last executing test programs: 5m57.147463886s ago: executing program 3 (id=918): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f00000002c0), &(0x7f0000000500)=""/140}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x3}, 0x10010, 0x2c2b, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x8000, 0x0, 0xffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000240)={r3}, 0x57) 5m56.088889591s ago: executing program 3 (id=924): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)=ANY=[], 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xa, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x8, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fefd000e40000200875a65969ff57b0000000000000000ff00000000ac1414aa"], 0xfdef) 5m56.015854454s ago: executing program 3 (id=926): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0xa) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 64) 5m55.311135135s ago: executing program 3 (id=930): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="006d3d50f6", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@fallback=r0, 0x1f, 0x1, 0x0, &(0x7f00000000c0)=[0x0, 0x0], 0x2, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0]}, 0x40) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000400)=@framed={{}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}, {0x85, 0x0, 0x0, 0x2d}}, @call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r7}, 0xc) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x202000, 0x0) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfffffffffffffda2) (async) close(r2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)=""/14, 0x110, 0xe, 0x1, 0x9}, 0x28) (async) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b00)={r8, 0xe0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xb, &(0x7f0000000900)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000940), &(0x7f0000000980), 0x8, 0x15, 0x8, 0x8, &(0x7f00000009c0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1e000000fbffffff040000000101000002040400", @ANYRES32=r3, @ANYBLOB="0000000000000000000000000000000000000000d760375c0c9ff72a01fbd1801bc35e981062992e7b2b2f45a40db2823e54258003e5aefb49ea3be2781328c9bb1de45c3fc5395df48adc719762b70ec374fcceea649286a42372bc2454549a3f2dbc257e340a7b10bbbf2f12d0f9329968d19107aba5483dc8631c1dda0ead4bc3b39424327b8c60ea6df2ee92bcfbcc6d892102cd7df438f8781b2e1b6552f79fd2694a", @ANYRES32=r9, @ANYRES32=r3, @ANYBLOB="0500000001000000020000000300"/28], 0x50) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x14, 0x4, 0x4, 0x20002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x50) 5m55.244274317s ago: executing program 3 (id=933): bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb7, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x5a}, [@ldst={0x7}]}, &(0x7f00000002c0)='GPL\x00', 0x5, 0xfd90, &(0x7f0000000300)=""/188, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f3, 0x10, &(0x7f0000000080), 0xfffffffffffffc79}, 0x23) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="85fdffffff0000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x3, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000110b0008850000007100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @sched_cls=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff19) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x514, 0x266}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0xa, 0x6, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000000e007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000020850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'nr0\x00', 0x6132}) r4 = perf_event_open(&(0x7f00000006c0)={0x2, 0x80, 0x50, 0x7, 0x8, 0x7, 0x0, 0x7f, 0x10000, 0x9, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x4, @perf_config_ext={0x3, 0x8}, 0x800, 0x400, 0x1, 0x2ed6677dddcdeaf0, 0x4, 0x10001, 0x246c, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r4) 5m54.502906259s ago: executing program 3 (id=936): recvmsg$unix(0xffffffffffffffff, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r0, 0x0, 0xfdef) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x1400000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB="0f00000004000000040000000500010400000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000500"/28], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x1}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x8, 0x8}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0xd, 0x15, &(0x7f0000001480)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b70400000000000085000000330000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000200)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x10}, 0x18) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000004c0)='cma_release\x00', r6}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00007fffffffffffffff00"/20, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x17) r9 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0xfffffffffffffe93, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX=r5, @ANYRES16=r6, @ANYRESHEX=r9, @ANYRESHEX=r4], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f00000002c0)='sched_kthread_work_queue_work\x00', r11}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x800}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r8}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x8, 0x4, &(0x7f0000000780)=ANY=[@ANYBLOB="b566534a047d78c22de8c5f14bef190e98314b78d5a018b88d09eb3808aec736e39e6e806f8472f76085fcccdec1d8db3fab9a5f12abb24a6a11efbd36cc09258dbd8670a86891a96e2f22b81cac160dd50d2107a1a4e8febb044222a89e5f47b9e8ec69005a4d1368deeac9af2559f6793efaaf830b4312e76cebfe8f752512ca1a0785d2746fd9ca7451"], &(0x7f0000000380)='GPL\x00', 0x5, 0xc3, &(0x7f00000003c0)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000100), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) 5m39.458754055s ago: executing program 32 (id=936): recvmsg$unix(0xffffffffffffffff, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r0, 0x0, 0xfdef) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x1400000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB="0f00000004000000040000000500010400000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000500"/28], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x1}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x8, 0x8}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0xd, 0x15, &(0x7f0000001480)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b70400000000000085000000330000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000200)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x10}, 0x18) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000004c0)='cma_release\x00', r6}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00007fffffffffffffff00"/20, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x17) r9 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0xfffffffffffffe93, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX=r5, @ANYRES16=r6, @ANYRESHEX=r9, @ANYRESHEX=r4], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f00000002c0)='sched_kthread_work_queue_work\x00', r11}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x800}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r8}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x8, 0x4, &(0x7f0000000780)=ANY=[@ANYBLOB="b566534a047d78c22de8c5f14bef190e98314b78d5a018b88d09eb3808aec736e39e6e806f8472f76085fcccdec1d8db3fab9a5f12abb24a6a11efbd36cc09258dbd8670a86891a96e2f22b81cac160dd50d2107a1a4e8febb044222a89e5f47b9e8ec69005a4d1368deeac9af2559f6793efaaf830b4312e76cebfe8f752512ca1a0785d2746fd9ca7451"], &(0x7f0000000380)='GPL\x00', 0x5, 0xc3, &(0x7f00000003c0)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000100), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) 27.24140193s ago: executing program 4 (id=3271): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x2}, 0x8) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000a80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYRES32], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2}, 0xfffffffffffffee0}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@map=0x1, 0x2b, 0x0, 0xfffffff9, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@fallback, 0xffffffffffffffff, 0x19, 0xc, 0xffffffffffffffff, @void, @value, @void, @void, r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) 22.890386837s ago: executing program 4 (id=3271): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x2}, 0x8) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000a80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYRES32], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2}, 0xfffffffffffffee0}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@map=0x1, 0x2b, 0x0, 0xfffffff9, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@fallback, 0xffffffffffffffff, 0x19, 0xc, 0xffffffffffffffff, @void, @value, @void, @void, r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) 18.734911536s ago: executing program 4 (id=3271): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x2}, 0x8) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000a80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYRES32], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2}, 0xfffffffffffffee0}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@map=0x1, 0x2b, 0x0, 0xfffffff9, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@fallback, 0xffffffffffffffff, 0x19, 0xc, 0xffffffffffffffff, @void, @value, @void, @void, r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) 12.965424113s ago: executing program 4 (id=3271): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x2}, 0x8) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000a80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYRES32], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2}, 0xfffffffffffffee0}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@map=0x1, 0x2b, 0x0, 0xfffffff9, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@fallback, 0xffffffffffffffff, 0x19, 0xc, 0xffffffffffffffff, @void, @value, @void, @void, r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) 6.260943681s ago: executing program 4 (id=3271): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x2}, 0x8) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000a80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYRES32], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2}, 0xfffffffffffffee0}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@map=0x1, 0x2b, 0x0, 0xfffffff9, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@fallback, 0xffffffffffffffff, 0x19, 0xc, 0xffffffffffffffff, @void, @value, @void, @void, r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) 3.625965055s ago: executing program 1 (id=3939): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x3, 0x20000000000000b9, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000280)="3aaa14041191bee51d925d6ace3e1d5e17839c326fe625b49a9000a9f5ecaf19c85f5463f322381e049133f892db2397e7ac5403d2c1dc510db40c7f56be79ca5207c7c933b2d167cc08334d5140640fded6f3f6b4482f20fa7cea", 0x5b}, {&(0x7f0000000680)="970e6e816424e818ebb77af4d23ba54fc8a8bede6a3c66a623c83c4b4112a1730c16aeb047aaac8efa8e8e33941d20eed0ef595cc976040ea492de219bfd22cc85c52f84716c11a11a6b806c78376956b4ebc3281867a16f5f3afebafd38462c07db5e7665b4e17bf111924ffec80bd67829f8e7d36c9977dbad7ddea1473e70c381089d858c59284bc1622d8b1299dbdeb8f57b1ee4a1", 0x97}, {&(0x7f0000000200)="1762432c4fdb7d95994fedc2cb38e577b48300cbd1148e0f910eb31cc7ec2426bb057615f436476f9074f3c150d266f252aa573b28a2b4eb3b", 0x39}, {&(0x7f0000000300)}, {&(0x7f0000000740)="195a9b45b4d00942ee09162ac5ddec2cb3d38c0c3d96303f93ca47962b90eb470d94178a98bc365e935355838f283979ee653b92e9bd1ea1ef92f4ae0f21d2a6d1b3503b4997cf7d482ce59664282ffefcd7a49d71fd34659aca452e6a6565fdcd90ed27b6d38682330504a884be81adfcc87f75b05d34d18202c9913517f018a49f37d5e4aca1413ffed9ebf30de4fa28a8ea0c36b3e6385f187929a83109e83cda3352255ee519822f35ba", 0xac}], 0x5, 0x0, 0x0, 0x20040004}, 0x400a0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001e40)=ANY=[@ANYBLOB="0b00000005000000020000000200000005"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000160000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r5}, 0x10) sendmsg$tipc(r3, &(0x7f0000004440)={&(0x7f0000000ec0)=@id={0x1e, 0x3, 0x0, {0x4e21}}, 0x10, 0x0}, 0x0) r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_pid(r6, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000300)=0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1000000004000000080000000700000000000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00)\t'], 0x50) 3.506836119s ago: executing program 1 (id=3941): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = syz_clone(0x800d400, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x2a979d) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={@map, 0x2, 0x0, 0x4, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="16000000000000000400000001", @ANYRES16=r0], 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1200000006000000040000000200000000000000", @ANYRES32, @ANYBLOB='\x00'/28, @ANYBLOB="00000000e004ffff0000000000000000000000000a114aa7cf358c8b094c7380426fafbd92fb35698be6d227af3d27002299645687c84ac38a4cfa2b8c833634b0910bf19b27dff5d5af2435d752ba366228fadab07f2784b505a5f313886da8f736131708ed652cc6fe689d562e610770eab19619d974e9b334f2747093e77e84b896bea9a22956ea7422446137260f73d435300be3193fc625be47669351564b3e29f6419e24e129a11aa3ddef66a7603795b2f500"/191, @ANYRES32, @ANYRESOCT=r2], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r3}, &(0x7f0000000040), &(0x7f0000000140)=r2}, 0x20) recvmsg$unix(r2, &(0x7f0000000400)={&(0x7f0000000000)=@abs, 0x6e, 0x0, 0x0, 0x0, 0xb}, 0x41) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000040)=r4, 0x4) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000080)=@ieee802154={0x24, @none={0x0, 0x2}}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="5fbab7cb3b3073717d7555600601aff0008dd6ffc82a5e7f86912a", 0x1b}], 0x1}, 0x8000) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000140), 0x5, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r6}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5100, 0x0, 0x3, 0x0, 0x0, 0xfee, 0x0, 0x0, 0x0, 0x0, 0x100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000600)) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r8}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x26a820, 0x0) 2.612130828s ago: executing program 5 (id=3944): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000000040000cd00000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x48) 2.452419185s ago: executing program 5 (id=3945): write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa06"], 0xfdef) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400ffd9b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0xc8, 0x0, 0x4, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) 2.405014117s ago: executing program 5 (id=3946): bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x4, @perf_bp={&(0x7f0000001080), 0x7}, 0x10000, 0x8, 0x0, 0x0, 0x7, 0x7, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) 2.286184702s ago: executing program 5 (id=3947): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0xe62}, 0x0, 0xc8, 0x0, 0x6, 0x0, 0x0, 0xfffa, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x10, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@printk={@lx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x9b}}]}, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0100000040000000060000000800000001000000", @ANYRES32, @ANYBLOB='\x00'/14, @ANYRES32=0x0, @ANYRES32], 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000002000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r3, 0xfffff000, 0xe, 0x0, &(0x7f00000001c0)="61df712bc884fe68a02780b605a7", 0x0, 0x77ff, 0x7000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r4}, 0x18) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2, 0x1, 0x0, r7}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000940)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x94) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r6, &(0x7f00000001c0), 0xfffffdef) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000006100000085000000a00000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r9, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d88a8", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000000), 0xfdef) 2.021730163s ago: executing program 2 (id=3951): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000000040000cd00000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x48) (fail_nth: 33) 1.729800806s ago: executing program 0 (id=3952): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x18) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={@map=r6, 0xd, 0x1, 0x3, &(0x7f0000000280), 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="2b00000008c1bab354000000", @ANYRES32, @ANYBLOB, @ANYRES64=r7], 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{0x1, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f0000000300)=r2}, 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000200)={@map=r8, r0, 0x1e, 0x14, 0x0, @void, @value=r3, @void, @void, r7}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r9, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r10}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x2100, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 1.683123168s ago: executing program 2 (id=3953): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r1}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0x1, 0xffffffffffffffff}, 0x4) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0x1, 0x8}, 0xc) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000940)=@framed={{0x18, 0x9}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r5}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r5, &(0x7f0000000780)}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x13, 0x80000000, 0xba8d, 0x6, 0x20008, 0x1, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x0, 0xab, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000840), &(0x7f0000000880), 0x8, 0x44, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a80)={0x1b, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x50) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000d80)=@base={0x1b, 0x0, 0x8000000, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x80000000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b40)=@generic={&(0x7f0000000b00)='./file0\x00', 0x0, 0x10}, 0x18) r13 = bpf$ITER_CREATE(0x21, &(0x7f0000000b80), 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000cc0)={0x6, 0x2a, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @map_val={0x18, 0x9, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x5}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x4}, @map_fd={0x18, 0x2, 0x1, 0x0, r5}, @map_val={0x18, 0x4, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x80000001}, @tail_call, @call={0x85, 0x0, 0x0, 0xa9}]}, &(0x7f0000000380)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x29, '\x00', r7, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a40)={0x2, 0x0, 0x7f, 0xe2f}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000bc0)=[r8, 0xffffffffffffffff, r9, r10, r11, r12, r13], &(0x7f0000000c00)=[{0x0, 0x1, 0xf}, {0x5, 0x2, 0x5, 0x7}, {0x0, 0x4, 0xa, 0x1}, {0x3, 0x2, 0xa, 0xa}, {0x1, 0x2, 0x1, 0x6}, {0x1, 0x1, 0x2, 0x7}, {0x3, 0x3, 0xd, 0x4}, {0x0, 0x1, 0xc, 0xc}, {0x4, 0x2, 0x7, 0x8}], 0x10, 0x101}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0xb, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3d}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x1}, @map_fd={0x18, 