928][T13548] R13: 0000000000000000 R14: 00007f6fdd9b5fa0 R15: 00007ffdf06a3ad8 [ 424.851936][T13548] [ 424.856575][T13292] veth1_macvtap: entered promiscuous mode [ 424.924665][T13292] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 424.955081][T13292] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 424.970128][T13292] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 425.023739][T13292] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 425.060848][T13292] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 425.087940][T13292] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 425.118798][T13292] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 425.145343][T13292] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 425.165708][T13292] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 425.174476][T13292] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 425.469428][T13568] syz.0.2546[13568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 425.470070][T13568] syz.0.2546[13568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 425.486926][ T12] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 425.529844][ T12] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 425.586642][ T48] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 425.601782][ T48] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 425.652169][T13574] FAULT_INJECTION: forcing a failure. [ 425.652169][T13574] name failslab, interval 1, probability 0, space 0, times 0 [ 425.667602][T13574] CPU: 0 PID: 13574 Comm: syz.0.2547 Not tainted 6.6.94-syzkaller #0 [ 425.675736][T13574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 425.685841][T13574] Call Trace: [ 425.689168][T13574] [ 425.692150][T13574] dump_stack_lvl+0x16c/0x230 [ 425.696889][T13574] ? show_regs_print_info+0x20/0x20 [ 425.702153][T13574] ? load_image+0x3b0/0x3b0 [ 425.706717][T13574] ? __might_sleep+0xe0/0xe0 [ 425.711370][T13574] ? __lock_acquire+0x7c80/0x7c80 [ 425.716533][T13574] should_fail_ex+0x39d/0x4d0 [ 425.721279][T13574] should_failslab+0x9/0x20 [ 425.725822][T13574] slab_pre_alloc_hook+0x59/0x310 [ 425.730896][T13574] ? tomoyo_encode+0x28b/0x540 [ 425.735706][T13574] ? tomoyo_encode+0x28b/0x540 [ 425.740521][T13574] __kmem_cache_alloc_node+0x53/0x260 [ 425.745945][T13574] ? tomoyo_encode+0x28b/0x540 [ 425.750753][T13574] __kmalloc+0xa4/0x240 [ 425.754962][T13574] tomoyo_encode+0x28b/0x540 [ 425.759609][T13574] tomoyo_realpath_from_path+0x592/0x5d0 [ 425.765312][T13574] tomoyo_path_number_perm+0x1ea/0x590 [ 425.770820][T13574] ? tomoyo_path_number_perm+0x1ba/0x590 [ 425.776502][T13574] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 425.782019][T13574] ? ksys_write+0x1c1/0x250 [ 425.786624][T13574] ? __fget_files+0x28/0x4d0 [ 425.791315][T13574] security_file_ioctl+0x70/0xa0 [ 425.796310][T13574] __se_sys_ioctl+0x48/0x170 [ 425.800965][T13574] do_syscall_64+0x55/0xb0 [ 425.805439][T13574] ? clear_bhb_loop+0x40/0x90 [ 425.810178][T13574] ? clear_bhb_loop+0x40/0x90 [ 425.814903][T13574] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 425.820855][T13574] RIP: 0033:0x7f6fdd78e929 [ 425.825321][T13574] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 425.844987][T13574] RSP: 002b:00007f6fde611038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 425.853474][T13574] RAX: ffffffffffffffda RBX: 00007f6fdd9b5fa0 RCX: 00007f6fdd78e929 [ 425.861504][T13574] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000007 [ 425.869525][T13574] RBP: 00007f6fde611090 R08: 0000000000000000 R09: 0000000000000000 [ 425.877547][T13574] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 425.885566][T13574] R13: 0000000000000000 R14: 00007f6fdd9b5fa0 R15: 00007ffdf06a3ad8 [ 425.893609][T13574] [ 425.911010][T13574] ERROR: Out of memory at tomoyo_realpath_from_path. [ 426.539301][T13596] syz.2.2555[13596] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 426.539897][T13596] syz.2.2555[13596] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 426.753290][T13604] netlink: 'syz.0.2558': attribute type 12 has an invalid length. [ 426.773282][T13604] netlink: 132 bytes leftover after parsing attributes in process `syz.0.2558'. [ 426.831646][T13607] FAULT_INJECTION: forcing a failure. [ 426.831646][T13607] name failslab, interval 1, probability 0, space 0, times 0 [ 426.844573][T13607] CPU: 0 PID: 13607 Comm: syz.0.2559 Not tainted 6.6.94-syzkaller #0 [ 426.852685][T13607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 426.862771][T13607] Call Trace: [ 426.866091][T13607] [ 426.869047][T13607] dump_stack_lvl+0x16c/0x230 [ 426.873752][T13607] ? show_regs_print_info+0x20/0x20 [ 426.879003][T13607] ? load_image+0x3b0/0x3b0 [ 426.883527][T13607] ? __might_sleep+0xe0/0xe0 [ 426.888140][T13607] ? __lock_acquire+0x7c80/0x7c80 [ 426.893187][T13607] should_fail_ex+0x39d/0x4d0 [ 426.897917][T13607] should_failslab+0x9/0x20 [ 426.902462][T13607] slab_pre_alloc_hook+0x59/0x310 [ 426.907524][T13607] kmem_cache_alloc_node+0x60/0x330 [ 426.912742][T13607] ? __alloc_skb+0x108/0x2c0 [ 426.917369][T13607] __alloc_skb+0x108/0x2c0 [ 426.921820][T13607] alloc_skb_with_frags+0xca/0x7c0 [ 426.926963][T13607] ? mark_lock+0x94/0x320 [ 426.931331][T13607] sock_alloc_send_pskb+0x857/0x990 [ 426.936577][T13607] ? sock_kzfree_s+0x50/0x50 [ 426.941210][T13607] tun_get_user+0x9dc/0x3bf0 [ 426.945844][T13607] ? trace_event_raw_event_lock+0x230/0x230 [ 426.951761][T13607] ? aa_file_perm+0x120/0xec0 [ 426.956479][T13607] ? aa_file_perm+0x3e8/0xec0 [ 426.961186][T13607] ? rcu_read_unlock+0xa0/0xa0 [ 426.966006][T13607] ? tun_get+0x1c/0x2e0 [ 426.970275][T13607] ? __lock_acquire+0x7c80/0x7c80 [ 426.975328][T13607] ? tun_get+0x1c/0x2e0 [ 426.979514][T13607] tun_chr_write_iter+0x119/0x200 [ 426.984564][T13607] vfs_write+0x43b/0x940 [ 426.988844][T13607] ? file_end_write+0x250/0x250 [ 426.993757][T13607] ? __fget_files+0x44a/0x4d0 [ 426.998486][T13607] ? __fdget_pos+0x1d8/0x330 [ 427.003109][T13607] ? ksys_write+0x75/0x250 [ 427.007547][T13607] ksys_write+0x147/0x250 [ 427.011901][T13607] ? __ia32_sys_read+0x90/0x90 [ 427.016731][T13607] ? lockdep_hardirqs_on+0x98/0x150 [ 427.021957][T13607] do_syscall_64+0x55/0xb0 [ 427.026401][T13607] ? clear_bhb_loop+0x40/0x90 [ 427.031093][T13607] ? clear_bhb_loop+0x40/0x90 [ 427.035793][T13607] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 427.041712][T13607] RIP: 0033:0x7f6fdd78e929 [ 427.046141][T13607] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 427.065769][T13607] RSP: 002b:00007f6fde611038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 427.074202][T13607] RAX: ffffffffffffffda RBX: 00007f6fdd9b5fa0 RCX: 00007f6fdd78e929 [ 427.082194][T13607] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 427.090267][T13607] RBP: 00007f6fde611090 R08: 0000000000000000 R09: 0000000000000000 [ 427.098256][T13607] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 427.106240][T13607] R13: 0000000000000000 R14: 00007f6fdd9b5fa0 R15: 00007ffdf06a3ad8 [ 427.114257][T13607] [ 427.202715][ T12] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 427.931092][ T12] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 427.993764][ T12] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 428.050958][ T12] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 429.143762][ T12] hsr_slave_0: left promiscuous mode [ 429.151154][ T12] hsr_slave_1: left promiscuous mode [ 429.168231][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 429.183932][ T12] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 