last executing test programs: 7m6.832164735s ago: executing program 2 (id=7927): bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xa, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 7m6.732831836s ago: executing program 2 (id=7929): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304, 0x10, &(0x7f0000000000), 0xfffffea2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0xcfac, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c2, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x11) 7m6.523021989s ago: executing program 2 (id=7931): r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00'}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x40010) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x6) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000010018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=ANY=[@ANYBLOB="8510000004000000950000000000000018000000000000000000000000000000950000000000000085100000fcffffff9500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000"], 0x48) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r4 = getpid() syz_open_procfs$namespace(r4, &(0x7f0000000080)='ns/pid\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 7m6.428223071s ago: executing program 2 (id=7932): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x430, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc000000, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 7m6.336571382s ago: executing program 2 (id=7933): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x66, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079d}) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000180)=r4, 0x12) socketpair(0x1, 0x1, 0x1, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0x5ee, 0xfd000004, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 7m5.979745767s ago: executing program 2 (id=7937): bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x16, 0x0, 0x400000, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 6m50.950750783s ago: executing program 32 (id=7937): bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x16, 0x0, 0x400000, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 3.99926409s ago: executing program 0 (id=11993): bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="01000000050000000900000084"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00'}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000640), 0x4) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000005c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x3, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x10, 0x17, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000000000000000000c000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000000f000000bf09000000000000550901000074f6967d00000000000000180100002020702500000000002020207baaf8ff00000000bda100000000000027010000f8ffffffb702000008000000b7030000000000002500000006000000be91000000000000b502ecffffff00008500000005000000b70000000000000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 3.132713083s ago: executing program 0 (id=12000): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x88, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff0000", @ANYRES32, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001380)={0x6, 0x0, 0x0, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x9e, &(0x7f0000000980)=""/158, 0x40f00, 0x5a, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000c80)={0x1000, 0x1}, 0x8, 0x10, &(0x7f0000000ec0)={0x4, 0x6, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000f00)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000f40)=[{0x3, 0x1, 0x7}], 0x10, 0x10001, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000540), 0x4) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000006c0)={0x0, 0x80, 0x2, 0x8d, 0x16, 0x4, 0x0, 0x5, 0x14be0, 0x48cf3dc79f55ac94, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x6}, 0x100000, 0x0, 0x0, 0x7, 0x0, 0x0, 0xc, 0x0, 0xc7a8, 0x0, 0x4}, r2, 0x1, 0xffffffffffffffff, 0x2) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0e00000004000000040000000200020000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000180000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03090000020000000000000000000000000000000000000000000000c6deba5a21a0d179a36aaae8ba02d301eebc5cab25b34842802f94db92d20cfd0be12cee718954a8b55775e1c4af78fbaa0d00000000000000972e8fc86808570e56f601fee668"], 0x50) 2.954365426s ago: executing program 1 (id=12001): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="01000000050000000900000084"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00'}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000640), 0x4) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000005c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x3, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x10, 0x17, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000ff000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000040b703000000000000850000000f000000bf09000000000000550901000074f6967d00000000000000180100002020702500000000002020207baaf8ff00000000bda100000000000027010000f8ffffffb702000008000000b7030000000000002500000006000000be91000000000000b502ecffffff00008500000005000000b70000000000000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 2.725116048s ago: executing program 5 (id=12002): bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xa, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 2.61738381s ago: executing program 5 (id=12003): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f0000000b80)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca^\xf9\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x96\x86\xdb\xa9\xd3\x01\xb2\xc7\xf8G\x069\x90,\xda\xf6\xc5\xcd\xec\xa3B\xc3\"4\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\x7f\xec\xb2\xc5E\x00\xdd\xf2e\xa8\xf1<\xb2\xc82\xbf=o\x00`\xc1A\'\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x92\xbb\xe3Y\x97\xc2') recvmsg(r3, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ec0}, 0x0) sendmsg$inet(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000540)="007a8a5dc05399c91d9fbc320ef558fd0f758be4e7c3848850814789c99a90dd3437320bffc3182b4cb66192d74665ae6ea22743f300000000000000085adaa5c0a405d801", 0x45}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) unlink(&(0x7f00000004c0)='./file0\x00') socketpair$tipc(0x1e, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x200, 0x3, 0x0, 0x2, 0x4, 0x4000000, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r3, 0x0, 0x66ad1a1f46ef86c3) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1b00040000f50654b4b42c56c200010000000000", @ANYRES32=r4, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB="000000000400"/28], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095200000000000004c297edcdfb8abdf40e4616d9bea3163d2390cfdb4565e0ed1bb1398d34b5dfc0e48255f0b0fb9c983aaafcfc4ada110de18ebb95be1a6a8d7f4aacc2965061a6bd5b54cbdd5f46fc1388c8b9e9c843fdaa6849ee85b96e57e0e4b9c7d432752"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='kmem_cache_free\x00', r8, 0x0, 0xffffffffffffffff}, 0x9) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000500)={'netpci0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x26}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) 2.398625573s ago: executing program 3 (id=12004): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r0}, 0x18) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000001580)=ANY=[@ANYRES32=r1], &(0x7f0000000680)=""/182, 0x2e, 0xb6, 0x1, 0x0, 0x0, @void, @value}, 0x28) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0xc, 0x10, &(0x7f0000000e40)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000008000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r3, 0xfffff000, 0xe, 0x0, &(0x7f0000000300)="61df712bc884fed5722780b605a7", 0x0, 0x2f00, 0x7000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000380)='syz0\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r5, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x18) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x10, 0x0, 0x8000, 0x2090, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000780)=ANY=[@ANYBLOB="18002db6575b357a49c0000000000000181100005a5e3c466031db055f4a772e7e660cb4fa7d96e4b399c25e30fa613082c083f7d7aff32af02a10edd822aaf69eef817b01d7c79dc12b6c8c7619998f6e74b3c93bf111a5518825b804c79d27c40c9a7255dbe7646d3b4a155e7a5fe22340d9c765fcc0283d5ffee4a0c1edd9d0d1f7776d351c6ac5ffee01ac63c90754b0f37f710fc448f9512f07171088160af5f2a32aec4a6410d66cf90faa2e", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r7}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x8000, 0x0, 0x0, 0x0, 0xff, 0x196e, 0x0, 0x0, 0x0, 0x0, 0xa9fd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2.397856433s ago: executing program 5 (id=12005): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00000000000000c8f140a0aad331ff6754696f74e1762653685eb8aa6fdc977fd66da5e2d388ee253e3714255e2b", @ANYRES32=0x1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="00000003000000000000000000000000000000e6", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, 0x0, &(0x7f0000000380)=r1}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)=@generic={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xa, 0x22, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x4}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffd}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000000600)='syzkaller\x00', 0x6, 0xb, &(0x7f0000000800)=""/11, 0x41100, 0x2, '\x00', 0x0, @fallback=0x10, r5, 0x8, &(0x7f0000000840)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000880)={0x5, 0x1, 0x1, 0x4}, 0x10, 0xffffffffffffffff, r4, 0x9, &(0x7f00000008c0)=[r2, r2, r0, r0, r0], &(0x7f0000000900)=[{0x1, 0x2, 0x10, 0x2}, {0x0, 0x5, 0x6, 0xa}, {0x4, 0x3, 0xd, 0xc}, {0x1, 0x2, 0x7, 0x1f}, {0x0, 0x4, 0xe, 0x4}, {0x2, 0x3, 0xf, 0x7}, {0x2, 0x1, 0x9, 0x1}, {0x0, 0x1, 0x9, 0x1}, {0x5, 0x3, 0x5, 0xa}], 0x10, 0xd, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="f200000000000000b7043569353e43dd45cf9a0800000000ff00938af8ff00000000bfa24988f56d29360ea7eb409de3b1bc3f00000000000007029037caecc9eed98f5103d4f544d462040000000000f085000000210000e0a63f6469ea45daa843d752b6dc97dcdf6787b7ce44e7d46779a4272318a81fdd48f2a9cf36fd72c227e2014baacb9280112c74654c21948e62fd8bca60299334cd2bdde72ef721c0b4f52ef71ecb92b6"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r9) 2.317073705s ago: executing program 4 (id=12006): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x7d}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2, 0x8000000}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 2.170283777s ago: executing program 0 (id=12007): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000980), 0x0, 0x2f, 0xe8034000, 0x0, 0x0, &(0x7f0000000000), &(0x7f00000000c0), 0x5dc}, 0x50) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="10000000040000000400000002"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r3}, &(0x7f0000000a00), &(0x7f0000000a40)=r2}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r3}, &(0x7f0000000880), &(0x7f00000008c0)=r2}, 