0x9, 0x1, 0x0, r0}, @map_idx={0x18, 0x4, 0x5, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xc6}]}, &(0x7f0000000200)='GPL\x00', 0x1, 0x0, 0x0, 0x1f00, 0x8, '\x00', r7, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0xa, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000280)=[r0, r0], &(0x7f00000002c0)=[{0x2, 0x2, 0x6, 0x1}, {0x0, 0x5, 0x0, 0x5}, {0x3, 0x2, 0xf, 0x3}, {0x5, 0x5, 0x8, 0x1}, {0x4, 0x2, 0x4, 0xd}, {0x1, 0x3, 0x2, 0x2}, {0x2, 0x3, 0x9, 0x7}, {0x0, 0x1, 0x7, 0x3}], 0x10, 0x1}, 0x94) 1.573755423s ago: executing program 2 (id=3954): syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000001b40), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x47, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000b2fb33001800e5ff184e110000a8cc1c6beada1713191a37076cd07026b292dc6b70d30cc441ce9f428c07473019665263eb847e57226b0e4cc27d91b26e537a0903223dd54fb856b2208f811cbf0cac8441b7b2af8553b78a98e8f709ef2a1ef02ff1ecab9fef587e002bdd00fbf88b34a2f61c142b935c1441b43439ea0a5c", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0xfffffffffffffdf5, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x16, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xffff}, [@printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x4}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r7}, &(0x7f00000004c0), &(0x7f0000000540)=r6}, 0x20) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x83, 0x1, 0x0, 0x0, 0x0, 0xc, 0x100020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x40, 0xd, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xe, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) 1.420155829s ago: executing program 5 (id=3955): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000340)="a836", 0x2}], 0x1}, 0x4040001) recvmsg$unix(r0, &(0x7f00000038c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4e}, 0x1) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3, 0x5, 0x0, 0x0, 0x6, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2a9, 0x4, @perf_config_ext={0xb2, 0x3ff}, 0x100c10, 0x0, 0x800, 0x0, 0x10, 0xffff, 0x5157, 0x0, 0x80000000, 0x0, 0x4}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x3, 0x80, 0x7a, 0x1, 0x4, 0x6, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f00000000c0), 0xc}, 0x0, 0xfff, 0x7, 0x9, 0x2, 0x9, 0x7d8d, 0x0, 0x7, 0x0, 0x1}, r1, 0x0, r2, 0xd) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0xe, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1d, 0x1, @perf_bp={0x0, 0x1}, 0x1, 0x200, 0x2, 0x0, 0x9, 0x9, 0x80, 0x0, 0xbbd0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x9, '\x00', 0x0, 0x0}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x18) recvmsg$unix(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000006c0)=""/109, 0xffffffe6}], 0x1}, 0x0) 1.344992023s ago: executing program 5 (id=3956): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/../file0/../file0/file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r3 = openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000880), 0x12) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb01001800000000000000000000c1809b314b4984d00000000000060000000000612e2e007f747916cdd3b6f4c5d5ebe667ffaee29cd998afd4126318acb55f9bf2b5bfa2e3b5f762c39156dc57bc90a2a410d530e26c928db9654a0e07086b485c39169e7d9274b653e6034b3270782c21803f572a749effabc3"], 0x0, 0x1e}, 0x28) perf_event_open$cgroup(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x3, 0x2, 0x0, 0x4, 0x21000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000300), 0xa}, 0x4000, 0x8000000000000001, 0x4, 0x3, 0x6, 0x3f, 0x16ae, 0x0, 0x5, 0x0, 0xffff}, r0, 0x1, r2, 0x7) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x183081, 0x0) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) 1.336657092s ago: executing program 0 (id=3957): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1000000004000000080000000700000000000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00)\t'], 0x50) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) 1.251717157s ago: executing program 0 (id=3958): bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) sendmsg(r0, &(0x7f0000000180)={&(0x7f0000000280)=@hci={0x1f, 0x0, 0x1}, 0x80, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="f0bc8babb2e5e4f9071ab52ffbf2b8ed07fbab490ce44d7e4e926ebac2f2643c5fb400ad4cd7630d9c6ef79aca78ef79bc6757db3ebc1cd3e0694e1761728af086931f1a9dfc6e31dae3e550a2f2f0a9f82da2ab88439a713eef9b7f397796621f6377ef8c040f818f71572b81ac48a149db5fd187c03ea21ed6f528249f3d01d104bd3566f864f7fb5ce2ef79603cb808ce55bafbd3ce9143c13cb3ca22147385bf4cf1bc8797c83689689b205c05e191", 0xb1}, {&(0x7f0000000580)="9ec24aaa26d2a4d300c72d9c5cb29804b3f0c26af10819ffe675cc9785a1a692fc52ddba73ac98d6731d6e193d7f2f579c57d38863e21eae55bf372f45cf5a3397f676626c932368876992b0e6e193537990b47aa284daa1ceee6e19fc76d960bfb012382732cc51524261a1f37d7a5bc9a17c617479", 0x76}, {&(0x7f0000000600)="3347fca9dfaa73541255ef525ad72ab37127997707c2ff9e0e6af1593d0eeadee4d363e873e73ac0272be209163e7b56c762d9018a4b5f129a07e7973a8002074932dbf4ecf95088aadcd35884f7d43dd13a5adb6f28046b91d82a28264490d7b63b322d4d95859da50867fb024ef39215219eb4682dd38062a497209b70023b53ada528304cdea1ad2a966b01902fff98fbdabe85e19897f13e3466976a2b3bccd27892f384107b91019bf431493c07f7e5bad1351ee18698cc", 0xba}, {&(0x7f0000000780)="e59498584289a9b4240d1f6d49f1eb3cfc6c10ba412b4436d52173dec12f03bef4eb35a49fe7a481d6635e01b5fb51c1824340df1c3bd9291eae6166add72e4196f633a3ac862ff2e2aa326bbc7789637d6cd890551cb0f1832c1019a26d578e2e44514229a3ccbace8c3ceb7943b7f2b8a157f995c420741e9a20a42032fdbe45396e0eb46ad5add458435f18557a05f543f46c85918ff4994527ecb878414f1ec14d2c4bf6c2334b66c08864b893773d", 0xb1}, {&(0x7f0000000840)="a6c2c64d6733810cd7e34ae153f1e583bf19cb5613b6171ad4e286bb1aaa7ad1b6cc09a01fd9e2b12eba08c32d11dc473a45b51d566959d5935c0a5cc08ecb78cda37d4f28eb09e088fcf8d621c39c43b0ee8927ef19b5552910f53764b0b7adcb", 0x61}, {&(0x7f00000008c0)="a5e094b735807a53d71dc9159cd3a6f9ad74e3bd89e701a792f5b26341fc993c858953206ca6036bc169b90d76a2dc80bb1a003e202084c7180913a2bde9055f497f0105f32059a712d32b10bf9bec0a241b23867b0e017bf7b5ade3f310855f0d471cf1661bc791938790c613923bf9d5de4b32dc4864c910987cd0b0a8e74f089dfac0c08dceca94b0773c682f713a68ee577ddb0bd3197ad23374c6c3fd8532ea752a79bdf6a1611c8ad6c48f35ad87275badeee0f9885ca9b8485dc1a417b525511e026b1d07be22f4acadaab902f0a783bf84873f00976ae316a216b5dd22c2fa3200bc824fed974506abfbf013d5c691124784", 0xf6}, {&(0x7f00000009c0)="b4d9bde16456b7fb707b59ec4aab653a9f046453f4f795d5478dbf4ea1820a83d7b5c4ef5a588892446521f1f07f6cd2cdc185dcd3ef1e4d011b54bc60d84da7c8609fc848d7fb6142b3cd721cd26a5bb061562b679e296d69ec4bf6de5c5614228e6d3c04d2c12b97fae4b67ecdf5662d5a4cca97925bc36c48d1ecb7dd4ad4d366ad01ecbb59a73745f80a0b8afbbf433b2856df9acafa3b08b7374af14c366d40cc591920f5667807faea3299025dcb155c18927dcc116fd5ee6d30afaf43b916209be5045448a8", 0xc9}, {&(0x7f0000000ac0)="ec9f3ec2cbb86db2326e796ff98569747c71124bb38e7a3e3d9f534818933c38c6d75ec1e5972f0d65490144e24a5eeb9333c0f5f0f9ecc87148584757d268f592655338af3899d7adbb6a6e128a503c7306c610b471ba315c94176eb8f8bc7a5664b01c5f1fef0aa577aff1ec1af97efb4c3ffa9d468f285923170957e1a451b436f911430c108d516fc7141797dddd6754361b125d2d1d735e4309022121cc71323473dd382a40e3fd7f350f5583ccb7255fea19909b4864d417e5168cb578f0229fb38de1dd4fde6c7674a87665198fd2a205d3e5f9115b3fe449fc40fcd7", 0xe0}], 0x8, &(0x7f0000000040)}, 0x4008011) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x15, 0x1ffffffffffffe06, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) bpf$MAP_CREATE(0x300000000000000, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xe3}, 0x100002, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18020000fcffffff00000000000000001801000020646c2500000000004ba7ea69c31c277d000000bfa100000000000007010000f8ffffffb702000008000000b700000000541b13e60000000600000085000000070000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x19, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000240)='timer_start\x00', r3}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x5, 0x5, 0x0, 0x0, 0x3}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc0, &(0x7f000000cf3d)=""/192, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB="0000000000007bebb90dc41be23595dc8000"/31, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000800)=ANY=[@ANYRES32=r8, @ANYRES32=r7, @ANYBLOB='&\x00', @ANYRES64=0x0], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r8}, &(0x7f0000000000), &(0x7f0000000080)=r6}, 0x20) 1.229860247s ago: executing program 0 (id=3959): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r2, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000000)="76389e147583ddd0569ba56a888e55", 0x0, 0xff, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000040000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="170000000000000000400100"/28], 0x50) close(r4) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f00000002c0), 0x20000000}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r8, 0x0, 0x0) syz_clone(0x410e6080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)="2fd0ff0006094f492faff2f173e1ac871d48eef87bb90a19da77ed4bb5ae2e86f7b0cf112203043f022f05c93af58dc47d13e4ed9d9426f7db4e53422cbc58b6b2e48d2a7570b19a5bdcded6dfa976c4bce46e30294d29a8f2bbfa35a756c52f5861fc73de3cd1c8f287a49685e7518b86f45801c10da574d850fd5c2ad8f247931b3c139b7fa61e4af791a289f6f3f4e63a") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) close(0xffffffffffffffff) 1.110754492s ago: executing program 1 (id=3960): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b00"/12], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r1}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000400100004012200a4e2000001"], 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1, r2}, 0x38) 884.775712ms ago: executing program 1 (id=3961): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a500850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xd, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40e00, 0x10, '\x00', 0x0, @sock_ops=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 769.444907ms ago: executing program 0 (id=3962): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000000040000cd00000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000001c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYBLOB='\x00'/13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x626f}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000080000000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x48) 769.172377ms ago: executing program 2 (id=3963): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000000040000cd00000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000001c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYBLOB='\x00'/13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x626f}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000080000000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x48) 752.763338ms ago: executing program 1 (id=3964): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000010000000000000000000018110000", @ANYRESOCT=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r1}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000940)=@framed={{0x18, 0x9}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x200000000000009b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x6, 0x44, 0x1, 0x0, 0x0, 0x3, 0x60014, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x8, 0x9}, 0x20, 0x200, 0xfffffff9, 0x4, 0xc, 0x0, 0x200, 0x0, 0x40, 0x0, 0x7}, 0x0, 0xf, r4, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(&(0x7f0000000180)='./cgroup/../file0\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000040)={[{0x2b, 'cpu'}]}, 0x5) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000001c0)=r3, 0x4) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0x2a020600, &(0x7f0000000300)="4e159d92ce4e466744ae3704fbcbecdf6d177309d6887a9d4f6083f01ff4b38bc7e0302ffc3a39d616b8f204f4e6067102b40bf64b442dedd91fed311fefd48b50ae9b46d11c86ae78e3f153dacb1199b2571171df725d2ec1048be9f8fdf137cdd907342f06a2943b9338ccc1477223fd60082c2fa879c1b419eb567cfc2d6b1cbef6b22c9ad3910b62a564ca93c66b38d442893508c6daf8a3537fe54b130ec3d9d6ea10aba5b7f5c2d4205e7442", 0xaf, 0x0, &(0x7f00000003c0), 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a0, &(0x7f0000000080)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a1, &(0x7f0000000080)) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1}, 0x0, 0x8, 0x9b, 0x0, 0x0, 0x8, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) 680.805491ms ago: executing program 0 (id=3965): close(0xffffffffffffffff) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="180600000000000000000000000000401801"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, 0x0) syz_clone(0x40900200, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0], 0x0, 0x5b, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x1a, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000800), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(0x0, 0x0, 0x806, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff8, 0x97fa}, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 568.729156ms ago: executing program 2 (id=3966): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000071121400000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14}, 0x80) r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000060000000400000000000007000000000000000000000001050000018000000000000000010000851000000000000000020000000000000000000100da"], 0x0, 0x52}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="4eaa00000000000071102000000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x9c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e01, 0x0, @perf_bp={0x0, 0x5}, 0x6c8d, 0x5, 0x0, 0x4, 0x0, 0x6e, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000020000000100000000000001e5ff0000080000000000000001000084060000000000000001"], 0x0, 0x42}, 0x28) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x18, 0x8, 0xc, 0x80000000, 0x1, 0xffffffffffffffff, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r2}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x68083, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfffffffffffffff8}, 0x0, 0x20, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socketpair(0x0, 0x0, 0x200000, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 55.340998ms ago: executing program 2 (id=3967): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00400002000000040082343514b50e3f9bf4a1ab215f3b000000000012040000000000"], &(0x7f0000002cc0)=""/4104, 0x26, 0x1008, 0x1}, 0x28) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00', 0x2}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000540)=0x8) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000003457c6001e0000a1852686000000ff9500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2004}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00'}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8012}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0x2}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x9, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), 0x0, 0x0, 0xa2, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004000000000000ea9d34635a624819de521315eec0456f8f6aa7c69cf0a4f68b469d2aad5055"], &(0x7f00000005c0)=""/258, 0x26, 0x102, 0x1}, 0x28) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f0000000180), 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000c80)={0x3, 0x0}, 0x8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000c40)={@ifindex=r8, r4, 0x19, 0x2023, r7, @void, @void, @value=r10}, 0x20) 35.781159ms ago: executing program 1 (id=3968): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1000000004000000080000000705e70000000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00)\t'], 0x50) 0s ago: executing program 4 (id=3271): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x2}, 0x8) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000a80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYRES32], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2}, 0xfffffffffffffee0}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@map=0x1, 0x2b, 0x0, 0xfffffff9, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@fallback, 0xffffffffffffffff, 0x19, 0xc, 0xffffffffffffffff, @void, @value, @void, @void, r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) kernel console output (not intermixed with test programs): 04.432512][T11143] __vmalloc_node_range+0x375/0xaf0 [ 504.437714][T11143] bpf_map_area_alloc+0xd5/0xe0 [ 504.442566][T11143] ? htab_map_alloc+0xb29/0x14f0 [ 504.447505][T11143] htab_map_alloc+0xb29/0x14f0 [ 504.452277][T11143] map_create+0x455/0x21b0 [ 504.456699][T11143] __sys_bpf+0x2cf/0x730 [ 504.460941][T11143] ? bpf_link_show_fdinfo+0x310/0x310 [ 504.466322][T11143] ? debug_smp_processor_id+0x17/0x20 [ 504.471695][T11143] __x64_sys_bpf+0x7c/0x90 [ 504.476135][T11143] x64_sys_call+0x4b9/0x9a0 [ 504.480646][T11143] do_syscall_64+0x4c/0xa0 [ 504.485063][T11143] ? clear_bhb_loop+0x50/0xa0 [ 504.489739][T11143] ? clear_bhb_loop+0x50/0xa0 [ 504.494417][T11143] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 504.500314][T11143] RIP: 0033:0x7f42012fd749 [ 504.504821][T11143] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 504.524442][T11143] RSP: 002b:00007f41ffd65038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 504.532882][T11143] RAX: ffffffffffffffda RBX: 00007f4201553fa0 RCX: 00007f42012fd749 [ 504.540858][T11143] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 504.548833][T11143] RBP: 00007f41ffd65090 R08: 0000000000000000 R09: 0000000000000000 [ 504.556914][T11143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 504.564889][T11143] R13: 00007f4201554038 R14: 00007f4201553fa0 R15: 00007ffe36c49958 [ 504.572871][T11143] [ 504.638695][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 504.669724][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 504.720585][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 504.731281][T11093] device veth0_vlan entered promiscuous mode [ 504.826138][T11093] device veth1_macvtap entered promiscuous mode [ 504.835973][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 504.856655][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 504.869385][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 504.879605][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 504.888551][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 506.231033][ T336] device bridge_slave_1 left promiscuous mode [ 506.237234][ T336] bridge0: port 2(bridge_slave_1) entered disabled state [ 506.259989][ T336] device bridge_slave_0 left promiscuous mode [ 506.266718][ T336] bridge0: port 1(bridge_slave_0) entered disabled state [ 506.298707][ T336] device veth1_macvtap left promiscuous mode [ 506.317085][ T336] device veth0_vlan left promiscuous mode [ 506.346094][T11181] FAULT_INJECTION: forcing a failure. [ 506.346094][T11181] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 506.381073][T11181] CPU: 1 PID: 11181 Comm: syz.5.3627 Tainted: G W syzkaller #0 [ 506.389987][T11181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 506.400671][T11181] Call Trace: [ 506.403963][T11181] [ 506.406903][T11181] __dump_stack+0x21/0x30 [ 506.411245][T11181] dump_stack_lvl+0xee/0x150 [ 506.415840][T11181] ? show_regs_print_info+0x20/0x20 [ 506.421045][T11181] ? __kernel_text_address+0xa0/0x100 [ 506.426416][T11181] ? unwind_get_return_address+0x4d/0x90 [ 506.432153][T11181] dump_stack+0x15/0x20 [ 506.436309][T11181] should_fail+0x3c1/0x510 [ 506.440734][T11181] should_fail_alloc_page+0x55/0x80 [ 