429.206867][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 429.214357][ T12] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 429.239271][ T12] bridge_slave_1: left allmulticast mode [ 429.255143][ T12] bridge_slave_1: left promiscuous mode [ 429.260983][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.287718][ T12] bridge_slave_0: left allmulticast mode [ 429.293443][ T12] bridge_slave_0: left promiscuous mode [ 429.315428][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.368455][ T12] veth1_macvtap: left promiscuous mode [ 429.374077][ T12] veth0_macvtap: left promiscuous mode [ 429.387027][ T12] veth1_vlan: left promiscuous mode [ 429.392982][ T12] veth0_vlan: left promiscuous mode [ 429.449309][ T5776] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 429.459079][ T5776] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 429.468895][ T5776] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 429.478064][ T5776] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 429.490871][ T5776] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 429.498650][ T5776] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 429.963866][ T12] team0 (unregistering): Port device team_slave_1 removed [ 430.010788][ T12] team0 (unregistering): Port device team_slave_0 removed [ 430.049820][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 430.090489][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 430.295456][T13647] netlink: 14 bytes leftover after parsing attributes in process `syz.0.2563'. [ 430.318191][T13647] netlink: get zone limit has 4 unknown bytes [ 430.361071][T13649] syz.2.2564[13649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.361615][T13649] syz.2.2564[13649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.776571][ T5786] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 430.810308][ T5786] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 430.826441][ T5786] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 430.848779][ T5786] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 430.856819][ T5786] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 430.864300][ T5786] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 430.925484][ T12] bond0 (unregistering): Released all slaves [ 431.424668][T13670] FAULT_INJECTION: forcing a failure. [ 431.424668][T13670] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 431.474087][T13670] CPU: 0 PID: 13670 Comm: syz.0.2568 Not tainted 6.6.94-syzkaller #0 [ 431.482240][T13670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 431.492348][T13670] Call Trace: [ 431.495673][T13670] [ 431.498649][T13670] dump_stack_lvl+0x16c/0x230 [ 431.503399][T13670] ? show_regs_print_info+0x20/0x20 [ 431.508670][T13670] ? load_image+0x3b0/0x3b0 [ 431.513229][T13670] ? __might_fault+0xaa/0x120 [ 431.517962][T13670] ? __lock_acquire+0x7c80/0x7c80 [ 431.523054][T13670] should_fail_ex+0x39d/0x4d0 [ 431.527814][T13670] _copy_from_user+0x2f/0xe0 [ 431.532460][T13670] __sys_bpf+0x1e9/0x800 [ 431.536753][T13670] ? bpf_link_show_fdinfo+0x350/0x350 [ 431.542186][T13670] ? lock_chain_count+0x20/0x20 [ 431.547081][T13670] __x64_sys_bpf+0x7c/0x90 [ 431.551523][T13670] do_syscall_64+0x55/0xb0 [ 431.555965][T13670] ? clear_bhb_loop+0x40/0x90 [ 431.560658][T13670] ? clear_bhb_loop+0x40/0x90 [ 431.565358][T13670] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 431.571284][T13670] RIP: 0033:0x7f6fdd78e929 [ 431.575720][T13670] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 431.595432][T13670] RSP: 002b:00007f6fde611038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 431.603870][T13670] RAX: ffffffffffffffda RBX: 00007f6fdd9b5fa0 RCX: 00007f6fdd78e929 [ 431.611861][T13670] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 431.619856][T13670] RBP: 00007f6fde611090 R08: 0000000000000000 R09: 0000000000000000 [ 431.627856][T13670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 431.635848][T13670] R13: 0000000000000000 R14: 00007f6fdd9b5fa0 R15: 00007ffdf06a3ad8 [ 431.643869][T13670] [ 431.665191][ T5786] Bluetooth: hci2: command tx timeout [ 432.058971][T13641] chnl_net:caif_netlink_parms(): no params data found [ 432.301437][T13658] chnl_net:caif_netlink_parms(): no params data found [ 432.331784][T13641] bridge0: port 1(bridge_slave_0) entered blocking state [ 432.339313][T13641] bridge0: port 1(bridge_slave_0) entered disabled state [ 432.346915][T13641] bridge_slave_0: entered allmulticast mode [ 432.354101][T13641] bridge_slave_0: entered promiscuous mode [ 432.378970][T13697] delete_channel: no stack [ 432.400566][T13641] bridge0: port 2(bridge_slave_1) entered blocking state [ 432.408007][T13641] bridge0: port 2(bridge_slave_1) entered disabled state [ 432.416024][T13641] bridge_slave_1: entered allmulticast mode [ 432.423136][T13641] bridge_slave_1: entered promiscuous mode [ 432.499030][T13641] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 432.520743][T13641] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 432.586676][T13641] team0: Port device team_slave_0 added [ 432.599625][T13641] team0: Port device team_slave_1 added [ 432.609212][T13658] bridge0: port 1(bridge_slave_0) entered blocking state [ 432.616846][T13658] bridge0: port 1(bridge_slave_0) entered disabled state [ 432.624114][T13658] bridge_slave_0: entered allmulticast mode [ 432.632230][T13658] bridge_slave_0: entered promiscuous mode [ 432.693264][ T8406] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 432.712566][T13658] bridge0: port 2(bridge_slave_1) entered blocking state [ 432.720108][T13658] bridge0: port 2(bridge_slave_1) entered disabled state [ 432.728034][T13658] bridge_slave_1: entered allmulticast mode [ 432.736540][T13658] bridge_slave_1: entered promiscuous mode [ 432.755669][T13641] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 432.762681][T13641] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 432.789487][T13641] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 432.804147][T13641] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 432.811801][T13641] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 432.848197][T13641] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 432.885807][ T8406] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 432.905353][ T5776] Bluetooth: hci3: command tx timeout [ 432.953779][T13658] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 433.030417][ T8406] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 433.067972][T13658] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 433.079937][T13710] syz.0.2574[13710] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 433.080486][T13710] syz.0.2574[13710] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 433.170822][T13641] hsr_slave_0: entered promiscuous mode [ 433.210898][T13641] hsr_slave_1: entered promiscuous mode [ 433.235993][T13641] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 433.243626][T13641] Cannot create hsr debugfs directory [ 433.281402][ T8406] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 433.331017][T13658] team0: Port device team_slave_0 added [ 433.411997][T13723] delete_channel: no stack [ 433.450649][T13658] team0: Port device team_slave_1 added [ 433.638908][T13658] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 433.656070][T13658] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 433.705686][ T5776] Bluetooth: hci2: command tx timeout [ 433.747550][T13734] FAULT_INJECTION: forcing a failure. [ 433.747550][T13734] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 