0x20) openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 1.749254324s ago: executing program 0 (id=12008): openat$tun(0xffffffffffffff9c, 0x0, 0x12002, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1b}, {{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}, {0x95, 0x0, 0x0, 0x600}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 1.748784673s ago: executing program 1 (id=12009): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x12, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000000}, [@ldst={0x1, 0x2, 0x3, 0x4, 0x1, 0x13}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 1.747515544s ago: executing program 3 (id=12010): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8102033200fe08000e7f0061cd915a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) openat$cgroup_devices(r3, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000000000000000000000000007f180100002200000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bf03000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_BTF_INFO(0xa, &(0x7f00000003c0)={r4, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x50) 1.611061226s ago: executing program 1 (id=12011): socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0, r0}, 0x18) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r1}, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0xfffffdb9, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001180)=ANY=[@ANYBLOB="61154c00000000006113500000000000bfa00000000000001503000008004e002d35010000000000950041000000000069163a0000000000bf67000000000000350605000fff07206706000005000000160302000ee60060bf670000000000000f650000000000006507f9ff0100000007070000cddfffff1e75000000000000bf54000000000000070400000400f9ff3d4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd3997f9c9c4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe01c5473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc2300000008ac86d8a297dff0445a15f21dce4de9f29eff65aadc841848c9b562a31e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076ebae3f55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932c9a6aa57f1ad2e99e0e67ab93716d20000009fbb0f53acbb40b4f8e2739670b31562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f679629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253880800000000000000690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc401000000cc43010000207b40407d000000210000000000000000005f37d83f84e98a523d80bd970d703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5489af8dc2f17923f3c40dfd1970a55c22fe3a5ac000000f4000000000000000000000000c1eb2d91fb79ea00000000000000bb0d00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba9000000000000003cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c6939628950000000000000001c7205a6b068fff496d2da7d632bd1f61b007e1ff5f1be19637302f3b41eae50509fd05d12f6186f117b062df67d3a63f3265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b30410856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db88aa3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f8150d999d788535a4d3114dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fb9fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff010404faf0a4da65396174b4563d54b52f06c870edf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202ee1192b81f428a5b3c299848649e1a6bff52f657a67463d7dbf85ae9321fc2b517dc4a29b9b5a8ded5de8206c812439ab129ae818837ee1562078fc524a3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2a3bc87b0da23c00d9ef418cf19e7a8c4c328be0ce95798adc2dca871073f6bd61dc18402cde8b0100010000000000abc86b94f8cbde4d470667bee722a6a2af483ad0d3415ed0f9db059acaba9eaea93f811d434e00000000000000000000d154ba10a8e51489a614e69722bac30000000000000000000000000000c5dfd188ff555285b9743d3aac000583f42d168613151d681a2f71373f20d92c9048407c91fabecfe8b3f2d545ffffffff00000000a1cfc4336324c86f3dcb43e9a58208077e90f6ec1c7ac756f61dcc372cdd30b82507489f0bbfbd3c3f21752e81319c0161e154ceb16e00bc7f5a6962dff317f4d014786e432817064874d69a39cb0da31bcc5f81894d8a80756447322207b4007dff12eb95066cc6bc256f0a12282224d718b06ca80b57aa183dd0c3eee45891441f2b89b4c67aa9882281393954972046974f18df232cd7fca610e33f51c2d062020f403d85ff36c26e2f6bd1d82f4d3ceb3472d9a77e0057a3bfe697d9ab7585f4a1b381343d2cf857689232f4fc5135790662dc1419a374be9d7b3e5be2886d23add90d862f1a682ff11c798e338af3e5bb0f9d3952b15bf3e0c618c89d20ca1e18a031397693bf3cfbd8417e5b55e641c898c280356f2da222d5d68919d98158578dcf18efa404e508bcbbb8cfcf70086821ebdf34c9a1dff45af873df904c2bdbef81f246d26f4b40df949e12bdac18533d4e11c608cc31d60cb591c40a7b386fa1c753336d7220a35118d4919b45eff32aab684ee54c0a263c806aabac2f66cb052f847c62c6691de14e97aa7e9dc8ecf0cd50540246d2b746e41e5b4e2c095039dfe0f71db6265f7580d098be40ef36faee5d1695830d4242a23e541e6ce9fa1998d8961ef4fe3c8e8fbb566f148c8befc229614a4b7f80d237b8abc6fc0407de31d6e5532f360d379f20f054692b47207922fe6c14eba96c9a7ae906abc1ae1ae8c4fae92883cfa1978a04bb000000000000000000000000000000884efcecca45ea4ab2ec097668456a6ff12854997f5aed737d5205ace5c0b64f87ef10784d0479cb44ca077e0c4ce6ff880e2ce3de63853a9740e9233683bfc8636bee293aeeb680b399a296e6f44c07b5fc5d9d359af007f23004a7acb6df23664ea209620b4fe0f4df81c33bd8ca2335cb4b50881937379b45a301175c3e8eb32970564ec8e25c46ee3bae079faedaad94276cfa251be8256c4c37fc84a25c3a2feb39e94a5266a10716d4a3cef499fa176018054e9149a1c9d20a809ce3"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b40800000000000073113c00000000008510000002000000b7000000000000009500c200000000009500001200"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000005c0)={@fallback=r3, 