506.445951][T11181] prepare_alloc_pages+0x156/0x600 [ 506.451065][T11181] ? __alloc_pages_bulk+0xab0/0xab0 [ 506.456262][T11181] ? kasan_populate_vmalloc+0x70/0x70 [ 506.461639][T11181] __alloc_pages+0x10a/0x440 [ 506.466245][T11181] ? __sys_bpf+0x2cf/0x730 [ 506.470666][T11181] ? __x64_sys_bpf+0x7c/0x90 [ 506.475257][T11181] ? prep_new_page+0x110/0x110 [ 506.480032][T11181] __alloc_pages_bulk+0x47f/0xab0 [ 506.485068][T11181] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 506.490636][T11181] ? __vmalloc_node_range+0x375/0xaf0 [ 506.496062][T11181] __vmalloc_node_range+0x450/0xaf0 [ 506.501267][T11181] bpf_map_area_alloc+0xd5/0xe0 [ 506.506123][T11181] ? htab_map_alloc+0xb29/0x14f0 [ 506.511065][T11181] htab_map_alloc+0xb29/0x14f0 [ 506.515835][T11181] map_create+0x455/0x21b0 [ 506.520257][T11181] __sys_bpf+0x2cf/0x730 [ 506.524510][T11181] ? bpf_link_show_fdinfo+0x310/0x310 [ 506.529882][T11181] ? bpf_trace_run2+0xb5/0x1b0 [ 506.534650][T11181] ? __bpf_trace_sys_enter+0x62/0x70 [ 506.539938][T11181] __x64_sys_bpf+0x7c/0x90 [ 506.544359][T11181] x64_sys_call+0x4b9/0x9a0 [ 506.548867][T11181] do_syscall_64+0x4c/0xa0 [ 506.553483][T11181] ? clear_bhb_loop+0x50/0xa0 [ 506.558164][T11181] ? clear_bhb_loop+0x50/0xa0 [ 506.562839][T11181] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 506.568753][T11181] RIP: 0033:0x7f1ffe3be749 [ 506.573169][T11181] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 506.592781][T11181] RSP: 002b:00007f1ffce26038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 506.601206][T11181] RAX: ffffffffffffffda RBX: 00007f1ffe614fa0 RCX: 00007f1ffe3be749 [ 506.609183][T11181] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 506.617152][T11181] RBP: 00007f1ffce26090 R08: 0000000000000000 R09: 0000000000000000 [ 506.625134][T11181] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 506.633106][T11181] R13: 00007f1ffe615038 R14: 00007f1ffe614fa0 R15: 00007ffe9ec1d5a8 [ 506.641096][T11181] [ 507.040316][T11198] device wg2 left promiscuous mode [ 507.138952][T11198] device wg2 entered promiscuous mode [ 507.311885][T11205] device wg2 left promiscuous mode [ 507.416041][T11208] device wg2 entered promiscuous mode [ 507.484999][T11183] bridge0: port 1(bridge_slave_0) entered blocking state [ 507.493335][T11183] bridge0: port 1(bridge_slave_0) entered disabled state [ 507.517240][T11183] device bridge_slave_0 entered promiscuous mode [ 507.565112][T11183] bridge0: port 2(bridge_slave_1) entered blocking state [ 507.637225][T11183] bridge0: port 2(bridge_slave_1) entered disabled state [ 507.674663][T11183] device bridge_slave_1 entered promiscuous mode [ 508.683654][T11269] device wg2 left promiscuous mode [ 508.745781][T11269] device wg2 entered promiscuous mode [ 508.810886][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 508.835640][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 508.900934][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 508.909392][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 508.980751][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 508.988004][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 509.014263][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 509.023013][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 509.044868][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 509.052095][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 509.137576][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 509.166319][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 509.285764][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 509.297138][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 509.317006][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 509.327981][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 509.348199][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 509.357034][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 509.385880][T11183] device veth0_vlan entered promiscuous mode [ 509.428235][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 509.438924][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 509.456320][T11183] device veth1_macvtap entered promiscuous mode [ 509.471401][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 509.491922][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 509.501408][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 509.567993][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 509.583803][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 509.611326][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 509.621000][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 509.621336][T11310] FAULT_INJECTION: forcing a failure. [ 509.621336][T11310] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 509.642817][T11310] CPU: 0 PID: 11310 Comm: syz.2.3673 Tainted: G W syzkaller #0 [ 509.651698][T11310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 509.661864][T11310] Call Trace: [ 509.665283][T11310] [ 509.668217][T11310] __dump_stack+0x21/0x30 [ 509.672559][T11310] dump_stack_lvl+0xee/0x150 [ 509.677155][T11310] ? show_regs_print_info+0x20/0x20 [ 509.682358][T11310] dump_stack+0x15/0x20 [ 509.686528][T11310] should_fail+0x3c1/0x510 [ 509.690955][T11310] should_fail_alloc_page+0x55/0x80 [ 509.696151][T11310] prepare_alloc_pages+0x156/0x600 [ 509.701271][T11310] ? __alloc_pages_bulk+0xab0/0xab0 [ 509.706471][T11310] ? __alloc_pages_bulk+0x47f/0xab0 [ 509.711684][T11310] __alloc_pages+0x10a/0x440 [ 509.716288][T11310] ? prep_new_page+0x110/0x110 [ 509.721059][T11310] ? __vmalloc_node_range+0x375/0xaf0 [ 509.726438][T11310] __vmalloc_node_range+0x505/0xaf0 [ 509.731692][T11310] bpf_map_area_alloc+0xd5/0xe0 [ 509.736542][T11310] ? htab_map_alloc+0xb29/0x14f0 [ 509.741477][T11310] htab_map_alloc+0xb29/0x14f0 [ 509.746253][T11310] map_create+0x455/0x21b0 [ 509.750669][T11310] __sys_bpf+0x2cf/0x730 [ 509.754944][T11310] ? bpf_link_show_fdinfo+0x310/0x310 [ 509.760332][T11310] ? debug_smp_processor_id+0x17/0x20 [ 509.765709][T11310] __x64_sys_bpf+0x7c/0x90 [ 509.770128][T11310] x64_sys_call+0x4b9/0x9a0 [ 509.774688][T11310] do_syscall_64+0x4c/0xa0 [ 509.779117][T11310] ? clear_bhb_loop+0x50/0xa0 [ 509.783917][T11310] ? clear_bhb_loop+0x50/0xa0 [ 509.788600][T11310] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 509.794500][T11310] RIP: 0033:0x7f53a16d2749 [ 509.798917][T11310] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 509.818520][T11310] RSP: 002b:00007f53a013a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 509.826942][T11310] RAX: ffffffffffffffda RBX: 00007f53a1928fa0 RCX: 00007f53a16d2749 [ 509.834925][T11310] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 509.842955][T11310] RBP: 00007f53a013a090 R08: 0000000000000000 R09: 0000000000000000 [ 509.850955][T11310] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 509.858950][T11310] R13: 00007f53a1929038 R14: 00007f53a1928fa0 R15: 00007fff96138528 [ 509.866935][T11310] [ 509.951104][T11309] device wg2 left promiscuous mode [ 509.958789][T11311] device wg2 entered promiscuous mode [ 510.203461][T11327] device wg2 left promiscuous mode [ 511.551023][ T336] device bridge_slave_1 left promiscuous mode [ 511.557183][ T336] bridge0: port 2(bridge_slave_1) entered disabled state [ 511.564840][ T336] device bridge_slave_0 left promiscuous mode [ 511.571072][ T336] bridge0: port 1(bridge_slave_0) entered disabled state [ 511.579494][ T336] device veth1_macvtap left promiscuous mode [ 511.585675][ T336] device veth0_vlan left promiscuous mode [ 511.658503][T11333] FAULT_INJECTION: forcing a failure. [ 511.658503][T11333] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 511.672907][T11333] CPU: 1 PID: 11333 Comm: syz.5.3682 Tainted: G W syzkaller #0 [ 511.681895][T11333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 511.691969][T11333] Call Trace: [ 511.695274][T11333] [ 511.698216][T11333] __dump_stack+0x21/0x30 [ 511.702677][T11333] dump_stack_lvl+0xee/0x150 [ 511.707287][T11333] ? show_regs_print_info+0x20/0x20 [ 511.712494][T11333] ? vfs_write+0xc17/0xf70 [ 511.716918][T11333] dump_stack+0x15/0x20 [ 511.721082][T11333] should_fail+0x3c1/0x510 [ 511.725504][T11333] should_fail_usercopy+0x1a/0x20 [ 511.730540][T11333] _copy_from_user+0x20/0xd0 [ 511.735135][T11333] __sys_bpf+0x233/0x730 [ 511.739380][T11333] ? bpf_link_show_fdinfo+0x310/0x310 [ 511.744855][T11333] ? debug_smp_processor_id+0x17/0x20 [ 511.750230][T11333] __x64_sys_bpf+0x7c/0x90 [ 511.754645][T11333] x64_sys_call+0x4b9/0x9a0 [ 511.759148][T11333] do_syscall_64+0x4c/0xa0 [ 511.763581][T11333] ? clear_bhb_loop+0x50/0xa0 [ 511.768259][T11333] ? clear_bhb_loop+0x50/0xa0 [ 511.772940][T11333] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 511.778838][T11333] RIP: 0033:0x7f1ffe3be749 [ 511.783259][T11333] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 511.802876][T11333] RSP: 002b:00007f1ffce26038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 511.811356][T11333] RAX: ffffffffffffffda RBX: 00007f1ffe614fa0 RCX: 00007f1ffe3be749 [ 511.819336][T11333] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 511.827511][T11333] RBP: 00007f1ffce26090 R08: 0000000000000000 R09: 0000000000000000 [ 511.835484][T11333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 511.843541][T11333] R13: 00007f1ffe615038 R14: 00007f1ffe614fa0 R15: 00007ffe9ec1d5a8 [ 511.851522][T11333] [ 511.930849][T11343] FAULT_INJECTION: forcing a failure. [ 511.930849][T11343] name failslab, interval 1, probability 0, space 0, times 0 [ 511.964989][T11343] CPU: 0 PID: 11343 Comm: syz.1.3684 Tainted: G W syzkaller #0 [ 511.973913][T11343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 511.984004][T11343] Call Trace: [ 511.987308][T11343] [ 511.990359][T11343] __dump_stack+0x21/0x30 [ 511.994730][T11343] dump_stack_lvl+0xee/0x150 [ 511.999362][T11343] ? show_regs_print_info+0x20/0x20 [ 512.004599][T11343] ? avc_has_perm_noaudit+0x2f4/0x460 [ 512.010005][T11343] dump_stack+0x15/0x20 [ 512.014193][T11343] should_fail+0x3c1/0x510 [ 512.018864][T11343] __should_failslab+0xa4/0xe0 [ 512.023660][T11343] should_failslab+0x9/0x20 [ 512.028171][T11343] slab_pre_alloc_hook+0x3b/0xe0 [ 512.033122][T11343] ? __alloc_skb+0xe0/0x740 [ 512.037632][T11343] kmem_cache_alloc+0x44/0x260 [ 512.042401][T11343] __alloc_skb+0xe0/0x740 [ 512.046846][T11343] alloc_skb_with_frags+0xa8/0x620 [ 512.052076][T11343] sock_alloc_send_pskb+0x853/0x980 [ 512.057280][T11343] ? is_bpf_text_address+0x177/0x190 [ 512.062571][T11343] ? sock_kzfree_s+0x60/0x60 [ 512.067164][T11343] ? perf_swevent_event+0xce/0x530 [ 512.072283][T11343] ? debug_smp_processor_id+0x17/0x20 [ 512.077660][T11343] tun_get_user+0x4e6/0x33c0 [ 512.082257][T11343] ? tun_do_read+0x1c40/0x1c40 [ 512.087023][T11343] ? kstrtouint_from_user+0x1a0/0x200 [ 512.092396][T11343] ? kstrtol_from_user+0x260/0x260 [ 512.097515][T11343] ? avc_policy_seqno+0x1b/0x70 [ 512.102366][T11343] ? selinux_file_permission+0x2aa/0x510 [ 512.108003][T11343] tun_chr_write_iter+0x1eb/0x2e0 [ 512.113042][T11343] vfs_write+0x802/0xf70 [ 512.117290][T11343] ? file_end_write+0x1b0/0x1b0 [ 512.122148][T11343] ? __fget_files+0x2c4/0x320 [ 512.126856][T11343] ? __fdget_pos+0x1f7/0x380 [ 512.131464][T11343] ? ksys_write+0x71/0x240 [ 512.135895][T11343] ksys_write+0x140/0x240 [ 512.140238][T11343] ? __ia32_sys_read+0x90/0x90 [ 512.145018][T11343] ? debug_smp_processor_id+0x17/0x20 [ 512.150396][T11343] __x64_sys_write+0x7b/0x90 [ 512.155001][T11343] x64_sys_call+0x8ef/0x9a0 [ 512.159505][T11343] do_syscall_64+0x4c/0xa0 [ 512.163926][T11343] ? clear_bhb_loop+0x50/0xa0 [ 512.168607][T11343] ? clear_bhb_loop+0x50/0xa0 [ 512.173284][T11343] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 512.179186][T11343] RIP: 0033:0x7f42012fd749 [ 512.183705][T11343] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 512.203428][T11343] RSP: 002b:00007f41ffd65038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 512.211943][T11343] RAX: ffffffffffffffda RBX: 00007f4201553fa0 RCX: 00007f42012fd749 [ 512.219920][T11343] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 512.227898][T11343] RBP: 00007f41ffd65090 R08: 0000000000000000 R09: 0000000000000000 [ 512.235876][T11343] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 512.243941][T11343] R13: 00007f4201554038 R14: 00007f4201553fa0 R15: 00007ffe36c49958 [ 512.251925][T11343] [ 512.261807][T11351] device wg2 entered promiscuous mode [ 512.286754][T11357] FAULT_INJECTION: forcing a failure. [ 512.286754][T11357] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 512.301043][T11357] CPU: 1 PID: 11357 Comm: syz.0.3688 Tainted: G W syzkaller #0 [ 512.310130][T11357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 512.320325][T11357] Call Trace: [ 512.323624][T11357] [ 512.326660][T11357] __dump_stack+0x21/0x30 [ 512.331027][T11357] dump_stack_lvl+0xee/0x150 [ 512.335646][T11357] ? show_regs_print_info+0x20/0x20 [ 512.340903][T11357] dump_stack+0x15/0x20 [ 512.345090][T11357] should_fail+0x3c1/0x510 [ 512.349535][T11357] should_fail_alloc_page+0x55/0x80 [ 512.354760][T11357] prepare_alloc_pages+0x156/0x600 [ 512.359897][T11357] ? __alloc_pages_bulk+0xab0/0xab0 [ 512.365117][T11357] ? __alloc_pages_bulk+0x47f/0xab0 [ 512.370549][T11357] __alloc_pages+0x10a/0x440 [ 512.375441][T11357] ? prep_new_page+0x110/0x110 [ 512.380334][T11357] ? __vmalloc_node_range+0x375/0xaf0 [ 512.385737][T11357] __vmalloc_node_range+0x505/0xaf0 [ 512.390969][T11357] bpf_map_area_alloc+0xd5/0xe0 [ 512.395854][T11357] ? htab_map_alloc+0xb29/0x14f0 [ 512.400816][T11357] htab_map_alloc+0xb29/0x14f0 [ 512.405610][T11357] map_create+0x455/0x21b0 [ 512.410056][T11357] __sys_bpf+0x2cf/0x730 [ 512.414417][T11357] ? bpf_link_show_fdinfo+0x310/0x310 [ 512.419934][T11357] ? debug_smp_processor_id+0x17/0x20 [ 512.425351][T11357] __x64_sys_bpf+0x7c/0x90 [ 512.429792][T11357] x64_sys_call+0x4b9/0x9a0 [ 512.434323][T11357] do_syscall_64+0x4c/0xa0 [ 512.439716][T11357] ? clear_bhb_loop+0x50/0xa0 [ 512.444406][T11357] ? clear_bhb_loop+0x50/0xa0 [ 512.449100][T11357] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 512.455010][T11357] RIP: 0033:0x7fc8e0c62749 [ 512.459441][T11357] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 512.479057][T11357] RSP: 002b:00007fc8df6ca038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 512.487503][T11357] RAX: ffffffffffffffda RBX: 00007fc8e0eb8fa0 RCX: 00007fc8e0c62749 [ 512.495492][T11357] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 512.503574][T11357] RBP: 00007fc8df6ca090 R08: 0000000000000000 R09: 0000000000000000 [ 512.511565][T11357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 512.519638][T11357] R13: 00007fc8e0eb9038 R14: 00007fc8e0eb8fa0 R15: 00007ffdb1454de8 [ 512.527637][T11357] [ 512.540642][T11344] bridge0: port 1(bridge_slave_0) entered blocking state [ 512.547721][T11344] bridge0: port 1(bridge_slave_0) entered disabled state [ 512.555554][T11344] device bridge_slave_0 entered promiscuous mode [ 512.564310][T11344] bridge0: port 2(bridge_slave_1) entered blocking state [ 512.571436][T11344] bridge0: port 2(bridge_slave_1) entered disabled state [ 512.578996][T11344] device bridge_slave_1 entered promiscuous mode [ 512.688466][T11344] bridge0: port 2(bridge_slave_1) entered blocking state [ 512.695707][T11344] bridge0: port 2(bridge_slave_1) entered forwarding state [ 512.703139][T11344] bridge0: port 1(bridge_slave_0) entered blocking state [ 512.710212][T11344] bridge0: port 1(bridge_slave_0) entered forwarding state [ 512.721720][T11371] device sit0 entered promiscuous mode [ 512.850883][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 512.862086][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 512.915231][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 512.985620][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 513.102979][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 513.155502][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 513.162853][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 513.215661][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 513.224237][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 513.231453][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 513.431488][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 513.441609][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 513.498874][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 513.515979][T11387] FAULT_INJECTION: forcing a failure. [ 513.515979][T11387] name failslab, interval 1, probability 0, space 0, times 0 [ 513.528967][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 513.529409][T11387] CPU: 0 PID: 11387 Comm: syz.1.3696 Tainted: G W syzkaller #0 [ 513.545559][T11387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 513.555769][T11387] Call Trace: [ 513.559069][T11387] [ 513.562021][T11387] __dump_stack+0x21/0x30 [ 513.566385][T11387] dump_stack_lvl+0xee/0x150 [ 513.570997][T11387] ? show_regs_print_info+0x20/0x20 [ 513.576218][T11387] ? kasan_set_track+0x5b/0x70 [ 513.581167][T11387] ? kasan_set_free_info+0x23/0x40 [ 513.586312][T11387] ? ____kasan_slab_free+0x125/0x160 [ 513.591655][T11387] ? __kasan_slab_free+0x11/0x20 [ 513.596612][T11387] ? slab_free_freelist_hook+0xc2/0x190 [ 513.602193][T11387] dump_stack+0x15/0x20 [ 513.606381][T11387] should_fail+0x3c1/0x510 [ 513.610893][T11387] __should_failslab+0xa4/0xe0 [ 513.615678][T11387] should_failslab+0x9/0x20 [ 513.620193][T11387] slab_pre_alloc_hook+0x3b/0xe0 [ 513.625242][T11387] __kmalloc+0x6d/0x2c0 [ 513.629433][T11387] ? bpf_test_init+0x100/0x1c0 [ 513.634390][T11387] bpf_test_init+0x100/0x1c0 [ 513.639275][T11387] bpf_prog_test_run_skb+0x193/0x1150 [ 513.644816][T11387] ? __kasan_check_write+0x14/0x20 [ 513.650184][T11387] ? fput_many+0x15a/0x1a0 [ 513.654629][T11387] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 513.660533][T11387] bpf_prog_test_run+0x3d5/0x620 [ 513.665497][T11387] ? bpf_prog_query+0x230/0x230 [ 513.670357][T11387] ? selinux_bpf+0xce/0xf0 [ 513.674893][T11387] ? security_bpf+0x82/0xa0 [ 513.679426][T11387] __sys_bpf+0x52c/0x730 [ 513.683691][T11387] ? bpf_link_show_fdinfo+0x310/0x310 [ 513.689084][T11387] ? debug_smp_processor_id+0x17/0x20 [ 513.694476][T11387] __x64_sys_bpf+0x7c/0x90 [ 513.698904][T11387] x64_sys_call+0x4b9/0x9a0 [ 513.703425][T11387] do_syscall_64+0x4c/0xa0 [ 513.708116][T11387] ? clear_bhb_loop+0x50/0xa0 [ 513.712973][T11387] ? clear_bhb_loop+0x50/0xa0 [ 513.718119][T11387] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 513.724041][T11387] RIP: 0033:0x7f42012fd749 [ 513.728597][T11387] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 513.748744][T11387] RSP: 002b:00007f41ffd65038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 513.757303][T11387] RAX: ffffffffffffffda RBX: 00007f4201553fa0 RCX: 00007f42012fd749 [ 513.765557][T11387] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 513.773557][T11387] RBP: 00007f41ffd65090 R08: 0000000000000000 R09: 0000000000000000 [ 513.781545][T11387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 513.789521][T11387] R13: 00007f4201554038 R14: 00007f4201553fa0 R15: 00007ffe36c49958 [ 513.797527][T11387] [ 513.884833][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 513.897366][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 513.997474][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 514.005888][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 514.042293][T11344] device veth0_vlan entered promiscuous mode [ 514.051923][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 514.060051][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 