433.749253][T13658] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 433.762084][T13734] CPU: 0 PID: 13734 Comm: syz.2.2579 Not tainted 6.6.94-syzkaller #0 [ 433.779367][T13734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 433.789466][T13734] Call Trace: [ 433.792781][T13734] [ 433.795749][T13734] dump_stack_lvl+0x16c/0x230 [ 433.800488][T13734] ? show_regs_print_info+0x20/0x20 [ 433.805756][T13734] ? load_image+0x3b0/0x3b0 [ 433.810305][T13734] ? __might_fault+0xaa/0x120 [ 433.811564][T13658] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 433.815009][T13734] ? __lock_acquire+0x7c80/0x7c80 [ 433.815042][T13734] should_fail_ex+0x39d/0x4d0 [ 433.815083][T13734] _copy_from_user+0x2f/0xe0 [ 433.815113][T13734] ___sys_sendmsg+0x159/0x290 [ 433.815140][T13734] ? __sys_sendmsg+0x270/0x270 [ 433.815184][T13734] ? __lock_acquire+0x7c80/0x7c80 [ 433.815236][T13734] __se_sys_sendmsg+0x1a5/0x270 [ 433.815261][T13734] ? __x64_sys_sendmsg+0x80/0x80 [ 433.815301][T13734] ? lockdep_hardirqs_on+0x98/0x150 [ 433.815330][T13734] do_syscall_64+0x55/0xb0 [ 433.815359][T13734] ? clear_bhb_loop+0x40/0x90 [ 433.815379][T13734] ? clear_bhb_loop+0x40/0x90 [ 433.815402][T13734] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 433.815436][T13734] RIP: 0033:0x7f8a7b58e929 [ 433.815457][T13734] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 433.815476][T13734] RSP: 002b:00007f8a7c393038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 433.815500][T13734] RAX: ffffffffffffffda RBX: 00007f8a7b7b5fa0 RCX: 00007f8a7b58e929 [ 433.815516][T13734] RDX: 0000000004000005 RSI: 0000200000000c00 RDI: 0000000000000003 [ 433.815530][T13734] RBP: 00007f8a7c393090 R08: 0000000000000000 R09: 0000000000000000 [ 433.942213][T13734] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 433.950204][T13734] R13: 0000000000000000 R14: 00007f8a7b7b5fa0 R15: 00007ffc77050298 [ 433.958207][T13734] [ 433.972236][T13658] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 434.015510][T13732] delete_channel: no stack [ 434.035375][T13658] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 434.854840][T13658] hsr_slave_0: entered promiscuous mode [ 434.862313][T13658] hsr_slave_1: entered promiscuous mode [ 434.870060][T13658] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 434.878176][T13658] Cannot create hsr debugfs directory [ 434.987118][ T5776] Bluetooth: hci3: command tx timeout [ 435.100875][T13752] syz.2.2584[13752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 435.102572][T13752] syz.2.2584[13752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 435.741651][T13763] FAULT_INJECTION: forcing a failure. [ 435.741651][T13763] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 435.776094][T13763] CPU: 1 PID: 13763 Comm: syz.2.2589 Not tainted 6.6.94-syzkaller #0 [ 435.784249][T13763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 435.787198][ T5776] Bluetooth: hci2: command tx timeout [ 435.794355][T13763] Call Trace: [ 435.794368][T13763] [ 435.806014][T13763] dump_stack_lvl+0x16c/0x230 [ 435.810753][T13763] ? show_regs_print_info+0x20/0x20 [ 435.816008][T13763] ? load_image+0x3b0/0x3b0 [ 435.820576][T13763] ? __might_fault+0xaa/0x120 [ 435.825303][T13763] ? __lock_acquire+0x7c80/0x7c80 [ 435.830382][T13763] should_fail_ex+0x39d/0x4d0 [ 435.835125][T13763] _copy_from_user+0x2f/0xe0 [ 435.839763][T13763] __sys_bpf+0x1e9/0x800 [ 435.844054][T13763] ? bpf_link_show_fdinfo+0x350/0x350 [ 435.849492][T13763] ? lock_chain_count+0x20/0x20 [ 435.854394][T13763] __x64_sys_bpf+0x7c/0x90 [ 435.858851][T13763] do_syscall_64+0x55/0xb0 [ 435.863315][T13763] ? clear_bhb_loop+0x40/0x90 [ 435.868029][T13763] ? clear_bhb_loop+0x40/0x90 [ 435.872831][T13763] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 435.878757][T13763] RIP: 0033:0x7f8a7b58e929 [ 435.883187][T13763] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 435.902818][T13763] RSP: 002b:00007f8a7c393038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 435.911438][T13763] RAX: ffffffffffffffda RBX: 00007f8a7b7b5fa0 RCX: 00007f8a7b58e929 [ 435.919429][T13763] RDX: 0000000000000050 RSI: 0000200000000040 RDI: 000000000000000a [ 435.927417][T13763] RBP: 00007f8a7c393090 R08: 0000000000000000 R09: 0000000000000000 [ 435.935406][T13763] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 435.943485][T13763] R13: 0000000000000000 R14: 00007f8a7b7b5fa0 R15: 00007ffc77050298 [ 435.951497][T13763] [ 436.021486][T13641] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 436.083701][T13641] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 436.141497][T13641] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 436.151982][T13641] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 436.162552][T13770] netlink: 'syz.2.2591': attribute type 21 has an invalid length. [ 436.291607][T13778] syz.2.2593[13778] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 436.292109][T13778] syz.2.2593[13778] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 436.500401][ T8406] hsr_slave_0: left promiscuous mode [ 436.526980][ T8406] hsr_slave_1: left promiscuous mode [ 436.538429][ T8406] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 436.555316][ T8406] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 436.564592][ T8406] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 436.572679][ T8406] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 436.584502][ T8406] bridge_slave_1: left allmulticast mode [ 436.591726][ T8406] bridge_slave_1: left promiscuous mode [ 436.599326][ T8406] bridge0: port 2(bridge_slave_1) entered disabled state [ 436.609653][ T8406] bridge_slave_0: left allmulticast mode [ 436.615845][ T8406] bridge_slave_0: left promiscuous mode [ 436.621657][ T8406] bridge0: port 1(bridge_slave_0) entered disabled state [ 436.664170][ T8406] veth1_macvtap: left promiscuous mode [ 436.673353][ T8406] veth0_macvtap: left promiscuous mode [ 436.679647][ T8406] veth1_vlan: left promiscuous mode [ 436.685303][ T8406] veth0_vlan: left promiscuous mode [ 437.075641][ T5776] Bluetooth: hci3: command tx timeout [ 437.254459][ T8406] team0 (unregistering): Port device team_slave_1 removed [ 437.303545][ T8406] team0 (unregistering): Port device team_slave_0 removed [ 437.344814][ T8406] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 437.390258][ T8406] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 437.806940][ T8406] bond0 (unregistering): Released all slaves [ 437.865337][ T5776] Bluetooth: hci2: command tx timeout [ 438.049557][T13658] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 438.066029][T13796] FAULT_INJECTION: forcing a failure. [ 438.066029][T13796] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 438.081554][T13658] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 438.108096][T13641] 8021q: adding VLAN 0 to HW filter on device bond0 [ 438.123070][T13796] CPU: 0 PID: 13796 Comm: syz.0.2600 Not tainted 6.6.94-syzkaller #0 [ 438.131218][T13796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 438.141395][T13796] Call Trace: [ 438.144694][T13796] [ 438.147638][T13796] dump_stack_lvl+0x16c/0x230 [ 438.152346][T13796] ? show_regs_print_info+0x20/0x20 [ 438.157583][T13796] ? load_image+0x3b0/0x3b0 [ 438.162122][T13796] ? __might_fault+0xaa/0x120 [ 438.166831][T13796] ? __lock_acquire+0x7c80/0x7c80 [ 438.171892][T13796] should_fail_ex+0x39d/0x4d0 [ 438.176605][T13796] _copy_from_user+0x2f/0xe0 [ 438.181260][T13796] __sys_bpf+0x1e9/0x800 [ 438.185548][T13796] ? bpf_link_show_fdinfo+0x350/0x350 [ 438.191049][T13796] ? lock_chain_count+0x20/0x20 [ 438.195934][T13796] __x64_sys_bpf+0x7c/0x90 [ 438.200411][T13796] do_syscall_64+0x55/0xb0 [ 438.204866][T13796] ? clear_bhb_loop+0x40/0x90 [ 438.209564][T13796] ? clear_bhb_loop+0x40/0x90 [ 438.214259][T13796] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 438.220218][T13796] RIP: 0033:0x7f6fdd78e929 [ 438.224667][T13796] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 438.244310][T13796] RSP: 002b:00007f6fde611038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 438.252767][T13796] RAX: ffffffffffffffda RBX: 00007f6fdd9b5fa0 RCX: 00007f6fdd78e929 [ 438.260755][T13796] RDX: 0000000000000028 RSI: 0000200000000380 RDI: 0000000000000012 [ 438.268742][T13796] RBP: 00007f6fde611090 R08: 0000000000000000 R09: 0000000000000000 [ 438.276731][T13796] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 438.284899][T13796] R13: 0000000000000001 R14: 00007f6fdd9b5fa0 R15: 00007ffdf06a3ad8 [ 438.292903][T13796] [ 438.371557][T13658] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 438.401359][T13658] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 438.460038][T13641] 8021q: adding VLAN 0 to HW filter on device team0 [ 438.514662][ T1082] bridge0: port 1(bridge_slave_0) entered blocking state [ 438.521907][ T1082] bridge0: port 1(bridge_slave_0) entered forwarding state [ 438.568084][ T1082] bridge0: port 2(bridge_slave_1) entered blocking state [ 438.575332][ T1082] bridge0: port 2(bridge_slave_1) entered forwarding state [ 438.822190][T13815] syz.0.2603[13815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 438.822764][T13815] syz.0.2603[13815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 438.952273][T13658] 8021q: adding VLAN 0 to HW filter on device bond0 [ 439.051745][T13658] 8021q: adding VLAN 0 to HW filter on device team0 [ 439.072307][ T1082] bridge0: port 1(bridge_slave_0) entered blocking state [ 439.079573][ T1082] bridge0: port 1(bridge_slave_0) entered forwarding state [ 439.126353][ T8412] bridge0: port 2(bridge_slave_1) entered blocking state [ 439.133654][ T8412] bridge0: port 2(bridge_slave_1) entered forwarding state [ 439.149953][ T5776] Bluetooth: hci3: command tx timeout [ 439.433108][T13641] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 439.562395][T13840] FAULT_INJECTION: forcing a failure. [ 439.562395][T13840] name failslab, interval 1, probability 0, space 0, times 0 [ 439.600077][T13641] veth0_vlan: entered promiscuous mode [ 439.604657][T13840] CPU: 1 PID: 13840 Comm: syz.0.2608 Not tainted 6.6.94-syzkaller #0 [ 439.613712][T13840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 439.623832][T13840] Call Trace: [ 439.627165][T13840] [ 439.630156][T13840] dump_stack_lvl+0x16c/0x230 [ 439.632069][T13641] veth1_vlan: entered promiscuous mode [ 439.634988][T13840] ? show_regs_print_info+0x20/0x20 [ 439.645711][T13840] ? load_image+0x3b0/0x3b0 [ 439.650296][T13840] ? __lock_acquire+0x7c80/0x7c80 [ 439.655385][T13840] ? trace_event_raw_event_lock+0x230/0x230 [ 439.661356][T13840] should_fail_ex+0x39d/0x4d0 [ 439.666155][T13840] should_failslab+0x9/0x20 [ 439.670739][T13840] slab_pre_alloc_hook+0x59/0x310 [ 439.675825][T13840] ? ip_options_get+0x52/0x4a0 [ 439.680642][T13840] ? ip_options_get+0x52/0x4a0 [ 439.685466][T13840] __kmem_cache_alloc_node+0x53/0x260 [ 439.690911][T13840] ? ip_options_get+0x52/0x4a0 [ 439.695737][T13840] __kmalloc+0xa4/0x240 [ 439.699949][T13840] ? __local_bh_enable_ip+0x12e/0x1c0 [ 439.702227][T13641] veth0_macvtap: entered promiscuous mode [ 439.705360][T13840] ip_options_get+0x52/0x4a0 [ 439.705407][T13840] do_ip_setsockopt+0x1c3f/0x2cf0 [ 439.705449][T13840] ? ip_sock_set_pktinfo+0x30/0x30 [ 439.726105][T13840] ? aa_sk_perm+0x7fc/0x930 [ 439.730691][T13840] ? aa_af_perm+0x2b0/0x2b0 [ 439.735357][T13840] ? aa_sock_opt_perm+0x74/0x100 [ 439.740375][T13840] ip_setsockopt+0x61/0x110 [ 439.744943][T13840] ? sock_common_recvmsg+0x1b0/0x1b0 [ 439.747035][T13641] veth1_macvtap: entered promiscuous mode [ 439.750276][T13840] do_sock_setsockopt+0x254/0x3e0 [ 439.761116][T13840] ? __ia32_sys_recv+0xb0/0xb0 [ 439.765973][T13840] ? __fdget+0x180/0x210 [ 439.770295][T13840] __x64_sys_setsockopt+0x1be/0x250 [ 439.775572][T13840] do_syscall_64+0x55/0xb0 [ 439.780141][T13840] ? clear_bhb_loop+0x40/0x90 [ 439.784878][T13840] ? clear_bhb_loop+0x40/0x90 [ 439.789618][T13840] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 439.795576][T13840] RIP: 0033:0x7f6fdd78e929 [ 439.800053][T13840] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 439.810459][T13641] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 439.819688][T13840] RSP: 002b:00007f6fde611038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 439.819719][T13840] RAX: ffffffffffffffda RBX: 00007f6fdd9b5fa0 RCX: 00007f6fdd78e929 [ 439.819738][T13840] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000004 [ 439.819752][T13840] RBP: 00007f6fde611090 R08: 0000000000000000 R09: 0000000000000000 [ 439.819768][T13840] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 439.819783][T13840] R13: 0000000000000000 R14: 00007f6fdd9b5fa0 R15: 00007ffdf06a3ad8 [ 439.869919][T13641] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 439.875443][T13840] [ 439.940067][T13641] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 439.980267][T13641] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 440.004889][T13641] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 440.024320][T13641] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 440.152363][T13855] netlink: 10 bytes leftover after parsing attributes in process `syz.0.2610'. [ 440.161122][T13658] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 440.287364][ T1288] ieee802154 phy0 wpan0: encryption failed: -22 [ 440.289424][ T12] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 440.293889][ T1288] ieee802154 phy1 wpan1: encryption failed: -22 [ 440.332388][ T12] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 440.399895][T13658] veth0_vlan: entered promiscuous mode [ 440.409049][ T8406] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 440.419475][ T8406] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 440.499140][T13658] veth1_vlan: entered promiscuous mode [ 440.708394][T13658] veth0_macvtap: entered promiscuous mode [ 440.720462][T13658] veth1_macvtap: entered promiscuous mode [ 440.781396][T13658] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 440.816351][T13658] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 440.838897][T13658] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 440.890370][T13658] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 440.904946][T13658] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 440.925581][T13658] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 440.960190][T13658] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 440.978017][T13658] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 441.009023][T13658] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 441.018144][T13658] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 441.140749][T13878] syz.0.2614[13878] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 441.141436][T13878] syz.0.2614[13878] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 441.270606][ T48] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 441.279775][ T48] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 441.293099][T13885] FAULT_INJECTION: forcing a failure. [ 441.293099][T13885] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 