514.078992][T11344] device veth1_macvtap entered promiscuous mode [ 514.116605][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 514.125686][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 514.150679][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 514.166791][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 514.175509][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 514.218044][T11402] FAULT_INJECTION: forcing a failure. [ 514.218044][T11402] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 514.263334][T11402] CPU: 0 PID: 11402 Comm: syz.0.3702 Tainted: G W syzkaller #0 [ 514.272251][T11402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 514.282331][T11402] Call Trace: [ 514.285629][T11402] [ 514.288684][T11402] __dump_stack+0x21/0x30 [ 514.293039][T11402] dump_stack_lvl+0xee/0x150 [ 514.297650][T11402] ? show_regs_print_info+0x20/0x20 [ 514.302938][T11402] ? stack_trace_save+0x98/0xe0 [ 514.307794][T11402] dump_stack+0x15/0x20 [ 514.311950][T11402] should_fail+0x3c1/0x510 [ 514.316373][T11402] should_fail_alloc_page+0x55/0x80 [ 514.321658][T11402] prepare_alloc_pages+0x156/0x600 [ 514.326767][T11402] ? __alloc_pages_bulk+0xab0/0xab0 [ 514.332147][T11402] __alloc_pages+0x10a/0x440 [ 514.336743][T11402] ? prep_new_page+0x110/0x110 [ 514.341503][T11402] kmalloc_order+0x4c/0x160 [ 514.346002][T11402] ? alloc_skb_with_frags+0xa8/0x620 [ 514.351314][T11402] kmalloc_order_trace+0x18/0xb0 [ 514.356262][T11402] __kmalloc_track_caller+0x198/0x2c0 [ 514.361673][T11402] ? kmem_cache_alloc+0xf7/0x260 [ 514.366617][T11402] ? alloc_skb_with_frags+0xa8/0x620 [ 514.372368][T11402] __alloc_skb+0x21a/0x740 [ 514.376910][T11402] alloc_skb_with_frags+0xa8/0x620 [ 514.382052][T11402] sock_alloc_send_pskb+0x853/0x980 [ 514.387256][T11402] ? is_bpf_text_address+0x177/0x190 [ 514.392569][T11402] ? sock_kzfree_s+0x60/0x60 [ 514.397165][T11402] ? perf_swevent_event+0xce/0x530 [ 514.402340][T11402] ? debug_smp_processor_id+0x17/0x20 [ 514.407711][T11402] tun_get_user+0x4e6/0x33c0 [ 514.412352][T11402] ? tun_do_read+0x1c40/0x1c40 [ 514.417136][T11402] ? kstrtouint_from_user+0x1a0/0x200 [ 514.422605][T11402] ? kstrtol_from_user+0x260/0x260 [ 514.427721][T11402] ? avc_policy_seqno+0x1b/0x70 [ 514.432579][T11402] ? selinux_file_permission+0x2aa/0x510 [ 514.438249][T11402] tun_chr_write_iter+0x1eb/0x2e0 [ 514.443340][T11402] vfs_write+0x802/0xf70 [ 514.447583][T11402] ? file_end_write+0x1b0/0x1b0 [ 514.452436][T11402] ? __fget_files+0x2c4/0x320 [ 514.457116][T11402] ? __fdget_pos+0x1f7/0x380 [ 514.461717][T11402] ? ksys_write+0x71/0x240 [ 514.466132][T11402] ksys_write+0x140/0x240 [ 514.470464][T11402] ? __ia32_sys_read+0x90/0x90 [ 514.475331][T11402] ? debug_smp_processor_id+0x17/0x20 [ 514.480710][T11402] __x64_sys_write+0x7b/0x90 [ 514.485300][T11402] x64_sys_call+0x8ef/0x9a0 [ 514.489800][T11402] do_syscall_64+0x4c/0xa0 [ 514.494217][T11402] ? clear_bhb_loop+0x50/0xa0 [ 514.498887][T11402] ? clear_bhb_loop+0x50/0xa0 [ 514.503561][T11402] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 514.509635][T11402] RIP: 0033:0x7fc8e0c62749 [ 514.514197][T11402] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 514.533957][T11402] RSP: 002b:00007fc8df6ca038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 514.542528][T11402] RAX: ffffffffffffffda RBX: 00007fc8e0eb8fa0 RCX: 00007fc8e0c62749 [ 514.550513][T11402] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 514.558510][T11402] RBP: 00007fc8df6ca090 R08: 0000000000000000 R09: 0000000000000000 [ 514.566506][T11402] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 514.574514][T11402] R13: 00007fc8e0eb9038 R14: 00007fc8e0eb8fa0 R15: 00007ffdb1454de8 [ 514.582541][T11402] [ 514.590053][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 514.599660][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 515.750844][ T336] device bridge_slave_1 left promiscuous mode [ 515.759230][ T336] bridge0: port 2(bridge_slave_1) entered disabled state [ 515.767021][ T336] device bridge_slave_0 left promiscuous mode [ 515.773507][ T336] bridge0: port 1(bridge_slave_0) entered disabled state [ 515.781809][ T336] device veth1_macvtap left promiscuous mode [ 515.787819][ T336] device veth0_vlan left promiscuous mode [ 516.179925][T11414] device wg2 left promiscuous mode [ 516.200775][T11414] device wg2 entered promiscuous mode [ 516.294453][T11424] FAULT_INJECTION: forcing a failure. [ 516.294453][T11424] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 516.319650][T11424] CPU: 0 PID: 11424 Comm: syz.2.3709 Tainted: G W syzkaller #0 [ 516.328559][T11424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 516.338643][T11424] Call Trace: [ 516.341943][T11424] [ 516.344892][T11424] __dump_stack+0x21/0x30 [ 516.349255][T11424] dump_stack_lvl+0xee/0x150 [ 516.353878][T11424] ? show_regs_print_info+0x20/0x20 [ 516.359113][T11424] dump_stack+0x15/0x20 [ 516.363297][T11424] should_fail+0x3c1/0x510 [ 516.367741][T11424] should_fail_usercopy+0x1a/0x20 [ 516.372786][T11424] _copy_from_user+0x20/0xd0 [ 516.377491][T11424] bpf_test_init+0x13d/0x1c0 [ 516.382118][T11424] bpf_prog_test_run_skb+0x193/0x1150 [ 516.387526][T11424] ? __kasan_check_write+0x14/0x20 [ 516.392667][T11424] ? fput_many+0x15a/0x1a0 [ 516.397144][T11424] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 516.403068][T11424] bpf_prog_test_run+0x3d5/0x620 [ 516.408135][T11424] ? bpf_prog_query+0x230/0x230 [ 516.413006][T11424] ? selinux_bpf+0xce/0xf0 [ 516.417442][T11424] ? security_bpf+0x82/0xa0 [ 516.422270][T11424] __sys_bpf+0x52c/0x730 [ 516.426541][T11424] ? bpf_link_show_fdinfo+0x310/0x310 [ 516.431942][T11424] ? debug_smp_processor_id+0x17/0x20 [ 516.437340][T11424] __x64_sys_bpf+0x7c/0x90 [ 516.441786][T11424] x64_sys_call+0x4b9/0x9a0 [ 516.446314][T11424] do_syscall_64+0x4c/0xa0 [ 516.450760][T11424] ? clear_bhb_loop+0x50/0xa0 [ 516.455458][T11424] ? clear_bhb_loop+0x50/0xa0 [ 516.460192][T11424] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 516.466110][T11424] RIP: 0033:0x7f53a16d2749 [ 516.470550][T11424] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 516.490284][T11424] RSP: 002b:00007f53a013a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 516.498825][T11424] RAX: ffffffffffffffda RBX: 00007f53a1928fa0 RCX: 00007f53a16d2749 [ 516.506821][T11424] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 516.514816][T11424] RBP: 00007f53a013a090 R08: 0000000000000000 R09: 0000000000000000 [ 516.522815][T11424] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 516.530825][T11424] R13: 00007f53a1929038 R14: 00007f53a1928fa0 R15: 00007fff96138528 [ 516.538831][T11424] [ 516.733548][T11435] FAULT_INJECTION: forcing a failure. [ 516.733548][T11435] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 516.748707][T11438] FAULT_INJECTION: forcing a failure. [ 516.748707][T11438] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 516.785672][T11435] CPU: 0 PID: 11435 Comm: syz.2.3714 Tainted: G W syzkaller #0 [ 516.794570][T11435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 516.804768][T11435] Call Trace: [ 516.808374][T11435] [ 516.811322][T11435] __dump_stack+0x21/0x30 [ 516.815775][T11435] dump_stack_lvl+0xee/0x150 [ 516.820387][T11435] ? show_regs_print_info+0x20/0x20 [ 516.825610][T11435] dump_stack+0x15/0x20 [ 516.829789][T11435] should_fail+0x3c1/0x510 [ 516.834232][T11435] should_fail_usercopy+0x1a/0x20 [ 516.839279][T11435] _copy_from_iter+0x21a/0x1050 [ 516.844157][T11435] ? __kasan_check_write+0x14/0x20 [ 516.849288][T11435] ? skb_set_owner_w+0x24d/0x370 [ 516.854254][T11435] ? copy_mc_pipe_to_iter+0x770/0x770 [ 516.859656][T11435] ? check_stack_object+0x81/0x140 [ 516.864791][T11435] ? __kasan_check_read+0x11/0x20 [ 516.869842][T11435] ? __check_object_size+0x2f4/0x3c0 [ 516.875146][T11435] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 516.880887][T11435] ? skb_put+0x10e/0x1f0 [ 516.885151][T11435] tun_get_user+0xc3c/0x33c0 [ 516.889768][T11435] ? tun_do_read+0x1c40/0x1c40 [ 516.894639][T11435] ? kstrtouint_from_user+0x1a0/0x200 [ 516.900035][T11435] ? kstrtol_from_user+0x260/0x260 [ 516.905170][T11435] ? avc_policy_seqno+0x1b/0x70 [ 516.910081][T11435] ? selinux_file_permission+0x2aa/0x510 [ 516.915914][T11435] tun_chr_write_iter+0x1eb/0x2e0 [ 516.920978][T11435] vfs_write+0x802/0xf70 [ 516.925256][T11435] ? file_end_write+0x1b0/0x1b0 [ 516.930147][T11435] ? __fget_files+0x2c4/0x320 [ 516.935036][T11435] ? __fdget_pos+0x1f7/0x380 [ 516.939670][T11435] ? ksys_write+0x71/0x240 [ 516.944148][T11435] ksys_write+0x140/0x240 [ 516.948503][T11435] ? __ia32_sys_read+0x90/0x90 [ 516.953301][T11435] ? debug_smp_processor_id+0x17/0x20 [ 516.958700][T11435] __x64_sys_write+0x7b/0x90 [ 516.963306][T11435] x64_sys_call+0x8ef/0x9a0 [ 516.967866][T11435] do_syscall_64+0x4c/0xa0 [ 516.972318][T11435] ? clear_bhb_loop+0x50/0xa0 [ 516.977056][T11435] ? clear_bhb_loop+0x50/0xa0 [ 516.981762][T11435] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 516.987791][T11435] RIP: 0033:0x7f53a16d2749 [ 516.992378][T11435] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 517.012008][T11435] RSP: 002b:00007f53a013a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 517.020570][T11435] RAX: ffffffffffffffda RBX: 00007f53a1928fa0 RCX: 00007f53a16d2749 [ 517.028567][T11435] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 517.036562][T11435] RBP: 00007f53a013a090 R08: 0000000000000000 R09: 0000000000000000 [ 517.044557][T11435] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 517.052551][T11435] R13: 00007f53a1929038 R14: 00007f53a1928fa0 R15: 00007fff96138528 [ 517.060571][T11435] [ 517.081136][T11420] bridge0: port 1(bridge_slave_0) entered blocking state [ 517.088213][T11420] bridge0: port 1(bridge_slave_0) entered disabled state [ 517.097269][T11438] CPU: 0 PID: 11438 Comm: syz.1.3715 Tainted: G W syzkaller #0 [ 517.106164][T11438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 517.116253][T11438] Call Trace: [ 517.119556][T11438] [ 517.122524][T11438] __dump_stack+0x21/0x30 [ 517.126889][T11438] dump_stack_lvl+0xee/0x150 [ 517.131507][T11438] ? show_regs_print_info+0x20/0x20 [ 517.136739][T11438] dump_stack+0x15/0x20 [ 517.140918][T11438] should_fail+0x3c1/0x510 [ 517.145498][T11438] should_fail_alloc_page+0x55/0x80 [ 517.150738][T11438] prepare_alloc_pages+0x156/0x600 [ 517.155881][T11438] ? __alloc_pages_bulk+0xab0/0xab0 [ 517.161129][T11438] ? __alloc_pages_bulk+0x47f/0xab0 [ 517.166366][T11438] __alloc_pages+0x10a/0x440 [ 517.171150][T11438] ? prep_new_page+0x110/0x110 [ 517.176085][T11438] ? __vmalloc_node_range+0x375/0xaf0 [ 517.181485][T11438] __vmalloc_node_range+0x505/0xaf0 [ 517.186715][T11438] bpf_map_area_alloc+0xd5/0xe0 [ 517.191744][T11438] ? htab_map_alloc+0xb29/0x14f0 [ 517.196709][T11438] htab_map_alloc+0xb29/0x14f0 [ 517.201508][T11438] map_create+0x455/0x21b0 [ 517.205952][T11438] __sys_bpf+0x2cf/0x730 [ 517.210221][T11438] ? bpf_link_show_fdinfo+0x310/0x310 [ 517.215635][T11438] ? debug_smp_processor_id+0x17/0x20 [ 517.221059][T11438] __x64_sys_bpf+0x7c/0x90 [ 517.225504][T11438] x64_sys_call+0x4b9/0x9a0 [ 517.230031][T11438] do_syscall_64+0x4c/0xa0 [ 517.234578][T11438] ? clear_bhb_loop+0x50/0xa0 [ 517.239387][T11438] ? clear_bhb_loop+0x50/0xa0 [ 517.244393][T11438] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 517.250314][T11438] RIP: 0033:0x7f42012fd749 [ 517.255031][T11438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 517.275422][T11438] RSP: 002b:00007f41ffd65038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 517.283865][T11438] RAX: ffffffffffffffda RBX: 00007f4201553fa0 RCX: 00007f42012fd749 [ 517.291977][T11438] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 517.299979][T11438] RBP: 00007f41ffd65090 R08: 0000000000000000 R09: 0000000000000000 [ 517.307978][T11438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 517.315982][T11438] R13: 00007f4201554038 R14: 00007f4201553fa0 R15: 00007ffe36c49958 [ 517.324163][T11438] [ 517.344430][T11420] device bridge_slave_0 entered promiscuous mode [ 517.365014][T11420] bridge0: port 2(bridge_slave_1) entered blocking state [ 517.410481][T11420] bridge0: port 2(bridge_slave_1) entered disabled state [ 517.460850][T11420] device bridge_slave_1 entered promiscuous mode [ 517.619026][T11441] device syzkaller0 entered promiscuous mode [ 517.816515][T11450] device wg2 left promiscuous mode [ 517.836017][T11454] device wg2 entered promiscuous mode [ 518.278854][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 518.300634][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 518.361685][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 518.420601][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 518.584969][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 518.592091][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 518.611180][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 518.619987][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 518.628547][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 518.636045][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 518.649678][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 518.658067][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 518.666284][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 518.695687][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 518.766279][T11420] device veth0_vlan entered promiscuous mode [ 518.783584][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 518.830862][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 518.900735][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 518.934102][T11492] FAULT_INJECTION: forcing a failure. [ 518.934102][T11492] name failslab, interval 1, probability 0, space 0, times 0 [ 518.950502][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 519.000422][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 519.060289][T11492] CPU: 1 PID: 11492 Comm: syz.1.3731 Tainted: G W syzkaller #0 [ 519.069327][T11492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 519.079518][T11492] Call Trace: [ 519.082829][T11492] [ 519.085780][T11492] __dump_stack+0x21/0x30 [ 519.090146][T11492] dump_stack_lvl+0xee/0x150 [ 519.094756][T11492] ? show_regs_print_info+0x20/0x20 [ 519.099991][T11492] dump_stack+0x15/0x20 [ 519.104195][T11492] should_fail+0x3c1/0x510 [ 519.108648][T11492] __should_failslab+0xa4/0xe0 [ 519.113098][T11420] device veth1_macvtap entered promiscuous mode [ 519.113552][T11492] should_failslab+0x9/0x20 [ 519.124298][T11492] slab_pre_alloc_hook+0x3b/0xe0 [ 519.129268][T11492] __kmalloc+0x6d/0x2c0 [ 519.133447][T11492] ? sk_prot_alloc+0xed/0x320 [ 519.138147][T11492] ? check_stack_object+0x81/0x140 [ 519.143292][T11492] sk_prot_alloc+0xed/0x320 [ 519.147923][T11492] sk_alloc+0x38/0x430 [ 519.152102][T11492] bpf_prog_test_run_skb+0x24b/0x1150 [ 519.156725][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 519.157559][T11492] ? __kasan_check_write+0x14/0x20 [ 519.170754][T11492] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 519.176778][T11492] bpf_prog_test_run+0x3d5/0x620 [ 519.181755][T11492] ? bpf_prog_query+0x230/0x230 [ 519.186634][T11492] ? selinux_bpf+0xce/0xf0 [ 519.191255][T11492] ? security_bpf+0x82/0xa0 [ 519.195788][T11492] __sys_bpf+0x52c/0x730 [ 519.200056][T11492] ? bpf_link_show_fdinfo+0x310/0x310 [ 519.205458][T11492] ? debug_smp_processor_id+0x17/0x20 [ 519.210868][T11492] __x64_sys_bpf+0x7c/0x90 [ 519.211226][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 519.215328][T11492] x64_sys_call+0x4b9/0x9a0 [ 519.227916][T11492] do_syscall_64+0x4c/0xa0 [ 519.232366][T11492] ? clear_bhb_loop+0x50/0xa0 [ 519.237066][T11492] ? clear_bhb_loop+0x50/0xa0 [ 519.241851][T11492] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 519.247770][T11492] RIP: 0033:0x7f42012fd749 [ 519.252211][T11492] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 519.271853][T11492] RSP: 002b:00007f41ffd65038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 519.280306][T11492] RAX: ffffffffffffffda RBX: 00007f4201553fa0 RCX: 00007f42012fd749 [ 519.288306][T11492] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 519.296299][T11492] RBP: 00007f41ffd65090 R08: 0000000000000000 R09: 0000000000000000 [ 519.304295][T11492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 519.312287][T11492] R13: 00007f4201554038 R14: 00007f4201553fa0 R15: 00007ffe36c49958 [ 519.320335][T11492] [ 519.329246][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 519.355065][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 519.709426][T11499] device wg2 left promiscuous mode [ 519.719186][T11499] device wg2 entered promiscuous mode [ 521.030899][ T336] device bridge_slave_1 left promiscuous mode [ 521.037054][ T336] bridge0: port 2(bridge_slave_1) entered disabled state [ 521.044778][ T336] device bridge_slave_0 left promiscuous mode [ 521.051033][ T336] bridge0: port 1(bridge_slave_0) entered disabled state [ 521.059161][ T336] device veth1_macvtap left promiscuous mode [ 521.065250][ T336] device veth0_vlan left promiscuous mode [ 521.214449][T11507] FAULT_INJECTION: forcing a failure. [ 521.214449][T11507] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 521.229940][T11507] CPU: 1 PID: 11507 Comm: syz.0.3734 Tainted: G W syzkaller #0 [ 521.238939][T11507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 521.249198][T11507] Call Trace: [ 521.252499][T11507] [ 521.255450][T11507] __dump_stack+0x21/0x30 [ 521.259810][T11507] dump_stack_lvl+0xee/0x150 [ 521.264437][T11507] ? show_regs_print_info+0x20/0x20 [ 521.269672][T11507] dump_stack+0x15/0x20 [ 521.273871][T11507] should_fail+0x3c1/0x510 [ 521.278305][T11507] should_fail_alloc_page+0x55/0x80 [ 521.283521][T11507] prepare_alloc_pages+0x156/0x600 [ 521.288636][T11507] ? __alloc_pages_bulk+0xab0/0xab0 [ 521.293853][T11507] ? __alloc_pages_bulk+0x47f/0xab0 [ 521.299171][T11507] __alloc_pages+0x10a/0x440 [ 521.303818][T11507] ? prep_new_page+0x110/0x110 [ 521.308609][T11507] ? __vmalloc_node_range+0x375/0xaf0 [ 521.313984][T11507] __vmalloc_node_range+0x505/0xaf0 [ 521.319202][T11507] bpf_map_area_alloc+0xd5/0xe0 [ 521.324064][T11507] ? htab_map_alloc+0xb29/0x14f0 [ 521.329102][T11507] htab_map_alloc+0xb29/0x14f0 [ 521.333875][T11507] map_create+0x455/0x21b0 [ 521.338302][T11507] __sys_bpf+0x2cf/0x730 [ 521.342544][T11507] ? bpf_link_show_fdinfo+0x310/0x310 [ 521.348038][T11507] ? debug_smp_processor_id+0x17/0x20 [ 521.353499][T11507] __x64_sys_bpf+0x7c/0x90 [ 521.357919][T11507] x64_sys_call+0x4b9/0x9a0 [ 521.362541][T11507] do_syscall_64+0x4c/0xa0 [ 521.366974][T11507] ? clear_bhb_loop+0x50/0xa0 [ 521.371670][T11507] ? clear_bhb_loop+0x50/0xa0 [ 521.376362][T11507] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 521.382353][T11507] RIP: 0033:0x7fc8e0c62749 [ 521.386776][T11507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 521.406385][T11507] RSP: 002b:00007fc8df6ca038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 521.414807][T11507] RAX: ffffffffffffffda RBX: 00007fc8e0eb8fa0 RCX: 00007fc8e0c62749 [ 521.422853][T11507] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 521.430835][T11507] RBP: 00007fc8df6ca090 R08: 0000000000000000 R09: 0000000000000000 [ 521.439184][T11507] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 521.447163][T11507] R13: 00007fc8e0eb9038 R14: 00007fc8e0eb8fa0 R15: 00007ffdb1454de8 [ 521.455446][T11507] [ 521.740881][T11525] device veth0_vlan left promiscuous mode [ 521.830501][T11525] device veth0_vlan entered promiscuous mode [ 521.964947][T11516] bridge0: port 1(bridge_slave_0) entered blocking state [ 521.985583][T11516] bridge0: port 1(bridge_slave_0) entered disabled state [ 521.993559][T11516] device bridge_slave_0 entered promiscuous mode [ 522.001064][T11516] bridge0: port 2(bridge_slave_1) entered blocking state [ 522.008303][T11516] bridge0: port 2(bridge_slave_1) entered disabled state [ 522.016425][T11516] device bridge_slave_1 entered promiscuous mode [ 522.883593][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 522.907361][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 522.955155][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 522.988044][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 522.998780][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 523.005869][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 523.060874][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 523.079895][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 523.089302][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 523.096422][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 523.105122][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 523.169538][T11550] device wg2 left promiscuous mode [ 523.179881][T11555] device wg2 entered promiscuous mode [ 523.272773][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 523.300145][T11560] FAULT_INJECTION: forcing a failure. [ 523.300145][T11560] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 523.316780][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 523.339228][T11560] CPU: 1 PID: 11560 Comm: syz.5.3754 Tainted: G W syzkaller #0 [ 523.348161][T11560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 523.358236][T11560] Call Trace: [ 523.361540][T11560] [ 523.364486][T11560] __dump_stack+0x21/0x30 [ 523.368845][T11560] dump_stack_lvl+0xee/0x150 [ 523.373451][T11560] ? show_regs_print_info+0x20/0x20 [ 523.378706][T11560] dump_stack+0x15/0x20 [ 523.382902][T11560] should_fail+0x3c1/0x510 [ 523.387354][T11560] should_fail_alloc_page+0x55/0x80 [ 523.392563][T11560] prepare_alloc_pages+0x156/0x600 [ 523.397691][T11560] ? __alloc_pages_bulk+0xab0/0xab0 [ 523.402892][T11560] ? __alloc_pages_bulk+0x47f/0xab0 [ 523.408095][T11560] __alloc_pages+0x10a/0x440 [ 523.412687][T11560] ? prep_new_page+0x110/0x110 [ 523.417455][T11560] ? __vmalloc_node_range+0x375/0xaf0 [ 523.422828][T11560] __vmalloc_node_range+0x505/0xaf0 [ 523.428031][T11560] bpf_map_area_alloc+0xd5/0xe0 [ 523.432887][T11560] ? htab_map_alloc+0xb29/0x14f0 [ 523.437918][T11560] htab_map_alloc+0xb29/0x14f0 [ 523.442695][T11560] map_create+0x455/0x21b0 [ 523.447122][T11560] __sys_bpf+0x2cf/0x730 [ 523.451567][T11560] ? bpf_link_show_fdinfo+0x310/0x310 [ 523.456953][T11560] ? debug_smp_processor_id+0x17/0x20 [ 523.462337][T11560] __x64_sys_bpf+0x7c/0x90 [ 523.466754][T11560] x64_sys_call+0x4b9/0x9a0 [ 523.471278][T11560] do_syscall_64+0x4c/0xa0 [ 523.475695][T11560] ? clear_bhb_loop+0x50/0xa0 [ 523.480373][T11560] ? clear_bhb_loop+0x50/0xa0 [ 523.485050][T11560] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 523.490948][T11560] RIP: 0033:0x7f1ffe3be749 [ 523.495398][T11560] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 523.515013][T11560] RSP: 002b:00007f1ffce26038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 523.523438][T11560] RAX: ffffffffffffffda RBX: 00007f1ffe614fa0 RCX: 00007f1ffe3be749 [ 523.531415][T11560] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 523.539397][T11560] RBP: 00007f1ffce26090 R08: 0000000000000000 R09: 0000000000000000 [ 523.547369][T11560] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 523.555344][T11560] R13: 00007f1ffe615038 R14: 00007f1ffe614fa0 R15: 00007ffe9ec1d5a8 [ 523.563328][T11560] [ 523.627853][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 523.638081][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 523.647409][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 523.656481][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 523.706839][T11516] device veth0_vlan entered promiscuous mode [ 523.769327][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 523.783983][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 523.792469][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 523.800086][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 523.846313][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 523.860596][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 523.954792][T11516] device veth1_macvtap entered promiscuous mode [ 523.998450][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 524.015416][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 524.037399][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 525.739320][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 525.753458][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 525.949341][T11582] syz.0.3771[11582] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 525.949433][T11582] syz.0.3771[11582] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 526.757856][ T336] device bridge_slave_1 left promiscuous mode [ 526.837774][ T336] bridge0: port 2(bridge_slave_1) entered disabled state [ 526.851997][ T336] device bridge_slave_0 left promiscuous mode [ 526.858288][ T336] bridge0: port 1(bridge_slave_0) entered disabled state [ 526.866906][ T336] device veth1_macvtap left promiscuous mode [ 526.873045][ T336] device veth0_vlan left promiscuous mode [ 527.873757][T11598] device wg2 left promiscuous mode [ 527.886346][T11598] device wg2 entered promiscuous mode [ 527.930850][T11600] FAULT_INJECTION: forcing a failure. [ 527.930850][T11600] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 527.980227][T11600] CPU: 0 PID: 11600 Comm: syz.0.3767 Tainted: G W syzkaller #0 [ 527.989231][T11600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 527.999394][T11600] Call Trace: [ 528.002703][T11600] [ 528.005660][T11600] __dump_stack+0x21/0x30 [ 528.010027][T11600] dump_stack_lvl+0xee/0x150 [ 528.014636][T11600] ? show_regs_print_info+0x20/0x20 [ 528.019846][T11600] dump_stack+0x15/0x20 [ 528.024004][T11600] should_fail+0x3c1/0x510 [ 528.028427][T11600] should_fail_alloc_page+0x55/0x80 [ 528.033637][T11600] prepare_alloc_pages+0x156/0x600 [ 528.038884][T11600] ? __alloc_pages_bulk+0xab0/0xab0 [ 528.044197][T11600] ? __alloc_pages_bulk+0x47f/0xab0 [ 528.049415][T11600] __alloc_pages+0x10a/0x440 [ 528.054021][T11600] ? prep_new_page+0x110/0x110 [ 528.058796][T11600] ? __vmalloc_node_range+0x375/0xaf0 [ 528.064182][T11600] __vmalloc_node_range+0x505/0xaf0 [ 528.069391][T11600] bpf_map_area_alloc+0xd5/0xe0 [ 528.074253][T11600] ? htab_map_alloc+0xb29/0x14f0 [ 528.079195][T11600] htab_map_alloc+0xb29/0x14f0 [ 528.083966][T11600] map_create+0x455/0x21b0 [ 528.088390][T11600] __sys_bpf+0x2cf/0x730 [ 528.092662][T11600] ? bpf_link_show_fdinfo+0x310/0x310 [ 528.098043][T11600] ? debug_smp_processor_id+0x17/0x20 [ 528.103505][T11600] __x64_sys_bpf+0x7c/0x90 [ 528.107928][T11600] x64_sys_call+0x4b9/0x9a0 [ 528.112436][T11600] do_syscall_64+0x4c/0xa0 [ 528.116862][T11600] ? clear_bhb_loop+0x50/0xa0 [ 528.121742][T11600] ? clear_bhb_loop+0x50/0xa0 [ 528.126441][T11600] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 528.132345][T11600] RIP: 0033:0x7fc8e0c62749 [ 528.136770][T11600] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 528.156487][T11600] RSP: 002b:00007fc8df6ca038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 528.164916][T11600] RAX: ffffffffffffffda RBX: 00007fc8e0eb8fa0 RCX: 00007fc8e0c62749 [ 528.172913][T11600] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 528.181000][T11600] RBP: 00007fc8df6ca090 R08: 0000000000000000 R09: 0000000000000000 [ 528.188982][T11600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 528.196963][T11600] R13: 00007fc8e0eb9038 R14: 00007fc8e0eb8fa0 R15: 00007ffdb1454de8 [ 528.204948][T11600] [ 528.287405][T11617] syz.5.3773[11617] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 528.287487][T11617] syz.5.3773[11617] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 528.311270][T11619] FAULT_INJECTION: forcing a failure. [ 528.311270][T11619] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 528.336393][T11619] CPU: 1 PID: 11619 Comm: syz.0.3782 Tainted: G W syzkaller #0 [ 528.345270][T11619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 528.355346][T11619] Call Trace: [ 528.358623][T11619] [ 528.361548][T11619] __dump_stack+0x21/0x30 [ 528.365879][T11619] dump_stack_lvl+0xee/0x150 [ 528.370471][T11619] ? show_regs_print_info+0x20/0x20 [ 528.375684][T11619] dump_stack+0x15/0x20 [ 528.379847][T11619] should_fail+0x3c1/0x510 [ 528.384270][T11619] should_fail_alloc_page+0x55/0x80 [ 528.389913][T11619] prepare_alloc_pages+0x156/0x600 [ 528.395032][T11619] ? __alloc_pages_bulk+0xab0/0xab0 [ 528.400263][T11619] ? __alloc_pages_bulk+0x47f/0xab0 [ 528.405462][T11619] __alloc_pages+0x10a/0x440 [ 528.410053][T11619] ? prep_new_page+0x110/0x110 [ 528.414817][T11619] ? __vmalloc_node_range+0x375/0xaf0 [ 528.420194][T11619] __vmalloc_node_range+0x505/0xaf0 [ 528.425406][T11619] bpf_map_area_alloc+0xd5/0xe0 [ 528.430262][T11619] ? htab_map_alloc+0xb29/0x14f0 [ 528.435203][T11619] htab_map_alloc+0xb29/0x14f0 [ 528.439981][T11619] map_create+0x455/0x21b0 [ 528.444397][T11619] __sys_bpf+0x2cf/0x730 [ 528.448639][T11619] ? bpf_link_show_fdinfo+0x310/0x310 [ 528.454107][T11619] ? debug_smp_processor_id+0x17/0x20 [ 528.459483][T11619] __x64_sys_bpf+0x7c/0x90 [ 528.463909][T11619] x64_sys_call+0x4b9/0x9a0 [ 528.468423][T11619] do_syscall_64+0x4c/0xa0 [ 528.472838][T11619] ? clear_bhb_loop+0x50/0xa0 [ 528.477516][T11619] ? clear_bhb_loop+0x50/0xa0 [ 528.482247][T11619] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 528.488160][T11619] RIP: 0033:0x7fc8e0c62749 [ 528.492577][T11619] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 528.512197][T11619] RSP: 002b:00007fc8df6ca038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 528.520648][T11619] RAX: ffffffffffffffda RBX: 00007fc8e0eb8fa0 RCX: 00007fc8e0c62749 [ 528.528620][T11619] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 528.536590][T11619] RBP: 00007fc8df6ca090 R08: 0000000000000000 R09: 0000000000000000 [ 528.544569][T11619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 528.552540][T11619] R13: 00007fc8e0eb9038 R14: 00007fc8e0eb8fa0 R15: 00007ffdb1454de8 [ 528.560523][T11619] [ 528.576944][T11601] bridge0: port 1(bridge_slave_0) entered blocking state [ 528.584069][T11601] bridge0: port 1(bridge_slave_0) entered disabled state [ 528.601739][T11601] device bridge_slave_0 entered promiscuous mode [ 528.608924][T11601] bridge0: port 2(bridge_slave_1) entered blocking state [ 528.619173][T11601] bridge0: port 2(bridge_slave_1) entered disabled state [ 528.627491][T11601] device bridge_slave_1 entered promiscuous mode [ 528.922287][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 528.934849][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 528.980911][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 528.993746][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 529.002893][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 529.010021][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 529.018994][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 529.053976][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 529.065604][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 529.072721][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 529.101224][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 529.150631][T11648] device wg2 left promiscuous mode [ 529.160727][T11650] device wg2 entered promiscuous mode [ 529.194980][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 529.218870][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 529.270047][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 529.320679][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 529.376162][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 529.474039][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 529.531834][T11601] device veth0_vlan entered promiscuous mode [ 529.547292][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 529.560865][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 529.621656][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 529.669569][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 529.697609][T11666] FAULT_INJECTION: forcing a failure. [ 529.697609][T11666] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 529.705642][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 529.720146][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 529.721392][T11666] CPU: 1 PID: 11666 Comm: syz.1.3788 Tainted: G W syzkaller #0 [ 529.737165][T11666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 529.747221][T11666] Call Trace: [ 529.750508][T11666] [ 529.753438][T11666] __dump_stack+0x21/0x30 [ 529.757778][T11666] dump_stack_lvl+0xee/0x150 [ 529.762384][T11666] ? show_regs_print_info+0x20/0x20 [ 529.767772][T11666] dump_stack+0x15/0x20 [ 529.772036][T11666] should_fail+0x3c1/0x510 [ 529.776452][T11666] should_fail_alloc_page+0x55/0x80 [ 529.782319][T11666] prepare_alloc_pages+0x156/0x600 [ 529.787458][T11666] ? __alloc_pages_bulk+0xab0/0xab0 [ 529.792659][T11666] ? __alloc_pages_bulk+0x47f/0xab0 [ 529.797211][T11601] device veth1_macvtap entered promiscuous mode [ 529.797886][T11666] __alloc_pages+0x10a/0x440 [ 529.808904][T11666] ? prep_new_page+0x110/0x110 [ 529.813688][T11666] ? __vmalloc_node_range+0x375/0xaf0 [ 529.819083][T11666] __vmalloc_node_range+0x505/0xaf0 [ 529.824339][T11666] bpf_map_area_alloc+0xd5/0xe0 [ 529.829250][T11666] ? htab_map_alloc+0xb29/0x14f0 [ 529.834198][T11666] htab_map_alloc+0xb29/0x14f0 [ 529.838978][T11666] map_create+0x455/0x21b0 [ 529.843408][T11666] __sys_bpf+0x2cf/0x730 [ 529.847738][T11666] ? bpf_link_show_fdinfo+0x310/0x310 [ 529.853209][T11666] ? debug_smp_processor_id+0x17/0x20 [ 529.858585][T11666] __x64_sys_bpf+0x7c/0x90 [ 529.862999][T11666] x64_sys_call+0x4b9/0x9a0 [ 529.867508][T11666] do_syscall_64+0x4c/0xa0 [ 529.871924][T11666] ? clear_bhb_loop+0x50/0xa0 [ 529.876602][T11666] ? clear_bhb_loop+0x50/0xa0 [ 529.881322][T11666] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 529.888304][T11666] RIP: 0033:0x7f42012fd749 [ 529.892722][T11666] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 529.912347][T11666] RSP: 002b:00007f41ffd65038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 529.920807][T11666] RAX: ffffffffffffffda RBX: 00007f4201553fa0 RCX: 00007f42012fd749 [ 529.928794][T11666] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 529.936877][T11666] RBP: 00007f41ffd65090 R08: 0000000000000000 R09: 0000000000000000 [ 529.944857][T11666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 529.952836][T11666] R13: 00007f4201554038 R14: 00007f4201553fa0 R15: 00007ffe36c49958 [ 529.960815][T11666] [ 530.137353][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 530.146233][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 530.154994][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 530.163702][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 530.172398][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 530.230322][T11673] device syzkaller0 entered promiscuous mode [ 530.403982][T11679] syz.5.3793[11679] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 530.404083][T11679] syz.5.3793[11679] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 531.271000][ T8] device bridge_slave_1 left promiscuous mode [ 531.288713][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 531.296452][ T8] device bridge_slave_0 left promiscuous mode [ 531.302697][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 531.311401][ T8] device veth1_macvtap left promiscuous mode [ 531.317533][ T8] device veth0_vlan left promiscuous mode [ 532.319204][T11694] syz.0.3799[11694] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 532.321309][T11694] syz.0.3799[11694] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 532.357366][T11702] FAULT_INJECTION: forcing a failure. [ 532.357366][T11702] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 532.417065][T11702] CPU: 1 PID: 11702 Comm: syz.5.3802 Tainted: G W syzkaller #0 [ 532.426009][T11702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 532.436191][T11702] Call Trace: [ 532.439488][T11702] [ 532.442447][T11702] __dump_stack+0x21/0x30 [ 532.446793][T11702] dump_stack_lvl+0xee/0x150 [ 532.451395][T11702] ? show_regs_print_info+0x20/0x20 [ 532.456626][T11702] dump_stack+0x15/0x20 [ 532.460809][T11702] should_fail+0x3c1/0x510 [ 532.465254][T11702] should_fail_alloc_page+0x55/0x80 [ 532.470482][T11702] prepare_alloc_pages+0x156/0x600 [ 532.475620][T11702] ? __alloc_pages_bulk+0xab0/0xab0 [ 532.480900][T11702] ? __alloc_pages_bulk+0x47f/0xab0 [ 532.486127][T11702] __alloc_pages+0x10a/0x440 [ 532.490753][T11702] ? prep_new_page+0x110/0x110 [ 532.495544][T11702] ? __vmalloc_node_range+0x375/0xaf0 [ 532.500931][T11702] __vmalloc_node_range+0x505/0xaf0 [ 532.506172][T11702] bpf_map_area_alloc+0xd5/0xe0 [ 532.511044][T11702] ? htab_map_alloc+0xb29/0x14f0 [ 532.515998][T11702] htab_map_alloc+0xb29/0x14f0 [ 532.520801][T11702] map_create+0x455/0x21b0 [ 532.525235][T11702] __sys_bpf+0x2cf/0x730 [ 532.529495][T11702] ? bpf_link_show_fdinfo+0x310/0x310 [ 532.534894][T11702] ? debug_smp_processor_id+0x17/0x20 [ 532.540285][T11702] __x64_sys_bpf+0x7c/0x90 [ 532.544727][T11702] x64_sys_call+0x4b9/0x9a0 [ 532.549248][T11702] do_syscall_64+0x4c/0xa0 [ 532.553683][T11702] ? clear_bhb_loop+0x50/0xa0 [ 532.558484][T11702] ? clear_bhb_loop+0x50/0xa0 [ 532.563184][T11702] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 532.569268][T11702] RIP: 0033:0x7f1ffe3be749 [ 532.573695][T11702] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 532.593330][T11702] RSP: 002b:00007f1ffce26038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 532.601851][T11702] RAX: ffffffffffffffda RBX: 00007f1ffe614fa0 RCX: 00007f1ffe3be749 [ 532.609839][T11702] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 532.617834][T11702] RBP: 00007f1ffce26090 R08: 0000000000000000 R09: 0000000000000000 [ 532.625827][T11702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 532.633818][T11702] R13: 00007f1ffe615038 R14: 00007f1ffe614fa0 R15: 00007ffe9ec1d5a8 [ 532.641811][T11702] [ 532.650097][T11711] device veth1_macvtap left promiscuous mode [ 532.656887][T11711] device macsec0 left promiscuous mode [ 532.669517][T11697] bridge0: port 1(bridge_slave_0) entered blocking state [ 532.676657][T11697] bridge0: port 1(bridge_slave_0) entered disabled state [ 532.687376][T11697] device bridge_slave_0 entered promiscuous mode [ 532.695215][T11697] bridge0: port 2(bridge_slave_1) entered blocking state [ 532.702675][T11697] bridge0: port 2(bridge_slave_1) entered disabled state [ 532.710436][T11697] device bridge_slave_1 entered promiscuous mode [ 533.049333][T11697] bridge0: port 2(bridge_slave_1) entered blocking state [ 533.056449][T11697] bridge0: port 2(bridge_slave_1) entered forwarding state [ 533.063792][T11697] bridge0: port 1(bridge_slave_0) entered blocking state [ 533.070861][T11697] bridge0: port 1(bridge_slave_0) entered forwarding state [ 533.191234][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 533.199926][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 533.209799][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 533.409488][T11751] device veth0_vlan left promiscuous mode [ 533.444797][T11751] device veth0_vlan entered promiscuous mode [ 533.607782][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 533.628724][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 533.675495][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 533.683851][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 533.731510][T11760] FAULT_INJECTION: forcing a failure. [ 533.731510][T11760] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 533.744902][T11760] CPU: 1 PID: 11760 Comm: syz.0.3819 Tainted: G W syzkaller #0 [ 533.753779][T11760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 533.760093][T11755] device syzkaller0 entered promiscuous mode [ 533.763885][T11760] Call Trace: [ 533.763894][T11760] [ 533.763903][T11760] __dump_stack+0x21/0x30 [ 533.780413][T11760] dump_stack_lvl+0xee/0x150 [ 533.785000][T11760] ? show_regs_print_info+0x20/0x20 [ 533.790205][T11760] dump_stack+0x15/0x20 [ 533.794373][T11760] should_fail+0x3c1/0x510 [ 533.798798][T11760] should_fail_alloc_page+0x55/0x80 [ 533.804004][T11760] prepare_alloc_pages+0x156/0x600 [ 533.809120][T11760] ? __alloc_pages_bulk+0xab0/0xab0 [ 533.814362][T11760] ? __alloc_pages_bulk+0x47f/0xab0 [ 533.819560][T11760] __alloc_pages+0x10a/0x440 [ 533.824154][T11760] ? prep_new_page+0x110/0x110 [ 533.828927][T11760] ? __vmalloc_node_range+0x375/0xaf0 [ 533.834304][T11760] __vmalloc_node_range+0x505/0xaf0 [ 533.839506][T11760] bpf_map_area_alloc+0xd5/0xe0 [ 533.844362][T11760] ? htab_map_alloc+0xb29/0x14f0 [ 533.849471][T11760] htab_map_alloc+0xb29/0x14f0 [ 533.854337][T11760] map_create+0x455/0x21b0 [ 533.858754][T11760] __sys_bpf+0x2cf/0x730 [ 533.862997][T11760] ? bpf_link_show_fdinfo+0x310/0x310 [ 533.868372][T11760] ? debug_smp_processor_id+0x17/0x20 [ 533.873764][T11760] __x64_sys_bpf+0x7c/0x90 [ 533.878182][T11760] x64_sys_call+0x4b9/0x9a0 [ 533.882693][T11760] do_syscall_64+0x4c/0xa0 [ 533.887131][T11760] ? clear_bhb_loop+0x50/0xa0 [ 533.891811][T11760] ? clear_bhb_loop+0x50/0xa0 [ 533.896497][T11760] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 533.902405][T11760] RIP: 0033:0x7fc8e0c62749 [ 533.906911][T11760] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 533.926523][T11760] RSP: 002b:00007fc8df6ca038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 533.934942][T11760] RAX: ffffffffffffffda RBX: 00007fc8e0eb8fa0 RCX: 00007fc8e0c62749 [ 533.942949][T11760] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 533.950937][T11760] RBP: 00007fc8df6ca090 R08: 0000000000000000 R09: 0000000000000000 [ 533.958943][T11760] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 533.966921][T11760] R13: 00007fc8e0eb9038 R14: 00007fc8e0eb8fa0 R15: 00007ffdb1454de8 [ 533.974910][T11760] [ 534.070234][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 534.080098][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 534.089621][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 534.097674][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 534.108827][T11697] device veth0_vlan entered promiscuous mode [ 534.127030][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 534.135619][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 534.163092][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 534.201152][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 534.218046][T11697] device veth1_macvtap entered promiscuous mode [ 534.225490][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 534.245088][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 534.283947][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 534.297979][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 534.308131][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 534.478117][T11787] device wg2 left promiscuous mode [ 534.489087][T11787] device wg2 entered promiscuous mode [ 535.111378][ T8] device bridge_slave_1 left promiscuous mode [ 535.117514][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 535.125484][ T8] device bridge_slave_0 left promiscuous mode [ 535.131713][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 535.139942][ T8] device veth1_macvtap left promiscuous mode [ 535.146048][ T8] device veth0_vlan left promiscuous mode [ 536.397782][T11803] FAULT_INJECTION: forcing a failure. [ 536.397782][T11803] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 536.422612][T11796] device veth1_macvtap entered promiscuous mode [ 536.440212][T11796] device macsec0 entered promiscuous mode [ 536.450858][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 536.513458][T11803] CPU: 0 PID: 11803 Comm: syz.2.3833 Tainted: G W syzkaller #0 [ 536.522361][T11803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 536.532552][T11803] Call Trace: [ 536.535859][T11803] [ 536.538808][T11803] __dump_stack+0x21/0x30 [ 536.543167][T11803] dump_stack_lvl+0xee/0x150 [ 536.547782][T11803] ? show_regs_print_info+0x20/0x20 [ 536.553016][T11803] dump_stack+0x15/0x20 [ 536.557191][T11803] should_fail+0x3c1/0x510 [ 536.561624][T11803] should_fail_alloc_page+0x55/0x80 [ 536.566859][T11803] prepare_alloc_pages+0x156/0x600 [ 536.572202][T11803] ? __alloc_pages_bulk+0xab0/0xab0 [ 536.577671][T11803] ? __alloc_pages_bulk+0x47f/0xab0 [ 536.582901][T11803] __alloc_pages+0x10a/0x440 [ 536.587525][T11803] ? prep_new_page+0x110/0x110 [ 536.592354][T11803] ? __vmalloc_node_range+0x375/0xaf0 [ 536.597836][T11803] __vmalloc_node_range+0x505/0xaf0 [ 536.603049][T11803] bpf_map_area_alloc+0xd5/0xe0 [ 536.607910][T11803] ? htab_map_alloc+0xb29/0x14f0 [ 536.612859][T11803] htab_map_alloc+0xb29/0x14f0 [ 536.617633][T11803] map_create+0x455/0x21b0 [ 536.622078][T11803] __sys_bpf+0x2cf/0x730 [ 536.626326][T11803] ? bpf_link_show_fdinfo+0x310/0x310 [ 536.631721][T11803] ? debug_smp_processor_id+0x17/0x20 [ 536.637101][T11803] __x64_sys_bpf+0x7c/0x90 [ 536.641522][T11803] x64_sys_call+0x4b9/0x9a0 [ 536.646033][T11803] do_syscall_64+0x4c/0xa0 [ 536.650715][T11803] ? clear_bhb_loop+0x50/0xa0 [ 536.655650][T11803] ? clear_bhb_loop+0x50/0xa0 [ 536.660412][T11803] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 536.666449][T11803] RIP: 0033:0x7f53a16d2749 [ 536.671147][T11803] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 536.690774][T11803] RSP: 002b:00007f53a013a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 536.699203][T11803] RAX: ffffffffffffffda RBX: 00007f53a1928fa0 RCX: 00007f53a16d2749 [ 536.707313][T11803] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 536.715301][T11803] RBP: 00007f53a013a090 R08: 0000000000000000 R09: 0000000000000000 [ 536.723281][T11803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 536.731254][T11803] R13: 00007f53a1929038 R14: 00007f53a1928fa0 R15: 00007fff96138528 [ 536.739273][T11803] [ 536.818872][T11804] bridge0: port 1(bridge_slave_0) entered blocking state [ 536.826127][T11804] bridge0: port 1(bridge_slave_0) entered disabled state [ 536.833707][T11804] device bridge_slave_0 entered promiscuous mode [ 536.845680][T11804] bridge0: port 2(bridge_slave_1) entered blocking state [ 536.871624][T11827] FAULT_INJECTION: forcing a failure. [ 536.871624][T11827] name failslab, interval 1, probability 0, space 0, times 0 [ 536.884260][T11827] CPU: 1 PID: 11827 Comm: syz.2.3841 Tainted: G W syzkaller #0 [ 536.893239][T11827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 536.903330][T11827] Call Trace: [ 536.906664][T11827] [ 536.909645][T11827] __dump_stack+0x21/0x30 [ 536.913997][T11827] dump_stack_lvl+0xee/0x150 [ 536.918654][T11827] ? show_regs_print_info+0x20/0x20 [ 536.924137][T11827] ? do_sys_openat2+0x6a7/0x7b0 [ 536.929107][T11827] ? x64_sys_call+0x219/0x9a0 [ 536.933806][T11827] dump_stack+0x15/0x20 [ 536.937987][T11827] should_fail+0x3c1/0x510 [ 536.942435][T11827] __should_failslab+0xa4/0xe0 [ 536.947221][T11827] should_failslab+0x9/0x20 [ 536.951746][T11827] slab_pre_alloc_hook+0x3b/0xe0 [ 536.956713][T11827] ? __sigqueue_alloc+0x137/0x210 [ 536.961761][T11827] kmem_cache_alloc+0x44/0x260 [ 536.966542][T11827] __sigqueue_alloc+0x137/0x210 [ 536.971688][T11827] __send_signal+0x212/0xc30 [ 536.976304][T11827] send_signal+0x422/0x580 [ 536.980747][T11827] force_sig_info_to_task+0x31c/0x3f0 [ 536.986145][T11827] force_sig+0xb7/0x100 [ 536.990335][T11827] ? send_sig+0x70/0x70 [ 536.994511][T11827] ? show_signal+0x1b0/0x1b0 [ 536.999113][T11827] ? ksys_write+0x1eb/0x240 [ 537.003637][T11827] ? __ia32_sys_read+0x90/0x90 [ 537.008413][T11827] exc_general_protection+0xee/0x270 [ 537.013719][T11827] ? debug_smp_processor_id+0x17/0x20 [ 537.019109][T11827] ? do_syscall_64+0x58/0xa0 [ 537.023720][T11827] asm_exc_general_protection+0x27/0x30 [ 537.029286][T11827] RIP: 0033:0x7f53a16ab179 [ 537.033719][T11827] Code: f8 77 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 0f 00 00 0f 87 27 01 00 00 fd 74 0f c5 fd d7 c1 85 c0 74 5b f3 0f bc c0 e9 30 01 00 00 66 [ 537.053341][T11827] RSP: 002b:00007f53a01397c8 EFLAGS: 00010283 [ 537.059435][T11827] RAX: 0000000000000999 RBX: 00007f53a0139d30 RCX: 00007f53a18ee120 [ 537.067428][T11827] RDX: 9999999999999999 RSI: 00007f53a1756ca9 RDI: 9999999999999999 [ 537.075437][T11827] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 537.083449][T11827] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 537.091554][T11827] R13: 00007f53a0139eb0 R14: 9999999999999999 R15: 0000000000000000 [ 537.099844][T11827] [ 537.108748][T11804] bridge0: port 2(bridge_slave_1) entered disabled state [ 537.130750][T11804] device bridge_slave_1 entered promiscuous mode [ 537.613609][T11861] FAULT_INJECTION: forcing a failure. [ 537.613609][T11861] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 537.641362][T11861] CPU: 1 PID: 11861 Comm: syz.2.3852 Tainted: G W syzkaller #0 [ 537.650291][T11861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 537.660372][T11861] Call Trace: [ 537.663674][T11861] [ 537.666628][T11861] __dump_stack+0x21/0x30 [ 537.670989][T11861] dump_stack_lvl+0xee/0x150 [ 537.675696][T11861] ? show_regs_print_info+0x20/0x20 [ 537.680940][T11861] ? __this_cpu_preempt_check+0x13/0x20 [ 537.686515][T11861] ? tracing_record_taskinfo+0x7c/0x220 [ 537.692101][T11861] dump_stack+0x15/0x20 [ 537.696289][T11861] should_fail+0x3c1/0x510 [ 537.700741][T11861] should_fail_alloc_page+0x55/0x80 [ 537.705971][T11861] prepare_alloc_pages+0x156/0x600 [ 537.711111][T11861] ? __alloc_pages_bulk+0xab0/0xab0 [ 537.716339][T11861] ? _find_next_bit+0x1fa/0x200 [ 537.721369][T11861] __alloc_pages+0x10a/0x440 [ 537.726014][T11861] ? prep_new_page+0x110/0x110 [ 537.730824][T11861] pcpu_populate_chunk+0x184/0xcb0 [ 537.735968][T11861] ? _find_next_bit+0x106/0x200 [ 537.740850][T11861] pcpu_alloc+0xc4d/0x1660 [ 537.745299][T11861] __alloc_percpu_gfp+0x25/0x30 [ 537.750178][T11861] bpf_map_alloc_percpu+0xc5/0x150 [ 537.755322][T11861] htab_map_alloc+0xc1b/0x14f0 [ 537.760120][T11861] map_create+0x455/0x21b0 [ 537.764589][T11861] __sys_bpf+0x2cf/0x730 [ 537.768840][T11861] ? bpf_link_show_fdinfo+0x310/0x310 [ 537.774220][T11861] ? debug_smp_processor_id+0x17/0x20 [ 537.779597][T11861] __x64_sys_bpf+0x7c/0x90 [ 537.784019][T11861] x64_sys_call+0x4b9/0x9a0 [ 537.788625][T11861] do_syscall_64+0x4c/0xa0 [ 537.793042][T11861] ? clear_bhb_loop+0x50/0xa0 [ 537.797718][T11861] ? clear_bhb_loop+0x50/0xa0 [ 537.802392][T11861] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 537.808470][T11861] RIP: 0033:0x7f53a16d2749 [ 537.812931][T11861] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 537.832726][T11861] RSP: 002b:00007f53a013a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 537.841143][T11861] RAX: ffffffffffffffda RBX: 00007f53a1928fa0 RCX: 00007f53a16d2749 [ 537.849117][T11861] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 537.857090][T11861] RBP: 00007f53a013a090 R08: 0000000000000000 R09: 0000000000000000 [ 537.865084][T11861] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 537.873060][T11861] R13: 00007f53a1929038 R14: 00007f53a1928fa0 R15: 00007fff96138528 [ 537.881045][T11861] [ 538.127798][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 538.136018][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 538.214586][T11875] device wg2 left promiscuous mode [ 538.232645][T11880] FAULT_INJECTION: forcing a failure. [ 538.232645][T11880] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 538.246753][T11875] device wg2 entered promiscuous mode [ 538.270270][T11880] CPU: 0 PID: 11880 Comm: syz.0.3859 Tainted: G W syzkaller #0 [ 538.279175][T11880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 538.289239][T11880] Call Trace: [ 538.292526][T11880] [ 538.295546][T11880] __dump_stack+0x21/0x30 [ 538.299914][T11880] dump_stack_lvl+0xee/0x150 [ 538.304515][T11880] ? show_regs_print_info+0x20/0x20 [ 538.309751][T11880] dump_stack+0x15/0x20 [ 538.313911][T11880] should_fail+0x3c1/0x510 [ 538.318330][T11880] should_fail_usercopy+0x1a/0x20 [ 538.323536][T11880] copy_fpstate_to_sigframe+0x6d4/0x9a0 [ 538.329090][T11880] ? fpregs_set+0x540/0x540 [ 538.333596][T11880] ? get_signal+0x13da/0x1480 [ 538.338278][T11880] ? fpu__alloc_mathframe+0x88/0x150 [ 538.343566][T11880] arch_do_signal_or_restart+0x5e3/0x10f0 [ 538.349300][T11880] ? __send_signal+0x8f6/0xc30 [ 538.354069][T11880] ? send_signal+0x422/0x580 [ 538.358738][T11880] ? get_sigframe_size+0x10/0x10 [ 538.363690][T11880] ? force_sig_info_to_task+0x344/0x3f0 [ 538.369241][T11880] ? force_sig+0xb7/0x100 [ 538.373573][T11880] ? send_sig+0x70/0x70 [ 538.377729][T11880] exit_to_user_mode_loop+0xa7/0xe0 [ 538.382943][T11880] exit_to_user_mode_prepare+0x87/0xd0 [ 538.388510][T11880] irqentry_exit_to_user_mode+0x9/0x10 [ 538.393990][T11880] irqentry_exit+0x12/0x40 [ 538.398414][T11880] exc_general_protection+0x1e4/0x270 [ 538.403929][T11880] ? debug_smp_processor_id+0x17/0x20 [ 538.409328][T11880] ? do_syscall_64+0x58/0xa0 [ 538.413928][T11880] asm_exc_general_protection+0x27/0x30 [ 538.419480][T11880] RIP: 0033:0x7fc8e0c3b179 [ 538.423919][T11880] Code: f8 77 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 0f 00 00 0f 87 27 01 00 00 fd 74 0f c5 fd d7 c1 85 c0 74 5b f3 0f bc c0 e9 30 01 00 00 66 [ 538.443578][T11880] RSP: 002b:00007fc8df6c97c8 EFLAGS: 00010283 [ 538.449657][T11880] RAX: 0000000000000999 RBX: 00007fc8df6c9d30 RCX: 00007fc8e0e7e120 [ 538.457644][T11880] RDX: 9999999999999999 RSI: 00007fc8e0ce6ca9 RDI: 9999999999999999 [ 538.465652][T11880] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 538.473625][T11880] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 538.481869][T11880] R13: 00007fc8df6c9eb0 R14: 9999999999999999 R15: 0000000000000000 [ 538.489848][T11880] [ 538.493127][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 538.509840][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 538.530054][ T1156] bridge0: port 1(bridge_slave_0) entered blocking state [ 538.537267][ T1156] bridge0: port 1(bridge_slave_0) entered forwarding state [ 538.559290][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 538.567958][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 538.576466][ T1156] bridge0: port 2(bridge_slave_1) entered blocking state [ 538.583553][ T1156] bridge0: port 2(bridge_slave_1) entered forwarding state [ 538.591610][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 538.600680][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 538.608837][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 538.617255][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 538.625815][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 538.777127][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 538.807330][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 538.832686][T11895] FAULT_INJECTION: forcing a failure. [ 538.832686][T11895] name failslab, interval 1, probability 0, space 0, times 0 [ 538.845461][T11895] CPU: 0 PID: 11895 Comm: syz.2.3864 Tainted: G W syzkaller #0 [ 538.854427][T11895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 538.864680][T11895] Call Trace: [ 538.867984][T11895] [ 538.870935][T11895] __dump_stack+0x21/0x30 [ 538.875293][T11895] dump_stack_lvl+0xee/0x150 [ 538.879907][T11895] ? show_regs_print_info+0x20/0x20 [ 538.885133][T11895] dump_stack+0x15/0x20 [ 538.889315][T11895] should_fail+0x3c1/0x510 [ 538.893753][T11895] ? ip_frag_next+0xd7/0xab0 [ 538.898372][T11895] __should_failslab+0xa4/0xe0 [ 538.903159][T11895] should_failslab+0x9/0x20 [ 538.907779][T11895] slab_pre_alloc_hook+0x3b/0xe0 [ 538.912750][T11895] ? ip_frag_next+0xd7/0xab0 [ 538.917365][T11895] ? ip_frag_next+0xd7/0xab0 [ 538.919204][T11804] device veth0_vlan entered promiscuous mode [ 538.922107][T11895] __kmalloc_track_caller+0x6c/0x2c0 [ 538.922135][T11895] ? ip_frag_next+0xd7/0xab0 [ 538.938118][T11895] ? ip_frag_next+0xd7/0xab0 [ 538.942741][T11895] __alloc_skb+0x21a/0x740 [ 538.947191][T11895] ip_frag_next+0xd7/0xab0 [ 538.951634][T11895] ip_do_fragment+0x811/0x1ca0 [ 538.956508][T11895] ? ip_fragment+0x250/0x250 [ 538.961117][T11895] ip_fragment+0x152/0x250 [ 538.965661][T11895] __ip_finish_output+0x236/0x360 [ 538.970786][T11895] ip_finish_output+0x31/0x240 [ 538.975553][T11895] ? ip_output+0x31d/0x360 [ 538.979976][T11895] ip_output+0x1e1/0x360 [ 538.984217][T11895] ? ip_finish_output+0x240/0x240 [ 538.989242][T11895] ? ip_mc_finish_output+0x400/0x400 [ 538.994533][T11895] ? prandom_u32+0x24d/0x290 [ 538.999130][T11895] ip_local_out+0x96/0xb0 [ 539.003546][T11895] iptunnel_xmit+0x4db/0x8f0 [ 539.008191][T11895] ip_tunnel_xmit+0x1a2b/0x21c0 [ 539.013225][T11895] ? ip4_dst_hoplimit+0x110/0x110 [ 539.018249][T11895] ? skb_network_protocol+0x501/0x740 [ 539.023795][T11895] ? gre_build_header+0x229/0x850 [ 539.028829][T11895] ipgre_xmit+0x7c0/0xb30 [ 539.033163][T11895] dev_hard_start_xmit+0x244/0x670 [ 539.038281][T11895] __dev_queue_xmit+0x17bd/0x2d80 [ 539.043307][T11895] ? dev_queue_xmit+0x20/0x20 [ 539.047983][T11895] ? __kasan_check_write+0x14/0x20 [ 539.053097][T11895] ? skb_release_data+0x1c6/0xa10 [ 539.058129][T11895] ? __kasan_check_write+0x14/0x20 [ 539.063477][T11895] ? pskb_expand_head+0xbe6/0x11d0 [ 539.069164][T11895] dev_queue_xmit+0x17/0x20 [ 539.073685][T11895] __bpf_redirect+0x68a/0xe60 [ 539.078459][T11895] bpf_clone_redirect+0x242/0x380 [ 539.083502][T11895] bpf_prog_208b094576c80b22+0x56/0x9a4 [ 539.089051][T11895] ? __kasan_slab_alloc+0xcf/0xf0 [ 539.094079][T11895] ? __kasan_slab_alloc+0xbd/0xf0 [ 539.099121][T11895] ? slab_post_alloc_hook+0x4f/0x2b0 [ 539.104466][T11895] ? kmem_cache_alloc+0xf7/0x260 [ 539.109492][T11895] ? __build_skb+0x2d/0x310 [ 539.113994][T11895] ? build_skb+0x24/0x200 [ 539.118329][T11895] ? bpf_prog_test_run_skb+0x279/0x1150 [ 539.123878][T11895] ? bpf_prog_test_run+0x3d5/0x620 [ 539.128997][T11895] ? __sys_bpf+0x52c/0x730 [ 539.133412][T11895] ? __x64_sys_bpf+0x7c/0x90 [ 539.138176][T11895] ? x64_sys_call+0x4b9/0x9a0 [ 539.143286][T11895] ? do_syscall_64+0x4c/0xa0 [ 539.147880][T11895] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 539.153963][T11895] ? ktime_get+0x12f/0x160 [ 539.158385][T11895] bpf_test_run+0x33d/0x8d0 [ 539.162900][T11895] ? convert___skb_to_skb+0x4f0/0x4f0 [ 539.168280][T11895] ? eth_get_headlen+0x1f0/0x1f0 [ 539.173220][T11895] ? convert___skb_to_skb+0x41/0x4f0 [ 539.178524][T11895] bpf_prog_test_run_skb+0x9ec/0x1150 [ 539.183902][T11895] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 539.189911][T11895] bpf_prog_test_run+0x3d5/0x620 [ 539.195005][T11895] ? bpf_prog_query+0x230/0x230 [ 539.199871][T11895] ? selinux_bpf+0xce/0xf0 [ 539.204300][T11895] ? security_bpf+0x82/0xa0 [ 539.208853][T11895] __sys_bpf+0x52c/0x730 [ 539.213119][T11895] ? bpf_link_show_fdinfo+0x310/0x310 [ 539.218498][T11895] ? debug_smp_processor_id+0x17/0x20 [ 539.223890][T11895] __x64_sys_bpf+0x7c/0x90 [ 539.228312][T11895] x64_sys_call+0x4b9/0x9a0 [ 539.232819][T11895] do_syscall_64+0x4c/0xa0 [ 539.237241][T11895] ? clear_bhb_loop+0x50/0xa0 [ 539.241915][T11895] ? clear_bhb_loop+0x50/0xa0 [ 539.246596][T11895] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 