441.336077][T13885] CPU: 0 PID: 13885 Comm: syz.2.2616 Not tainted 6.6.94-syzkaller #0 [ 441.344304][T13885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 441.354402][T13885] Call Trace: [ 441.357757][T13885] [ 441.360721][T13885] dump_stack_lvl+0x16c/0x230 [ 441.365477][T13885] ? show_regs_print_info+0x20/0x20 [ 441.370733][T13885] ? load_image+0x3b0/0x3b0 [ 441.375288][T13885] ? __might_fault+0xaa/0x120 [ 441.380026][T13885] ? __lock_acquire+0x7c80/0x7c80 [ 441.385133][T13885] should_fail_ex+0x39d/0x4d0 [ 441.389869][T13885] _copy_from_user+0x2f/0xe0 [ 441.394513][T13885] __sys_bpf+0x1e9/0x800 [ 441.398800][T13885] ? bpf_link_show_fdinfo+0x350/0x350 [ 441.404228][T13885] ? lock_chain_count+0x20/0x20 [ 441.409127][T13885] __x64_sys_bpf+0x7c/0x90 [ 441.413581][T13885] do_syscall_64+0x55/0xb0 [ 441.418054][T13885] ? clear_bhb_loop+0x40/0x90 [ 441.422772][T13885] ? clear_bhb_loop+0x40/0x90 [ 441.427486][T13885] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 441.433426][T13885] RIP: 0033:0x7f8a7b58e929 [ 441.434192][ T12] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 441.437858][T13885] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 441.437879][T13885] RSP: 002b:00007f8a7c393038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 441.437904][T13885] RAX: ffffffffffffffda RBX: 00007f8a7b7b5fa0 RCX: 00007f8a7b58e929 [ 441.437919][T13885] RDX: 0000000000000028 RSI: 00002000000000c0 RDI: 0000000000000012 [ 441.437934][T13885] RBP: 00007f8a7c393090 R08: 0000000000000000 R09: 0000000000000000 [ 441.447285][ T12] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 441.465340][T13885] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 441.465359][T13885] R13: 0000000000000001 R14: 00007f8a7b7b5fa0 R15: 00007ffc77050298 [ 441.465389][T13885] [ 442.341189][ T8406] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 443.631835][ T8406] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 443.733188][ T8406] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 443.820030][ T8406] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 443.961136][T13964] syz.0.2625[13964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 443.961710][T13964] syz.0.2625[13964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 444.374021][ T5786] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 444.397630][ T5786] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 444.406095][ T5786] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 444.414693][ T5786] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 444.422743][ T5786] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 444.430754][ T5786] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 444.784621][T13973] chnl_net:caif_netlink_parms(): no params data found [ 444.878511][T13973] bridge0: port 1(bridge_slave_0) entered blocking state [ 444.885784][T13973] bridge0: port 1(bridge_slave_0) entered disabled state [ 444.892937][T13973] bridge_slave_0: entered allmulticast mode [ 444.903103][T13973] bridge_slave_0: entered promiscuous mode [ 444.912686][T13973] bridge0: port 2(bridge_slave_1) entered blocking state [ 444.920157][T13973] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.927732][T13973] bridge_slave_1: entered allmulticast mode [ 444.934741][T13973] bridge_slave_1: entered promiscuous mode [ 445.010805][T13973] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 445.041070][T13973] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 445.090196][T13993] FAULT_INJECTION: forcing a failure. [ 445.090196][T13993] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 445.110585][T13993] CPU: 1 PID: 13993 Comm: syz.0.2627 Not tainted 6.6.94-syzkaller #0 [ 445.118740][T13993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 445.128841][T13993] Call Trace: [ 445.132256][T13993] [ 445.135231][T13993] dump_stack_lvl+0x16c/0x230 [ 445.139975][T13993] ? show_regs_print_info+0x20/0x20 [ 445.145225][T13993] ? load_image+0x3b0/0x3b0 [ 445.149775][T13993] ? __might_fault+0xaa/0x120 [ 445.154497][T13993] ? __lock_acquire+0x7c80/0x7c80 [ 445.159574][T13993] should_fail_ex+0x39d/0x4d0 [ 445.164306][T13993] _copy_from_user+0x2f/0xe0 [ 445.168939][T13993] __sys_bpf+0x1e9/0x800 [ 445.173222][T13993] ? bpf_link_show_fdinfo+0x350/0x350 [ 445.178655][T13993] ? lock_chain_count+0x20/0x20 [ 445.183648][T13993] __x64_sys_bpf+0x7c/0x90 [ 445.188121][T13993] do_syscall_64+0x55/0xb0 [ 445.192576][T13993] ? clear_bhb_loop+0x40/0x90 [ 445.197286][T13993] ? clear_bhb_loop+0x40/0x90 [ 445.202002][T13993] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 445.207950][T13993] RIP: 0033:0x7f6fdd78e929 [ 445.212410][T13993] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 445.232059][T13993] RSP: 002b:00007f6fde611038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 445.240599][T13993] RAX: ffffffffffffffda RBX: 00007f6fdd9b5fa0 RCX: 00007f6fdd78e929 [ 445.248618][T13993] RDX: 0000000000000010 RSI: 0000200000000e40 RDI: 0000000000000009 [ 445.256621][T13993] RBP: 00007f6fde611090 R08: 0000000000000000 R09: 0000000000000000 [ 445.264632][T13993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 445.272650][T13993] R13: 0000000000000000 R14: 00007f6fdd9b5fa0 R15: 00007ffdf06a3ad8 [ 445.280685][T13993] [ 445.353111][T13973] team0: Port device team_slave_0 added [ 445.389909][T13973] team0: Port device team_slave_1 added [ 445.487383][ T8406] hsr_slave_0: left promiscuous mode [ 445.507938][ T8406] hsr_slave_1: left promiscuous mode [ 445.523355][ T8406] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 445.536809][ T8406] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 445.553919][ T8406] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 445.573355][ T8406] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 445.586246][ T8406] bridge_slave_1: left allmulticast mode [ 445.591951][ T8406] bridge_slave_1: left promiscuous mode [ 445.601882][ T8406] bridge0: port 2(bridge_slave_1) entered disabled state [ 445.612946][T14005] FAULT_INJECTION: forcing a failure. [ 445.612946][T14005] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 445.630806][ T5776] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 445.641335][ T5776] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 445.644182][T14005] CPU: 1 PID: 14005 Comm: syz.2.2630 Not tainted 6.6.94-syzkaller #0 [ 445.649877][ T5776] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 445.656644][T14005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 445.656660][T14005] Call Trace: [ 445.656669][T14005] [ 445.656679][T14005] dump_stack_lvl+0x16c/0x230 [ 445.656719][T14005] ? show_regs_print_info+0x20/0x20 [ 445.656767][T14005] ? load_image+0x3b0/0x3b0 [ 445.656797][T14005] ? __might_fault+0xaa/0x120 [ 445.666478][ T5776] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 445.673822][T14005] ? __lock_acquire+0x7c80/0x7c80 [ 445.673860][T14005] should_fail_ex+0x39d/0x4d0 [ 445.673900][T14005] _copy_from_user+0x2f/0xe0 [ 445.673932][T14005] ___sys_recvmsg+0x12f/0x510 [ 445.673963][T14005] ? __sys_recvmsg+0x270/0x270 [ 445.673994][T14005] ? ksys_write+0x1c1/0x250 [ 445.674028][T14005] ? __fget_files+0x44a/0x4d0 [ 445.674079][T14005] __x64_sys_recvmsg+0x1f2/0x2c0 [ 445.678363][ T8406] bridge_slave_0: left allmulticast mode [ 445.680335][T14005] ? ___sys_recvmsg+0x510/0x510 [ 445.686973][ T5776] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 445.690276][T14005] ? lockdep_hardirqs_on+0x98/0x150 [ 445.690311][T14005] do_syscall_64+0x55/0xb0 [ 445.695620][ T5776] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 445.699486][T14005] ? clear_bhb_loop+0x40/0x90 [ 445.709078][ T8406] bridge_slave_0: left promiscuous mode [ 445.711451][T14005] ? clear_bhb_loop+0x40/0x90 [ 445.716516][ T8406] bridge0: port 1(bridge_slave_0) entered disabled state [ 445.720710][T14005] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 445.720749][T14005] RIP: 0033:0x7f8a7b58e929 [ 445.811153][T14005] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 445.830817][T14005] RSP: 002b:00007f8a7c372038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 445.839292][T14005] RAX: ffffffffffffffda RBX: 00007f8a7b7b6080 RCX: 00007f8a7b58e929 [ 445.847315][T14005] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000006 [ 445.855329][T14005] RBP: 00007f8a7c372090 R08: 0000000000000000 R09: 0000000000000000 [ 445.863349][T14005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 445.871371][T14005] R13: 0000000000000001 R14: 00007f8a7b7b6080 R15: 00007ffc77050298 [ 445.879412][T14005] [ 445.936961][ T8406] veth1_macvtap: left promiscuous mode [ 445.942727][ T8406] veth0_macvtap: left promiscuous mode [ 445.952912][ T8406] veth1_vlan: left promiscuous mode [ 445.958685][ T8406] veth0_vlan: left promiscuous mode [ 446.505719][ T5786] Bluetooth: hci2: command tx timeout [ 446.562439][ T8406] team0 (unregistering): Port device team_slave_1 removed [ 446.604517][ T8406] team0 (unregistering): Port device team_slave_0 removed [ 446.640357][ T8406] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 446.687030][ T8406] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 447.074724][ T8406] bond0 (unregistering): Released all slaves [ 447.160374][T13973] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 447.170846][T13973] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 447.201041][T13973] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 447.277113][T13973] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 447.284142][T13973] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 447.324809][T13973] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 447.431223][T13973] hsr_slave_0: entered promiscuous mode [ 447.489375][T13973] hsr_slave_1: entered promiscuous mode [ 447.498871][T13973] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 447.507195][T13973] Cannot create hsr debugfs directory [ 447.945714][ T5786] Bluetooth: hci3: command tx timeout [ 448.070837][T14041] syz.0.2636[14041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 448.073023][T14041] syz.0.2636[14041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 448.262011][T14004] chnl_net:caif_netlink_parms(): no params data found [ 448.470240][ T8406] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 448.563625][ T8406] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 448.585364][ T5786] Bluetooth: hci2: command tx timeout [ 448.741768][ T8406] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 448.785314][T14004] bridge0: port 1(bridge_slave_0) entered blocking state [ 448.792513][T14004] bridge0: port 1(bridge_slave_0) entered disabled state [ 448.827132][T14004] bridge_slave_0: entered allmulticast mode [ 448.834495][T14004] bridge_slave_0: entered promiscuous mode [ 448.863282][T14004] bridge0: port 2(bridge_slave_1) entered blocking state [ 448.885739][T14004] bridge0: port 2(bridge_slave_1) entered disabled state [ 448.903203][T14004] bridge_slave_1: entered allmulticast mode [ 448.911844][T14004] bridge_slave_1: entered promiscuous mode [ 448.957874][T14071] FAULT_INJECTION: forcing a failure. [ 448.957874][T14071] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 448.972548][T14071] CPU: 1 PID: 14071 Comm: syz.0.2641 Not tainted 6.6.94-syzkaller #0 [ 448.980667][T14071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 448.990843][T14071] Call Trace: [ 448.994160][T14071] [ 448.997130][T14071] dump_stack_lvl+0x16c/0x230 [ 449.001873][T14071] ? show_regs_print_info+0x20/0x20 [ 449.007121][T14071] ? load_image+0x3b0/0x3b0 [ 449.011655][T14071] ? __might_fault+0xaa/0x120 [ 449.016346][T14071] ? __lock_acquire+0x7c80/0x7c80 [ 449.021384][T14071] should_fail_ex+0x39d/0x4d0 [ 449.026101][T14071] _copy_from_user+0x2f/0xe0 [ 449.030713][T14071] ___sys_sendmsg+0x159/0x290 [ 449.035414][T14071] ? __sys_sendmsg+0x270/0x270 [ 449.040205][T14071] ? __lock_acquire+0x7c80/0x7c80 [ 449.045265][T14071] __se_sys_sendmsg+0x1a5/0x270 [ 449.050133][T14071] ? __x64_sys_sendmsg+0x80/0x80 [ 449.055138][T14071] ? lockdep_hardirqs_on+0x98/0x150 [ 449.060360][T14071] do_syscall_64+0x55/0xb0 [ 449.064793][T14071] ? clear_bhb_loop+0x40/0x90 [ 449.069481][T14071] ? clear_bhb_loop+0x40/0x90 [ 449.074169][T14071] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 449.080089][T14071] RIP: 0033:0x7f6fdd78e929 [ 449.084515][T14071] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 449.104134][T14071] RSP: 002b:00007f6fde611038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 449.112562][T14071] RAX: ffffffffffffffda RBX: 00007f6fdd9b5fa0 RCX: 00007f6fdd78e929 [ 449.120631][T14071] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 449.128628][T14071] RBP: 00007f6fde611090 R08: 0000000000000000 R09: 0000000000000000 [ 449.136614][T14071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 449.144596][T14071] R13: 0000000000000000 R14: 00007f6fdd9b5fa0 R15: 00007ffdf06a3ad8 [ 449.152592][T14071] [ 449.159280][ T8406] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 449.242107][T14004] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 449.259878][T14004] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 449.378979][T14004] team0: Port device team_slave_0 added [ 449.389409][T14004] team0: Port device team_slave_1 added [ 449.531513][T14004] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 449.550979][T14004] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 449.603655][T14004] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 449.658027][T14083] syz.2.2645[14083] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 449.658602][T14083] syz.2.2645[14083] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 449.680340][T13973] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 449.739057][T14004] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 449.753431][T14004] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 449.782631][T14004] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 449.800997][T13973] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 449.874076][T13973] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 449.923735][T13973] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 450.030010][T14004] hsr_slave_0: entered promiscuous mode [ 450.041137][ T5786] Bluetooth: hci3: command tx timeout [ 450.053423][T14004] hsr_slave_1: entered promiscuous mode [ 450.064517][T14004] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 450.073691][T14004] Cannot create hsr debugfs directory [ 450.494823][T14112] FAULT_INJECTION: forcing a failure. [ 450.494823][T14112] name failslab, interval 1, probability 0, space 0, times 0 [ 450.526181][T14112] CPU: 1 PID: 14112 Comm: syz.2.2649 Not tainted 6.6.94-syzkaller #0 [ 450.534336][T14112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 450.544433][T14112] Call Trace: [ 450.547754][T14112] [ 450.550726][T14112] dump_stack_lvl+0x16c/0x230 [ 450.555464][T14112] ? show_regs_print_info+0x20/0x20 [ 450.560744][T14112] ? load_image+0x3b0/0x3b0 [ 450.565299][T14112] ? __might_sleep+0xe0/0xe0 [ 450.569934][T14112] ? __lock_acquire+0x7c80/0x7c80 [ 450.575011][T14112] should_fail_ex+0x39d/0x4d0 [ 450.579743][T14112] should_failslab+0x9/0x20 [ 450.584294][T14112] slab_pre_alloc_hook+0x59/0x310 [ 450.589361][T14112] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 450.595123][T14112] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 450.600884][T14112] __kmem_cache_alloc_node+0x53/0x260 [ 450.606298][T14112] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 450.612066][T14112] __kmalloc+0xa4/0x240 [ 450.616265][T14112] tomoyo_realpath_from_path+0xe3/0x5d0 [ 450.621870][T14112] tomoyo_path_number_perm+0x1ea/0x590 [ 450.627364][T14112] ? tomoyo_path_number_perm+0x1ba/0x590 [ 450.633038][T14112] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 450.638539][T14112] ? ksys_write+0x1c1/0x250 [ 450.643112][T14112] ? __fget_files+0x28/0x4d0 [ 450.647776][T14112] security_file_ioctl+0x70/0xa0 [ 450.652842][T14112] __se_sys_ioctl+0x48/0x170 [ 450.657483][T14112] do_syscall_64+0x55/0xb0 [ 450.661957][T14112] ? clear_bhb_loop+0x40/0x90 [ 450.666672][T14112] ? clear_bhb_loop+0x40/0x90 [ 450.671392][T14112] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 450.677340][T14112] RIP: 0033:0x7f8a7b58e929 [ 450.681791][T14112] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 450.702656][T14112] RSP: 002b:00007f8a7c393038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 450.711115][T14112] RAX: ffffffffffffffda RBX: 00007f8a7b7b5fa0 RCX: 00007f8a7b58e929 [ 450.719123][T14112] RDX: 0000200000000000 RSI: 0000000000008b28 RDI: 0000000000000004 [ 450.727124][T14112] RBP: 00007f8a7c393090 R08: 0000000000000000 R09: 0000000000000000 [ 450.735146][T14112] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 450.743153][T14112] R13: 0000000000000000 R14: 00007f8a7b7b5fa0 R15: 00007ffc77050298 [ 450.751183][T14112] [ 450.760920][ T5786] Bluetooth: hci2: command tx timeout [ 450.772413][T14112] ERROR: Out of memory at tomoyo_realpath_from_path. [ 451.763181][T13973] 8021q: adding VLAN 0 to HW filter on device bond0 [ 451.863906][T13973] 8021q: adding VLAN 0 to HW filter on device team0 [ 451.890392][T14139] syz.0.2655[14139] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 451.890837][T14139] syz.0.2655[14139] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 451.967373][ T8412] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.986055][ T8412] bridge0: port 1(bridge_slave_0) entered forwarding state [ 452.010506][ T8412] bridge0: port 2(bridge_slave_1) entered blocking state [ 452.017756][ T8412] bridge0: port 2(bridge_slave_1) entered forwarding state [ 452.117065][ T5786] Bluetooth: hci3: command tx timeout [ 452.134111][ T8406] hsr_slave_0: left promiscuous mode [ 452.141664][ T8406] hsr_slave_1: left promiscuous mode [ 452.148389][ T8406] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 452.158266][ T8406] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 452.174258][ T8406] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 452.184807][ T8406] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 452.204065][ T8406] bridge_slave_1: left allmulticast mode [ 452.215734][ T8406] bridge_slave_1: left promiscuous mode [ 452.229866][ T8406] bridge0: port 2(bridge_slave_1) entered disabled state [ 452.255623][ T8406] bridge_slave_0: left allmulticast mode [ 452.268204][ T8406] bridge_slave_0: left promiscuous mode [ 452.278604][ T8406] bridge0: port 1(bridge_slave_0) entered disabled state [ 452.335519][ T8406] veth1_macvtap: left promiscuous mode [ 452.341368][ T8406] veth0_macvtap: left promiscuous mode [ 452.347900][ T8406] veth1_vlan: left promiscuous mode [ 452.356947][ T8406] veth0_vlan: left promiscuous mode [ 452.827223][ T5786] Bluetooth: hci2: command tx timeout [ 453.100960][ T8406] team0 (unregistering): Port device team_slave_1 removed [ 453.151068][ T8406] team0 (unregistering): Port device team_slave_0 removed [ 453.201133][ T8406] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 453.254664][ T8406] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 453.684981][ T8406] bond0 (unregistering): Released all slaves [ 453.853635][T14181] FAULT_INJECTION: forcing a failure. [ 453.853635][T14181] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 453.868891][T14181] CPU: 1 PID: 14181 Comm: syz.0.2659 Not tainted 6.6.94-syzkaller #0 [ 453.877039][T14181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 453.887148][T14181] Call Trace: [ 453.890471][T14181] [ 453.893475][T14181] dump_stack_lvl+0x16c/0x230 [ 453.898230][T14181] ? show_regs_print_info+0x20/0x20 [ 453.903500][T14181] ? load_image+0x3b0/0x3b0 [ 453.908068][T14181] ? __might_fault+0xaa/0x120 [ 453.912805][T14181] ? __lock_acquire+0x7c80/0x7c80 [ 453.917895][T14181] should_fail_ex+0x39d/0x4d0 [ 453.922656][T14181] _copy_from_user+0x2f/0xe0 [ 453.927309][T14181] __sys_bpf+0x1e9/0x800 [ 453.931615][T14181] ? bpf_link_show_fdinfo+0x350/0x350 [ 453.937078][T14181] ? lock_chain_count+0x20/0x20 [ 453.942023][T14181] __x64_sys_bpf+0x7c/0x90 [ 453.946496][T14181] do_syscall_64+0x55/0xb0 [ 453.950978][T14181] ? clear_bhb_loop+0x40/0x90 [ 453.955704][T14181] ? clear_bhb_loop+0x40/0x90 [ 453.960456][T14181] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 453.966412][T14181] RIP: 0033:0x7f6fdd78e929 [ 453.970876][T14181] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 453.990538][T14181] RSP: 002b:00007f6fde611038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 453.999011][T14181] RAX: ffffffffffffffda RBX: 00007f6fdd9b5fa0 RCX: 00007f6fdd78e929 [ 454.007124][T14181] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 454.015150][T14181] RBP: 00007f6fde611090 R08: 0000000000000000 R09: 0000000000000000 [ 454.023160][T14181] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 454.031160][T14181] R13: 0000000000000000 R14: 00007f6fdd9b5fa0 R15: 00007ffdf06a3ad8 [ 454.039187][T14181] [ 454.098368][T14004] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 454.185529][ T5786] Bluetooth: hci3: command tx timeout [ 454.409603][T13973] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 454.430601][T14004] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 454.449554][T14004] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 454.502894][T14004] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 454.681376][T14004] 8021q: adding VLAN 0 to HW filter on device bond0 [ 454.730058][T14004] 8021q: adding VLAN 0 to HW filter on device team0 [ 454.769711][ T8413] bridge0: port 1(bridge_slave_0) entered blocking state [ 454.776969][ T8413] bridge0: port 1(bridge_slave_0) entered forwarding state [ 454.812783][T14202] netlink: 'syz.2.2664': attribute type 21 has an invalid length. [ 454.837311][ T8413] bridge0: port 2(bridge_slave_1) entered blocking state [ 454.844542][ T8413] bridge0: port 2(bridge_slave_1) entered forwarding state [ 454.933837][T14202] wg2: entered promiscuous mode [ 454.957977][T14202] wg2: entered allmulticast mode [ 455.288856][T13973] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 455.344683][T14212] sit0: entered allmulticast mode [ 455.402678][T14212] sit0: entered promiscuous mode [ 456.040366][T13973] veth0_vlan: entered promiscuous mode [ 456.083348][T13973] veth1_vlan: entered promiscuous mode [ 456.122643][T14004] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 456.178468][T14220] syz.2.2668[14220] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 456.179324][T14220] syz.2.2668[14220] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 456.210940][T13973] veth0_macvtap: entered promiscuous mode [ 