539.252508][T11895] RIP: 0033:0x7f53a16d2749 [ 539.256931][T11895] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 539.276541][T11895] RSP: 002b:00007f53a013a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 539.285047][T11895] RAX: ffffffffffffffda RBX: 00007f53a1928fa0 RCX: 00007f53a16d2749 [ 539.293020][T11895] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 539.300994][T11895] RBP: 00007f53a013a090 R08: 0000000000000000 R09: 0000000000000000 [ 539.308969][T11895] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 539.317025][T11895] R13: 00007f53a1929038 R14: 00007f53a1928fa0 R15: 00007fff96138528 [ 539.325019][T11895] [ 539.337612][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 539.350576][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 539.358926][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 539.367904][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 539.380473][T11804] device veth1_macvtap entered promiscuous mode [ 539.388506][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 539.401438][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 539.410141][T11897] FAULT_INJECTION: forcing a failure. [ 539.410141][T11897] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 539.430270][T11897] CPU: 1 PID: 11897 Comm: syz.5.3866 Tainted: G W syzkaller #0 [ 539.439174][T11897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 539.440517][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 539.449251][T11897] Call Trace: [ 539.449261][T11897] [ 539.462865][T11897] __dump_stack+0x21/0x30 [ 539.467218][T11897] dump_stack_lvl+0xee/0x150 [ 539.471833][T11897] ? show_regs_print_info+0x20/0x20 [ 539.477061][T11897] ? get_page_from_freelist+0x2cc5/0x2d50 [ 539.482795][T11897] dump_stack+0x15/0x20 [ 539.486953][T11897] should_fail+0x3c1/0x510 [ 539.491369][T11897] should_fail_alloc_page+0x55/0x80 [ 539.496606][T11897] prepare_alloc_pages+0x156/0x600 [ 539.501844][T11897] ? __alloc_pages_bulk+0xab0/0xab0 [ 539.507067][T11897] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 539.512737][T11897] __alloc_pages+0x10a/0x440 [ 539.517353][T11897] ? prep_new_page+0x110/0x110 [ 539.522177][T11897] pcpu_populate_chunk+0x184/0xcb0 [ 539.527332][T11897] ? _find_next_bit+0x1b5/0x200 [ 539.532203][T11897] pcpu_alloc+0xc4d/0x1660 [ 539.536645][T11897] __alloc_percpu_gfp+0x25/0x30 [ 539.541518][T11897] bpf_map_alloc_percpu+0xc5/0x150 [ 539.546646][T11897] htab_map_alloc+0xc1b/0x14f0 [ 539.551437][T11897] map_create+0x455/0x21b0 [ 539.555881][T11897] __sys_bpf+0x2cf/0x730 [ 539.560268][T11897] ? bpf_link_show_fdinfo+0x310/0x310 [ 539.565847][T11897] ? debug_smp_processor_id+0x17/0x20 [ 539.571358][T11897] __x64_sys_bpf+0x7c/0x90 [ 539.575800][T11897] x64_sys_call+0x4b9/0x9a0 [ 539.580324][T11897] do_syscall_64+0x4c/0xa0 [ 539.584765][T11897] ? clear_bhb_loop+0x50/0xa0 [ 539.589467][T11897] ? clear_bhb_loop+0x50/0xa0 [ 539.594167][T11897] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 539.600255][T11897] RIP: 0033:0x7f1ffe3be749 [ 539.604695][T11897] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 539.624519][T11897] RSP: 002b:00007f1ffce26038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 539.632946][T11897] RAX: ffffffffffffffda RBX: 00007f1ffe614fa0 RCX: 00007f1ffe3be749 [ 539.641451][T11897] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 539.649964][T11897] RBP: 00007f1ffce26090 R08: 0000000000000000 R09: 0000000000000000 [ 539.658095][T11897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 539.666106][T11897] R13: 00007f1ffe615038 R14: 00007f1ffe614fa0 R15: 00007ffe9ec1d5a8 [ 539.674116][T11897] [ 539.695081][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 539.704741][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 539.732427][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 539.833143][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 541.441130][ T8] device bridge_slave_1 left promiscuous mode [ 541.447438][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 541.455150][ T8] device bridge_slave_0 left promiscuous mode [ 541.461414][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 541.469864][ T8] device veth1_macvtap left promiscuous mode [ 541.476043][ T8] device veth0_vlan left promiscuous mode [ 542.533992][T11933] ªªªªªª: renamed from vlan0 [ 542.545610][T11935] device wg2 left promiscuous mode [ 542.589994][T11938] FAULT_INJECTION: forcing a failure. [ 542.589994][T11938] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 542.605523][T11938] CPU: 0 PID: 11938 Comm: syz.5.3879 Tainted: G W syzkaller #0 [ 542.614418][T11938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 542.624503][T11938] Call Trace: [ 542.627798][T11938] [ 542.630829][T11938] __dump_stack+0x21/0x30 [ 542.635185][T11938] dump_stack_lvl+0xee/0x150 [ 542.639786][T11938] ? show_regs_print_info+0x20/0x20 [ 542.644993][T11938] ? perf_sched_cb_inc+0x240/0x240 [ 542.650250][T11938] dump_stack+0x15/0x20 [ 542.654616][T11938] should_fail+0x3c1/0x510 [ 542.659036][T11938] should_fail_alloc_page+0x55/0x80 [ 542.664237][T11938] prepare_alloc_pages+0x156/0x600 [ 542.669998][T11938] ? __alloc_pages_bulk+0xab0/0xab0 [ 542.675373][T11938] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 542.681362][T11938] __alloc_pages+0x10a/0x440 [ 542.685958][T11938] ? prep_new_page+0x110/0x110 [ 542.690730][T11938] ? __pcpu_chunk_move+0x275/0x310 [ 542.695875][T11938] pcpu_populate_chunk+0x184/0xcb0 [ 542.700992][T11938] ? _find_next_bit+0x1b5/0x200 [ 542.705848][T11938] pcpu_alloc+0xc4d/0x1660 [ 542.710302][T11938] __alloc_percpu_gfp+0x25/0x30 [ 542.715204][T11938] bpf_map_alloc_percpu+0xc5/0x150 [ 542.720319][T11938] htab_map_alloc+0xc1b/0x14f0 [ 542.725088][T11938] map_create+0x455/0x21b0 [ 542.729517][T11938] __sys_bpf+0x2cf/0x730 [ 542.733782][T11938] ? bpf_link_show_fdinfo+0x310/0x310 [ 542.739157][T11938] ? debug_smp_processor_id+0x17/0x20 [ 542.744533][T11938] __x64_sys_bpf+0x7c/0x90 [ 542.748948][T11938] x64_sys_call+0x4b9/0x9a0 [ 542.753452][T11938] do_syscall_64+0x4c/0xa0 [ 542.757868][T11938] ? clear_bhb_loop+0x50/0xa0 [ 542.762546][T11938] ? clear_bhb_loop+0x50/0xa0 [ 542.767222][T11938] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 542.773128][T11938] RIP: 0033:0x7f1ffe3be749 [ 542.777645][T11938] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 542.797253][T11938] RSP: 002b:00007f1ffce26038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 542.805674][T11938] RAX: ffffffffffffffda RBX: 00007f1ffe614fa0 RCX: 00007f1ffe3be749 [ 542.813657][T11938] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 542.821638][T11938] RBP: 00007f1ffce26090 R08: 0000000000000000 R09: 0000000000000000 [ 542.829728][T11938] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 542.837700][T11938] R13: 00007f1ffe615038 R14: 00007f1ffe614fa0 R15: 00007ffe9ec1d5a8 [ 542.845680][T11938] [ 542.851469][T11935] device wg2 entered promiscuous mode [ 543.161784][T11936] bridge0: port 1(bridge_slave_0) entered blocking state [ 543.169018][T11936] bridge0: port 1(bridge_slave_0) entered disabled state [ 543.195351][T11936] device bridge_slave_0 entered promiscuous mode [ 543.306851][T11936] bridge0: port 2(bridge_slave_1) entered blocking state [ 543.380351][T11936] bridge0: port 2(bridge_slave_1) entered disabled state [ 543.458866][T11936] device bridge_slave_1 entered promiscuous mode [ 544.031403][T11976] FAULT_INJECTION: forcing a failure. [ 544.031403][T11976] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 544.045592][T11976] CPU: 1 PID: 11976 Comm: syz.2.3892 Tainted: G W syzkaller #0 [ 544.054475][T11976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 544.064557][T11976] Call Trace: [ 544.067838][T11976] [ 544.070769][T11976] __dump_stack+0x21/0x30 [ 544.075102][T11976] dump_stack_lvl+0xee/0x150 [ 544.079702][T11976] ? show_regs_print_info+0x20/0x20 [ 544.084926][T11976] ? get_page_from_freelist+0x2cc5/0x2d50 [ 544.090802][T11976] dump_stack+0x15/0x20 [ 544.095197][T11976] should_fail+0x3c1/0x510 [ 544.099759][T11976] should_fail_alloc_page+0x55/0x80 [ 544.105051][T11976] prepare_alloc_pages+0x156/0x600 [ 544.110176][T11976] ? __alloc_pages_bulk+0xab0/0xab0 [ 544.115383][T11976] ? __bpf_trace_mm_page_alloc+0xc0/0xf0 [ 544.121016][T11976] __alloc_pages+0x10a/0x440 [ 544.125624][T11976] ? prep_new_page+0x110/0x110 [ 544.130399][T11976] pcpu_populate_chunk+0x184/0xcb0 [ 544.135524][T11976] ? _find_next_bit+0x1b5/0x200 [ 544.140381][T11976] pcpu_alloc+0xc4d/0x1660 [ 544.144814][T11976] __alloc_percpu_gfp+0x25/0x30 [ 544.149672][T11976] bpf_map_alloc_percpu+0xc5/0x150 [ 544.155090][T11976] htab_map_alloc+0xc1b/0x14f0 [ 544.159869][T11976] map_create+0x455/0x21b0 [ 544.164286][T11976] __sys_bpf+0x2cf/0x730 [ 544.168531][T11976] ? bpf_link_show_fdinfo+0x310/0x310 [ 544.174005][T11976] ? debug_smp_processor_id+0x17/0x20 [ 544.179399][T11976] __x64_sys_bpf+0x7c/0x90 [ 544.184163][T11976] x64_sys_call+0x4b9/0x9a0 [ 544.188760][T11976] do_syscall_64+0x4c/0xa0 [ 544.193255][T11976] ? clear_bhb_loop+0x50/0xa0 [ 544.197947][T11976] ? clear_bhb_loop+0x50/0xa0 [ 544.202645][T11976] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 544.208995][T11976] RIP: 0033:0x7f53a16d2749 [ 544.213432][T11976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 544.233044][T11976] RSP: 002b:00007f53a013a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 544.241585][T11976] RAX: ffffffffffffffda RBX: 00007f53a1928fa0 RCX: 00007f53a16d2749 [ 544.249648][T11976] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 544.257621][T11976] RBP: 00007f53a013a090 R08: 0000000000000000 R09: 0000000000000000 [ 544.265598][T11976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 544.273576][T11976] R13: 00007f53a1929038 R14: 00007f53a1928fa0 R15: 00007fff96138528 [ 544.281557][T11976] [ 544.290782][T11971] device pim6reg1 entered promiscuous mode [ 544.353593][T11985] device wg2 left promiscuous mode [ 544.369523][T11985] device wg2 entered promiscuous mode [ 544.391939][T11988] syz.1.3896[11988] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 544.392015][T11988] syz.1.3896[11988] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 544.421094][T11995] FAULT_INJECTION: forcing a failure. [ 544.421094][T11995] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 544.450788][T11995] CPU: 0 PID: 11995 Comm: syz.2.3906 Tainted: G W syzkaller #0 [ 544.459686][T11995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 544.469943][T11995] Call Trace: [ 544.473233][T11995] [ 544.476180][T11995] __dump_stack+0x21/0x30 [ 544.480534][T11995] dump_stack_lvl+0xee/0x150 [ 544.485265][T11995] ? show_regs_print_info+0x20/0x20 [ 544.490474][T11995] ? __this_cpu_preempt_check+0x13/0x20 [ 544.496034][T11995] ? __perf_event_task_sched_in+0x1fb/0x280 [ 544.501927][T11995] dump_stack+0x15/0x20 [ 544.506082][T11995] should_fail+0x3c1/0x510 [ 544.510497][T11995] should_fail_alloc_page+0x55/0x80 [ 544.515695][T11995] prepare_alloc_pages+0x156/0x600 [ 544.520802][T11995] ? __alloc_pages_bulk+0xab0/0xab0 [ 544.525995][T11995] ? __schedule+0xb76/0x14c0 [ 544.530579][T11995] __alloc_pages+0x10a/0x440 [ 544.535164][T11995] ? prep_new_page+0x110/0x110 [ 544.539922][T11995] ? preempt_schedule+0xa7/0xb0 [ 544.544860][T11995] ? schedule_preempt_disabled+0x20/0x20 [ 544.550530][T11995] pcpu_populate_chunk+0x184/0xcb0 [ 544.555652][T11995] ? _find_next_bit+0x1b5/0x200 [ 544.560525][T11995] pcpu_alloc+0xc4d/0x1660 [ 544.564946][T11995] __alloc_percpu_gfp+0x25/0x30 [ 544.569803][T11995] bpf_map_alloc_percpu+0xc5/0x150 [ 544.575073][T11995] htab_map_alloc+0xc1b/0x14f0 [ 544.579950][T11995] map_create+0x455/0x21b0 [ 544.584442][T11995] __sys_bpf+0x2cf/0x730 [ 544.588775][T11995] ? bpf_link_show_fdinfo+0x310/0x310 [ 544.594151][T11995] ? debug_smp_processor_id+0x17/0x20 [ 544.599662][T11995] __x64_sys_bpf+0x7c/0x90 [ 544.604081][T11995] x64_sys_call+0x4b9/0x9a0 [ 544.608581][T11995] do_syscall_64+0x4c/0xa0 [ 544.613002][T11995] ? clear_bhb_loop+0x50/0xa0 [ 544.617675][T11995] ? clear_bhb_loop+0x50/0xa0 [ 544.622347][T11995] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 544.628242][T11995] RIP: 0033:0x7f53a16d2749 [ 544.632779][T11995] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 544.652501][T11995] RSP: 002b:00007f53a013a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 544.661132][T11995] RAX: ffffffffffffffda RBX: 00007f53a1928fa0 RCX: 00007f53a16d2749 [ 544.669237][T11995] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 544.677230][T11995] RBP: 00007f53a013a090 R08: 0000000000000000 R09: 0000000000000000 [ 544.685310][T11995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 544.693363][T11995] R13: 00007f53a1929038 R14: 00007f53a1928fa0 R15: 00007fff96138528 [ 544.701363][T11995] [ 544.903876][T12008] bond_slave_1: mtu less than device minimum [ 544.930858][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 544.938584][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 544.979249][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 544.990582][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 545.001489][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 545.008592][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 545.109183][T12020] FAULT_INJECTION: forcing a failure. [ 545.109183][T12020] name failslab, interval 1, probability 0, space 0, times 0 [ 545.122842][T12020] CPU: 1 PID: 12020 Comm: syz.5.3907 Tainted: G W syzkaller #0 [ 545.127857][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 545.131870][T12020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 545.131884][T12020] Call Trace: [ 545.131891][T12020] [ 545.131899][T12020] __dump_stack+0x21/0x30 [ 545.131931][T12020] dump_stack_lvl+0xee/0x150 [ 545.165297][T12020] ? show_regs_print_info+0x20/0x20 [ 545.170522][T12020] dump_stack+0x15/0x20 [ 545.174807][T12020] should_fail+0x3c1/0x510 [ 545.179236][T12020] __should_failslab+0xa4/0xe0 [ 545.184017][T12020] should_failslab+0x9/0x20 [ 545.188531][T12020] slab_pre_alloc_hook+0x3b/0xe0 [ 545.193474][T12020] ? __alloc_skb+0xe0/0x740 [ 545.197985][T12020] kmem_cache_alloc+0x44/0x260 [ 545.202756][T12020] __alloc_skb+0xe0/0x740 [ 545.207185][T12020] alloc_skb_with_frags+0xa8/0x620 [ 545.212306][T12020] ? ktime_get+0x12f/0x160 [ 545.216887][T12020] sock_alloc_send_pskb+0x853/0x980 [ 545.222127][T12020] ? sock_kzfree_s+0x60/0x60 [ 545.226727][T12020] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 545.232898][T12020] ? tun_get_user+0x4b0/0x33c0 [ 545.237873][T12020] tun_get_user+0x4e6/0x33c0 [ 545.242623][T12020] ? _kstrtoull+0x1fc/0x4d0 [ 545.247398][T12020] ? tun_do_read+0x1c40/0x1c40 [ 545.252182][T12020] ? kstrtouint_from_user+0x1a0/0x200 [ 545.257566][T12020] ? kstrtol_from_user+0x260/0x260 [ 545.262697][T12020] ? avc_policy_seqno+0x1b/0x70 [ 545.267650][T12020] ? selinux_file_permission+0x2aa/0x510 [ 545.273311][T12020] tun_chr_write_iter+0x1eb/0x2e0 [ 545.278350][T12020] vfs_write+0x802/0xf70 [ 545.282983][T12020] ? irqentry_exit+0x37/0x40 [ 545.287586][T12020] ? file_end_write+0x1b0/0x1b0 [ 545.292452][T12020] ? __fget_files+0x2c4/0x320 [ 545.297145][T12020] ? __fdget_pos+0x1f7/0x380 [ 545.301738][T12020] ? ksys_write+0x71/0x240 [ 545.306176][T12020] ksys_write+0x140/0x240 [ 545.310506][T12020] ? __ia32_sys_read+0x90/0x90 [ 545.315271][T12020] ? sched_clock_cpu+0x18/0x3c0 [ 545.320125][T12020] ? debug_smp_processor_id+0x17/0x20 [ 545.325513][T12020] __x64_sys_write+0x7b/0x90 [ 545.330116][T12020] x64_sys_call+0x8ef/0x9a0 [ 545.334622][T12020] do_syscall_64+0x4c/0xa0 [ 545.339167][T12020] ? clear_bhb_loop+0x50/0xa0 [ 545.343847][T12020] ? clear_bhb_loop+0x50/0xa0 [ 545.348526][T12020] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 545.354424][T12020] RIP: 0033:0x7f1ffe3be749 [ 545.358844][T12020] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 545.378544][T12020] RSP: 002b:00007f1ffce26038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 545.386982][T12020] RAX: ffffffffffffffda RBX: 00007f1ffe614fa0 RCX: 00007f1ffe3be749 [ 545.394961][T12020] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 545.402961][T12020] RBP: 00007f1ffce26090 R08: 0000000000000000 R09: 0000000000000000 [ 545.410960][T12020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 545.418937][T12020] R13: 00007f1ffe615038 R14: 00007f1ffe614fa0 R15: 00007ffe9ec1d5a8 [ 545.426928][T12020] [ 545.440374][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 545.456063][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 545.463241][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 545.486097][T12033] syz.5.3910[12033] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 545.486183][T12033] syz.5.3910[12033] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 545.541872][T12035] FAULT_INJECTION: forcing a failure. [ 545.541872][T12035] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 545.622641][T12021] ªªªªªª: renamed from vlan0 [ 545.622949][T12035] CPU: 0 PID: 12035 Comm: syz.5.3911 Tainted: G W syzkaller #0 [ 545.636144][T12035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 545.646251][T12035] Call Trace: [ 545.649551][T12035] [ 545.652499][T12035] __dump_stack+0x21/0x30 [ 545.656861][T12035] dump_stack_lvl+0xee/0x150 [ 545.661477][T12035] ? show_regs_print_info+0x20/0x20 [ 545.667140][T12035] ? __this_cpu_preempt_check+0x13/0x20 [ 545.672717][T12035] ? __perf_event_task_sched_in+0x1fb/0x280 [ 545.678641][T12035] dump_stack+0x15/0x20 [ 545.682824][T12035] should_fail+0x3c1/0x510 [ 545.687269][T12035] should_fail_alloc_page+0x55/0x80 [ 545.692500][T12035] prepare_alloc_pages+0x156/0x600 [ 545.697637][T12035] ? __alloc_pages_bulk+0xab0/0xab0 [ 545.702871][T12035] ? _find_next_bit+0x1fa/0x200 [ 545.707747][T12035] __alloc_pages+0x10a/0x440 [ 545.712377][T12035] ? prep_new_page+0x110/0x110 [ 545.717372][T12035] pcpu_populate_chunk+0x184/0xcb0 [ 545.722512][T12035] ? _find_next_bit+0x106/0x200 [ 545.727393][T12035] pcpu_alloc+0xc4d/0x1660 [ 545.731839][T12035] __alloc_percpu_gfp+0x25/0x30 [ 545.736718][T12035] bpf_map_alloc_percpu+0xc5/0x150 [ 545.741963][T12035] htab_map_alloc+0xc1b/0x14f0 [ 545.746763][T12035] map_create+0x455/0x21b0 [ 545.751204][T12035] __sys_bpf+0x2cf/0x730 [ 545.755462][T12035] ? bpf_link_show_fdinfo+0x310/0x310 [ 545.760844][T12035] ? debug_smp_processor_id+0x17/0x20 [ 545.766220][T12035] __x64_sys_bpf+0x7c/0x90 [ 545.770639][T12035] x64_sys_call+0x4b9/0x9a0 [ 545.775143][T12035] do_syscall_64+0x4c/0xa0 [ 545.779567][T12035] ? clear_bhb_loop+0x50/0xa0 [ 545.784242][T12035] ? clear_bhb_loop+0x50/0xa0 [ 545.788916][T12035] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 545.794818][T12035] RIP: 0033:0x7f1ffe3be749 [ 545.799234][T12035] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 545.818841][T12035] RSP: 002b:00007f1ffce26038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 545.827262][T12035] RAX: ffffffffffffffda RBX: 00007f1ffe614fa0 RCX: 00007f1ffe3be749 [ 545.835236][T12035] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 545.843297][T12035] RBP: 00007f1ffce26090 R08: 0000000000000000 R09: 0000000000000000 [ 545.851352][T12035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 545.859419][T12035] R13: 00007f1ffe615038 R14: 00007f1ffe614fa0 R15: 00007ffe9ec1d5a8 [ 545.867398][T12035] [ 545.875276][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 545.893304][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 545.910840][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 545.921307][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 545.929492][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 545.943915][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 