456.235008][T13973] veth1_macvtap: entered promiscuous mode [ 456.273279][T14004] veth0_vlan: entered promiscuous mode [ 456.289518][T13973] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 456.318608][T13973] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 456.329235][T14004] veth1_vlan: entered promiscuous mode [ 456.370353][T13973] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 456.380299][T13973] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 456.390180][T13973] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 456.399779][T13973] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 456.437476][T14004] veth0_macvtap: entered promiscuous mode [ 456.488985][T14224] FAULT_INJECTION: forcing a failure. [ 456.488985][T14224] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 456.504082][T14224] CPU: 0 PID: 14224 Comm: syz.0.2670 Not tainted 6.6.94-syzkaller #0 [ 456.512242][T14224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 456.522352][T14224] Call Trace: [ 456.525667][T14224] [ 456.528649][T14224] dump_stack_lvl+0x16c/0x230 [ 456.533398][T14224] ? show_regs_print_info+0x20/0x20 [ 456.538662][T14224] ? load_image+0x3b0/0x3b0 [ 456.543223][T14224] ? __might_fault+0xaa/0x120 [ 456.547954][T14224] ? __lock_acquire+0x7c80/0x7c80 [ 456.553029][T14224] should_fail_ex+0x39d/0x4d0 [ 456.557884][T14224] _copy_from_user+0x2f/0xe0 [ 456.562546][T14224] ___sys_sendmsg+0x159/0x290 [ 456.567372][T14224] ? __sys_sendmsg+0x270/0x270 [ 456.572235][T14224] ? __lock_acquire+0x7c80/0x7c80 [ 456.577379][T14224] __se_sys_sendmsg+0x1a5/0x270 [ 456.582281][T14224] ? __x64_sys_sendmsg+0x80/0x80 [ 456.587312][T14224] ? lockdep_hardirqs_on+0x98/0x150 [ 456.592566][T14224] do_syscall_64+0x55/0xb0 [ 456.597028][T14224] ? clear_bhb_loop+0x40/0x90 [ 456.601739][T14224] ? clear_bhb_loop+0x40/0x90 [ 456.606471][T14224] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 456.612423][T14224] RIP: 0033:0x7f6fdd78e929 [ 456.616888][T14224] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 456.636540][T14224] RSP: 002b:00007f6fde611038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 456.645054][T14224] RAX: ffffffffffffffda RBX: 00007f6fdd9b5fa0 RCX: 00007f6fdd78e929 [ 456.653062][T14224] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000008 [ 456.661073][T14224] RBP: 00007f6fde611090 R08: 0000000000000000 R09: 0000000000000000 [ 456.669095][T14224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 456.677102][T14224] R13: 0000000000000000 R14: 00007f6fdd9b5fa0 R15: 00007ffdf06a3ad8 [ 456.685261][T14224] [ 456.734730][T14004] veth1_macvtap: entered promiscuous mode [ 456.805409][T14004] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 456.817564][T14004] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 456.836496][T14004] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 456.867921][ T12] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 456.892320][ T12] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 456.910045][T14004] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 456.937056][T14004] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 456.952997][T14004] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 457.007476][T14004] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 457.020070][T14004] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 457.029911][T14004] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 457.044507][T14004] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 457.059246][ T8412] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 457.078387][ T8406] wlan1: Trigger new scan to find an IBSS to join [ 457.087061][ T8406] ================================================================================ [ 457.097060][ T8412] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 457.121015][ T8406] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:1209:5 [ 457.137913][ T8406] index 1 is out of range for type 'struct ieee80211_channel *[] __counted_by(n_channels)' (aka 'struct ieee80211_channel *[]') [ 457.167614][ T8406] CPU: 1 PID: 8406 Comm: kworker/u4:15 Not tainted 6.6.94-syzkaller #0 [ 457.175944][ T8406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 457.186057][ T8406] Workqueue: events_unbound cfg80211_wiphy_work [ 457.192373][ T8406] Call Trace: [ 457.195696][ T8406] [ 457.198677][ T8406] dump_stack_lvl+0x16c/0x230 [ 457.203431][ T8406] ? show_regs_print_info+0x20/0x20 [ 457.208705][ T8406] ? load_image+0x3b0/0x3b0 [ 457.213264][ T8406] ? mutex_lock_nested+0x20/0x20 [ 457.218363][ T8406] ubsan_epilogue+0xa/0x30 [ 457.222808][ T8406] __ubsan_handle_out_of_bounds+0xe3/0xf0 [ 457.228915][ T8406] ieee80211_request_ibss_scan+0x4eb/0x790 [ 457.234768][ T8406] ieee80211_ibss_work+0xdfd/0x10c0 [ 457.240011][ T8406] ? ieee80211_ibss_rx_queued_mgmt+0x2ac0/0x2ac0 [ 457.246372][ T8406] ? mark_lock+0x94/0x320 [ 457.250748][ T8406] ? ieee80211_iface_work+0xbca/0xc70 [ 457.256147][ T8406] ? _raw_spin_unlock_irq+0x23/0x50 [ 457.261379][ T8406] cfg80211_wiphy_work+0x225/0x260 [ 457.266521][ T8406] ? process_scheduled_works+0x957/0x15b0 [ 457.272265][ T8406] process_scheduled_works+0xa45/0x15b0 [ 457.277867][ T8406] ? assign_work+0x400/0x400 [ 457.282492][ T8406] ? assign_work+0x39e/0x400 [ 457.287111][ T8406] worker_thread+0xa55/0xfc0 [ 457.291765][ T8406] kthread+0x2fa/0x390 [ 457.295854][ T8406] ? pr_cont_work+0x560/0x560 [ 457.300654][ T8406] ? kthread_blkcg+0xd0/0xd0 [ 457.305273][ T8406] ret_from_fork+0x48/0x80 [ 457.309720][ T8406] ? kthread_blkcg+0xd0/0xd0 [ 457.314329][ T8406] ret_from_fork_asm+0x11/0x20 [ 457.319140][ T8406] [ 457.359247][ T8406] ================================================================================ [ 457.373536][ T8406] Kernel panic - not syncing: UBSAN: panic_on_warn set ... [ 457.380800][ T8406] CPU: 0 PID: 8406 Comm: kworker/u4:15 Not tainted 6.6.94-syzkaller #0 [ 457.389083][ T8406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 457.399169][ T8406] Workqueue: events_unbound cfg80211_wiphy_work [ 457.405466][ T8406] Call Trace: [ 457.408770][ T8406] [ 457.411748][ T8406] dump_stack_lvl+0x16c/0x230 [ 457.416464][ T8406] ? show_regs_print_info+0x20/0x20 [ 457.421688][ T8406] ? load_image+0x3b0/0x3b0 [ 457.426234][ T8406] panic+0x2c0/0x710 [ 457.430164][ T8406] ? bpf_jit_dump+0xd0/0xd0 [ 457.434693][ T8406] ? mutex_lock_nested+0x20/0x20 [ 457.439653][ T8406] check_panic_on_warn+0x84/0xa0 [ 457.444605][ T8406] __ubsan_handle_out_of_bounds+0xe3/0xf0 [ 457.450352][ T8406] ieee80211_request_ibss_scan+0x4eb/0x790 [ 457.456193][ T8406] ieee80211_ibss_work+0xdfd/0x10c0 [ 457.461450][ T8406] ? ieee80211_ibss_rx_queued_mgmt+0x2ac0/0x2ac0 [ 457.467795][ T8406] ? mark_lock+0x94/0x320 [ 457.472142][ T8406] ? ieee80211_iface_work+0xbca/0xc70 [ 457.477531][ T8406] ? _raw_spin_unlock_irq+0x23/0x50 [ 457.482769][ T8406] cfg80211_wiphy_work+0x225/0x260 [ 457.487985][ T8406] ? process_scheduled_works+0x957/0x15b0 [ 457.493720][ T8406] process_scheduled_works+0xa45/0x15b0 [ 457.499309][ T8406] ? assign_work+0x400/0x400 [ 457.503919][ T8406] ? assign_work+0x39e/0x400 [ 457.508526][ T8406] worker_thread+0xa55/0xfc0 [ 457.513153][ T8406] kthread+0x2fa/0x390 [ 457.517265][ T8406] ? pr_cont_work+0x560/0x560 [ 457.521956][ T8406] ? kthread_blkcg+0xd0/0xd0 [ 457.526556][ T8406] ret_from_fork+0x48/0x80 [ 457.530988][ T8406] ? kthread_blkcg+0xd0/0xd0 [ 457.535590][ T8406] ret_from_fork_asm+0x11/0x20 [ 457.540399][ T8406] [ 457.543773][ T8406] Kernel Offset: disabled [ 457.548217][ T8406] Rebooting in 86400 seconds..