545.960663][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 546.049099][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 546.080707][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 546.108723][T12048] device wg2 left promiscuous mode [ 546.115598][T11936] device veth0_vlan entered promiscuous mode [ 546.142203][T12051] device wg2 entered promiscuous mode [ 546.181014][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 546.198915][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 546.261604][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 546.270046][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 546.370607][T11936] device veth1_macvtap entered promiscuous mode [ 546.497148][T12066] syz.2.3921[12066] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 546.502673][T12066] syz.2.3921[12066] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 546.682131][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 546.715646][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 546.724318][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 546.774450][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 546.783813][ T1156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 547.010124][T12076] FAULT_INJECTION: forcing a failure. [ 547.010124][T12076] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 547.047823][T12076] CPU: 1 PID: 12076 Comm: syz.1.3924 Tainted: G W syzkaller #0 [ 547.056735][T12076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 547.066902][T12076] Call Trace: [ 547.070280][T12076] [ 547.073221][T12076] __dump_stack+0x21/0x30 [ 547.077556][T12076] dump_stack_lvl+0xee/0x150 [ 547.082145][T12076] ? show_regs_print_info+0x20/0x20 [ 547.087352][T12076] ? __this_cpu_preempt_check+0x13/0x20 [ 547.092910][T12076] dump_stack+0x15/0x20 [ 547.097306][T12076] should_fail+0x3c1/0x510 [ 547.101878][T12076] should_fail_alloc_page+0x55/0x80 [ 547.107104][T12076] prepare_alloc_pages+0x156/0x600 [ 547.112227][T12076] ? __alloc_pages_bulk+0xab0/0xab0 [ 547.117422][T12076] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 547.123147][T12076] __alloc_pages+0x10a/0x440 [ 547.127747][T12076] ? prep_new_page+0x110/0x110 [ 547.132525][T12076] pcpu_populate_chunk+0x184/0xcb0 [ 547.137649][T12076] ? _find_next_bit+0x1b5/0x200 [ 547.142660][T12076] pcpu_alloc+0xc4d/0x1660 [ 547.147093][T12076] __alloc_percpu_gfp+0x25/0x30 [ 547.151949][T12076] bpf_map_alloc_percpu+0xc5/0x150 [ 547.157155][T12076] htab_map_alloc+0xc1b/0x14f0 [ 547.161924][T12076] map_create+0x455/0x21b0 [ 547.166338][T12076] __sys_bpf+0x2cf/0x730 [ 547.170576][T12076] ? bpf_link_show_fdinfo+0x310/0x310 [ 547.175950][T12076] ? debug_smp_processor_id+0x17/0x20 [ 547.181318][T12076] __x64_sys_bpf+0x7c/0x90 [ 547.185735][T12076] x64_sys_call+0x4b9/0x9a0 [ 547.190237][T12076] do_syscall_64+0x4c/0xa0 [ 547.194655][T12076] ? clear_bhb_loop+0x50/0xa0 [ 547.199367][T12076] ? clear_bhb_loop+0x50/0xa0 [ 547.204049][T12076] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 547.209949][T12076] RIP: 0033:0x7f42012fd749 [ 547.214360][T12076] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 547.233963][T12076] RSP: 002b:00007f41ffd65038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 547.242511][T12076] RAX: ffffffffffffffda RBX: 00007f4201553fa0 RCX: 00007f42012fd749 [ 547.250505][T12076] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 547.258472][T12076] RBP: 00007f41ffd65090 R08: 0000000000000000 R09: 0000000000000000 [ 547.266451][T12076] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 547.274436][T12076] R13: 00007f4201554038 R14: 00007f4201553fa0 R15: 00007ffe36c49958 [ 547.282592][T12076] [ 549.141842][T12090] device wg2 left promiscuous mode [ 549.151180][ T10] device bridge_slave_1 left promiscuous mode [ 549.160336][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 549.168099][ T10] device bridge_slave_0 left promiscuous mode [ 549.176072][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 549.184943][ T10] device veth1_macvtap left promiscuous mode [ 549.191069][ T10] device veth0_vlan left promiscuous mode [ 549.215329][T12097] syz.1.3933[12097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 549.215410][T12097] syz.1.3933[12097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 549.255871][T12101] syz.1.3935[12101] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 549.268481][T12101] syz.1.3935[12101] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 549.332768][T12107] FAULT_INJECTION: forcing a failure. [ 549.332768][T12107] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 549.357522][T12107] CPU: 0 PID: 12107 Comm: syz.1.3938 Tainted: G W syzkaller #0 [ 549.366406][T12107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 549.376547][T12107] Call Trace: [ 549.379822][T12107] [ 549.382751][T12107] __dump_stack+0x21/0x30 [ 549.387086][T12107] dump_stack_lvl+0xee/0x150 [ 549.391691][T12107] ? show_regs_print_info+0x20/0x20 [ 549.396906][T12107] ? __this_cpu_preempt_check+0x13/0x20 [ 549.402453][T12107] dump_stack+0x15/0x20 [ 549.406602][T12107] should_fail+0x3c1/0x510 [ 549.411017][T12107] should_fail_alloc_page+0x55/0x80 [ 549.416216][T12107] prepare_alloc_pages+0x156/0x600 [ 549.421343][T12107] ? __alloc_pages_bulk+0xab0/0xab0 [ 549.426538][T12107] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 549.432172][T12107] __alloc_pages+0x10a/0x440 [ 549.436764][T12107] ? prep_new_page+0x110/0x110 [ 549.441529][T12107] pcpu_populate_chunk+0x184/0xcb0 [ 549.446638][T12107] ? _find_next_bit+0x1b5/0x200 [ 549.451509][T12107] pcpu_alloc+0xc4d/0x1660 [ 549.455930][T12107] __alloc_percpu_gfp+0x25/0x30 [ 549.460778][T12107] bpf_map_alloc_percpu+0xc5/0x150 [ 549.465885][T12107] htab_map_alloc+0xc1b/0x14f0 [ 549.470666][T12107] map_create+0x455/0x21b0 [ 549.475079][T12107] __sys_bpf+0x2cf/0x730 [ 549.479315][T12107] ? bpf_link_show_fdinfo+0x310/0x310 [ 549.484688][T12107] ? debug_smp_processor_id+0x17/0x20 [ 549.490064][T12107] __x64_sys_bpf+0x7c/0x90 [ 549.494485][T12107] x64_sys_call+0x4b9/0x9a0 [ 549.498985][T12107] do_syscall_64+0x4c/0xa0 [ 549.503395][T12107] ? clear_bhb_loop+0x50/0xa0 [ 549.508062][T12107] ? clear_bhb_loop+0x50/0xa0 [ 549.512733][T12107] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 549.518621][T12107] RIP: 0033:0x7f42012fd749 [ 549.523030][T12107] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 549.542633][T12107] RSP: 002b:00007f41ffd65038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 549.551044][T12107] RAX: ffffffffffffffda RBX: 00007f4201553fa0 RCX: 00007f42012fd749 [ 549.559012][T12107] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 549.566982][T12107] RBP: 00007f41ffd65090 R08: 0000000000000000 R09: 0000000000000000 [ 549.574946][T12107] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 549.582920][T12107] R13: 00007f4201554038 R14: 00007f4201553fa0 R15: 00007ffe36c49958 [ 549.590898][T12107] [ 549.606276][T12090] device wg2 entered promiscuous mode [ 549.652804][T12108] device sit0 entered promiscuous mode [ 550.790388][T12130] device syzkaller0 entered promiscuous mode [ 550.809389][T12093] bridge0: port 1(bridge_slave_0) entered blocking state [ 550.827328][T12093] bridge0: port 1(bridge_slave_0) entered disabled state [ 550.850839][T12093] device bridge_slave_0 entered promiscuous mode [ 550.857991][T12135] bpf_get_probe_write_proto: 2 callbacks suppressed [ 550.858007][T12135] syz.5.3946[12135] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 550.874434][T12135] syz.5.3946[12135] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 550.920306][T12093] bridge0: port 2(bridge_slave_1) entered blocking state [ 550.939519][T12093] bridge0: port 2(bridge_slave_1) entered disabled state [ 550.948283][T12093] device bridge_slave_1 entered promiscuous mode [ 551.194157][T12145] device wg2 left promiscuous mode [ 551.204252][T12146] device wg2 entered promiscuous mode [ 551.233454][T12148] FAULT_INJECTION: forcing a failure. [ 551.233454][T12148] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 551.247155][T12148] CPU: 1 PID: 12148 Comm: syz.2.3951 Tainted: G W syzkaller #0 [ 551.256035][T12148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 551.266120][T12148] Call Trace: [ 551.269413][T12148] [ 551.272357][T12148] __dump_stack+0x21/0x30 [ 551.276704][T12148] dump_stack_lvl+0xee/0x150 [ 551.281299][T12148] ? show_regs_print_info+0x20/0x20 [ 551.286530][T12148] ? __this_cpu_preempt_check+0x13/0x20 [ 551.292088][T12148] ? __perf_event_task_sched_in+0x1fb/0x280 [ 551.298075][T12148] dump_stack+0x15/0x20 [ 551.302266][T12148] should_fail+0x3c1/0x510 [ 551.306686][T12148] should_fail_alloc_page+0x55/0x80 [ 551.311887][T12148] prepare_alloc_pages+0x156/0x600 [ 551.317095][T12148] ? __alloc_pages_bulk+0xab0/0xab0 [ 551.322304][T12148] ? __schedule+0xb76/0x14c0 [ 551.327334][T12148] __alloc_pages+0x10a/0x440 [ 551.332015][T12148] ? prep_new_page+0x110/0x110 [ 551.336889][T12148] ? preempt_schedule+0xa7/0xb0 [ 551.341742][T12148] ? schedule_preempt_disabled+0x20/0x20 [ 551.347708][T12148] pcpu_populate_chunk+0x184/0xcb0 [ 551.353027][T12148] ? _find_next_bit+0x1b5/0x200 [ 551.357901][T12148] pcpu_alloc+0xc4d/0x1660 [ 551.362413][T12148] __alloc_percpu_gfp+0x25/0x30 [ 551.368144][T12148] bpf_map_alloc_percpu+0xc5/0x150 [ 551.374515][T12148] htab_map_alloc+0xc1b/0x14f0 [ 551.379583][T12148] map_create+0x455/0x21b0 [ 551.384005][T12148] __sys_bpf+0x2cf/0x730 [ 551.388867][T12148] ? bpf_link_show_fdinfo+0x310/0x310 [ 551.394270][T12148] ? debug_smp_processor_id+0x17/0x20 [ 551.399671][T12148] __x64_sys_bpf+0x7c/0x90 [ 551.404094][T12148] x64_sys_call+0x4b9/0x9a0 [ 551.408603][T12148] do_syscall_64+0x4c/0xa0 [ 551.413028][T12148] ? clear_bhb_loop+0x50/0xa0 [ 551.417703][T12148] ? clear_bhb_loop+0x50/0xa0 [ 551.422383][T12148] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 551.428292][T12148] RIP: 0033:0x7f53a16d2749 [ 551.432716][T12148] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 551.452335][T12148] RSP: 002b:00007f53a013a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 551.460763][T12148] RAX: ffffffffffffffda RBX: 00007f53a1928fa0 RCX: 00007f53a16d2749 [ 551.468746][T12148] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 551.476732][T12148] RBP: 00007f53a013a090 R08: 0000000000000000 R09: 0000000000000000 [ 551.484709][T12148] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 551.492687][T12148] R13: 00007f53a1929038 R14: 00007f53a1928fa0 R15: 00007fff96138528 [ 551.500858][T12148] [ 551.598002][T12093] bridge0: port 2(bridge_slave_1) entered blocking state [ 551.605143][T12093] bridge0: port 2(bridge_slave_1) entered forwarding state [ 551.612483][T12093] bridge0: port 1(bridge_slave_0) entered blocking state [ 551.619520][T12093] bridge0: port 1(bridge_slave_0) entered forwarding state [ 551.645642][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 551.674606][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 551.761397][T12161] device syzkaller0 entered promiscuous mode [ 551.862060][T12164] bridge0: port 2(bridge_slave_1) entered disabled state [ 551.869315][T12164] bridge0: port 1(bridge_slave_0) entered disabled state [ 551.883680][T12165] device bridge_slave_1 left promiscuous mode [ 551.896317][T12165] bridge0: port 2(bridge_slave_1) entered disabled state [ 551.910789][T12165] device bridge_slave_0 left promiscuous mode [ 551.917685][T12165] bridge0: port 1(bridge_slave_0) entered disabled state [ 551.963939][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 551.972719][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 551.994738][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 552.013325][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 552.025886][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 552.032986][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 552.143769][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 552.179785][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 552.197275][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 552.204405][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 552.238662][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 552.247781][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 552.273602][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 552.284035][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 552.307903][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 552.316746][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 552.345804][T12093] device veth0_vlan entered promiscuous mode [ 552.359087][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 552.370653][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 552.382602][T12186] device wg2 left promiscuous mode [ 552.395674][T12186] device wg2 entered promiscuous mode [ 552.403281][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 552.415603][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 552.446026][T12093] device veth1_macvtap entered promiscuous mode [ 552.463499][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 552.561809][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 552.633032][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 552.854503][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 552.883313][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 552.934000][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 553.021636][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 553.660251][T12195] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 553.672027][T12195] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 553.680557][T12195] CPU: 0 PID: 12195 Comm: syz.0.3965 Tainted: G W syzkaller #0 [ 553.689499][T12195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 553.699665][T12195] RIP: 0010:__rb_erase_color+0xe7/0xaf0 [ 553.705246][T12195] Code: 8b 4d c0 80 3c 01 00 74 09 48 8b 7d c8 e8 51 be 3a ff 4d 89 6e 08 4c 89 33 4c 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 ef e8 2b be 3a ff 4c 89 f0 48 83 c8 01 49 [ 553.724981][T12195] RSP: 0018:ffffc900013676c0 EFLAGS: 00010246 [ 553.731187][T12195] RAX: 0000000000000000 RBX: ffff88810da81ad0 RCX: dffffc0000000000 [ 553.739276][T12195] RDX: ffffffff819b06e0 RSI: 1ffff110222bd7b7 RDI: ffff88810da81180 [ 553.747268][T12195] RBP: ffffc90001367720 R08: dffffc0000000000 R09: ffffed10222bd7bb [ 553.755342][T12195] R10: ffffed10222bd7bb R11: 1ffff110222bd7ba R12: 1ffff11021b50358 [ 553.763316][T12195] R13: 0000000000000000 R14: ffff88810da81180 R15: ffff88810da81ac0 [ 553.771304][T12195] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 553.780234][T12195] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 553.786821][T12195] CR2: fffffffffffffffa CR3: 000000000660f000 CR4: 00000000003506b0 [ 553.794810][T12195] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 553.802785][T12195] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 553.810762][T12195] Call Trace: [ 553.814043][T12195] [ 553.816974][T12195] ? anon_vma_interval_tree_iter_next+0x380/0x380 [ 553.823401][T12195] vma_interval_tree_remove+0xadf/0xb00 [ 553.828956][T12195] unlink_file_vma+0xda/0xf0 [ 553.833550][T12195] free_pgtables+0x139/0x280 [ 553.838174][T12195] exit_mmap+0x407/0x860 [ 553.842424][T12195] ? vm_brk+0x30/0x30 [ 553.846432][T12195] ? mutex_unlock+0x89/0x220 [ 553.851028][T12195] ? uprobe_clear_state+0x2c1/0x320 [ 553.856233][T12195] __mmput+0x93/0x320 [ 553.860300][T12195] ? mmput+0x48/0x150 [ 553.864286][T12195] mmput+0x50/0x150 [ 553.868360][T12195] do_exit+0x9d2/0x27a0 [ 553.872523][T12195] ? put_task_struct+0x90/0x90 [ 553.877291][T12195] ? __fput+0x63f/0x8b0 [ 553.881452][T12195] ? __kasan_check_write+0x14/0x20 [ 553.886718][T12195] ? _raw_spin_lock_irq+0x8f/0xe0 [ 553.891892][T12195] do_group_exit+0x141/0x310 [ 553.896596][T12195] ? __kasan_check_write+0x14/0x20 [ 553.901733][T12195] get_signal+0x66a/0x1480 [ 553.906167][T12195] ? blake2s_update+0x1bb/0x270 [ 553.911038][T12195] arch_do_signal_or_restart+0xc1/0x10f0 [ 553.916688][T12195] ? irqentry_exit+0x37/0x40 [ 553.921285][T12195] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 553.927106][T12195] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 553.933270][T12195] ? get_sigframe_size+0x10/0x10 [ 553.938212][T12195] ? __x64_sys_clone+0x176/0x1d0 [ 553.943164][T12195] exit_to_user_mode_loop+0xa7/0xe0 [ 553.948368][T12195] exit_to_user_mode_prepare+0x87/0xd0 [ 553.953838][T12195] syscall_exit_to_user_mode+0x1a/0x30 [ 553.959529][T12195] do_syscall_64+0x58/0xa0 [ 553.964049][T12195] ? clear_bhb_loop+0x50/0xa0 [ 553.968747][T12195] ? clear_bhb_loop+0x50/0xa0 [ 553.973438][T12195] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 553.979345][T12195] RIP: 0033:0x7fc8e0c62749 [ 553.983769][T12195] Code: Unable to access opcode bytes at RIP 0x7fc8e0c6271f. [ 553.991163][T12195] RSP: 002b:00007fc8df6c9fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 553.999589][T12195] RAX: fffffffffffffffc RBX: 00007fc8e0eb8fa0 RCX: 00007fc8e0c62749 [ 554.007565][T12195] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040900200 [ 554.015540][T12195] RBP: 00007fc8e0ce6f91 R08: 0000000000000000 R09: 0000000000000000 [ 554.023518][T12195] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 554.031556][T12195] R13: 00007fc8e0eb9038 R14: 00007fc8e0eb8fa0 R15: 00007ffdb1454de8 [ 554.039539][T12195] [ 554.042556][T12195] Modules linked in: [ 554.050391][ T30] audit: type=1400 audit(1764070258.629:161): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 554.100235][ T30] audit: type=1400 audit(1764070258.629:162): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 554.109199][T12195] ---[ end trace 20f34350739ea657 ]--- [ 554.136903][ T30] audit: type=1400 audit(1764070258.629:163): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 554.137930][T12195] RIP: 0010:__rb_erase_color+0xe7/0xaf0 [ 554.164048][ T30] audit: type=1400 audit(1764070258.639:164): avc: denied { add_name } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 554.165150][T12195] Code: 8b 4d c0 80 3c 01 00 74 09 48 8b 7d c8 e8 51 be 3a ff 4d 89 6e 08 4c 89 33 4c 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 ef e8 2b be 3a ff 4c 89 f0 48 83 c8 01 49 [ 554.185032][ T30] audit: type=1400 audit(1764070258.639:165): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 554.204851][T12195] RSP: 0018:ffffc900013676c0 EFLAGS: 00010246 [ 554.225168][ T30] audit: type=1400 audit(1764070258.639:166): avc: denied { append open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 554.226979][T12195] [ 554.231762][ T30] audit: type=1400 audit(1764070258.639:167): avc: denied { getattr } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 554.254287][T12195] RAX: 0000000000000000 RBX: ffff88810da81ad0 RCX: dffffc0000000000 [ 554.287366][T12195] RDX: ffffffff819b06e0 RSI: 1ffff110222bd7b7 RDI: ffff88810da81180 [ 554.295618][T12195] RBP: ffffc90001367720 R08: dffffc0000000000 R09: ffffed10222bd7bb [ 554.303702][T12195] R10: ffffed10222bd7bb R11: 1ffff110222bd7ba R12: 1ffff11021b50358 [ 554.311835][T12195] R13: 0000000000000000 R14: ffff88810da81180 R15: ffff88810da81ac0 [ 554.319883][T12195] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 554.329093][T12195] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 554.335864][T12195] CR2: 000056252b74ab58 CR3: 000000010d1d1000 CR4: 00000000003506a0 [ 554.343997][T12195] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 554.352197][T12195] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 554.360247][T12195] Kernel panic - not syncing: Fatal exception [ 554.366591][T12195] Kernel Offset: disabled [ 554.370921][T12195] Rebooting in 86400 seconds..