0x3b, 0x1, 0x1707, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.543910156s ago: executing program 3 (id=12012): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0xb00000000000000, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002d40)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = gettid() sendmsg$unix(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000640)='Q', 0x1}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRESHEX=r0, @ANYRES32=r4, @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="1c000000000000000100000402000000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r4, @ANYBLOB="0000000018"], 0xa0}, 0x4004881) close(r3) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000008c50000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) close(0x4) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, @perf_config_ext={0x6e5a, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, r2, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r8}, 0x18) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x9, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000c07850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @cgroup_sock=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000005c0)={0x0, &(0x7f0000000500)=""/142, &(0x7f0000000680), &(0x7f0000000300)="f0", 0x8, r1}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000001140)='ext4_allocate_inode\x00', r9}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 1.531087587s ago: executing program 5 (id=12013): openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYRES32], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x20f42, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6e5a, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x3) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1}, 0x0, 0x8, 0x9b, 0x0, 0x0, 0x8, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1, 0x0, 0x0, @void, @value}, 0x28) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0xb2321, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0xe) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x66}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x18) 1.223392742s ago: executing program 4 (id=12014): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x4004743d, 0x110e22fff6) write$cgroup_type(r3, &(0x7f0000000280), 0x9) 1.084607823s ago: executing program 4 (id=12015): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00000000000000c8f140a0aad331ff6754696f74e1762653685eb8aa6fdc977fd66da5e2d388ee253e3714255e2b", @ANYRES32=0x1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="00000003000000000000000000000000000000e6", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001400010000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r6], 0x18}, 0x8810) sendmsg$unix(r4, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r6], 0x18}, 0x0) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, 0x0, &(0x7f0000000380)=r1}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)=@generic={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xa, 0x17, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r11}}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x4}, @map_fd={0x18, 0x1b, 0x1, 0x0, r2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000000600)='syzkaller\x00', 0x6, 0xb, &(0x7f0000000800)=""/11, 0x41100, 0x2, '\x00', 0x0, @fallback=0x10, r10, 0x8, &(0x7f0000000840)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000880)={0x5, 0x1, 0x1, 0x4}, 0x10, 0xffffffffffffffff, r9, 0x9, &(0x7f00000008c0)=[r2, r2, r0, r0, r0], &(0x7f0000000900)=[{0x1, 0x2, 0x10, 0x2}, {0x0, 0x2, 0x6, 0xa}, {0x4, 0x3, 0xd, 0x6}, {0x1, 0x2, 0x7, 0x1f}, {0x0, 0x4, 0xe, 0x4}, {0x2, 0x3, 0xf, 0x7}, {0x2, 0x1, 0x9, 0x1}, {0x0, 0x1, 0x9, 0x1}, {0x5, 0x3, 0x5, 0xa}], 0x10, 0xd, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xfffffffe, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r12 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r12, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="f200000000000000b7043569353e43dd45cf9a0800000000ff00938af8ff00000000bfa24988f56d29360ea7eb409de3b1bc3f00000000000007029037caecc9eed98f5103d4f544d462040000000000f085000000210000e0a63f6469ea45daa843d752b6dc97dcdf6787b7ce44e7d46779a4272318a81fdd48f2a9cf36fd72c227e2014baacb9280112c74654c21948e62fd8bca60299334cd2bdde72ef721c0b4f52ef71ecb92b6"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1.070833184s ago: executing program 0 (id=12016): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x430, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 653.25104ms ago: executing program 3 (id=12017): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cff, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 647.99871ms ago: executing program 1 (id=12018): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000980), 0x0, 0x2f, 0xe8034000, 0x0, 0x0, &(0x7f0000000000), &(0x7f00000000c0), 0x5dc}, 0x50) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r3}, &(0x7f0000000a00), &(0x7f0000000a40)=r2}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r3}, &(0x7f0000000880), &(0x7f00000008c0)=r2}, 0x20) openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 616.13035ms ago: executing program 0 (id=12019): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00000000000000c8f140a0aad331ff6754696f74e1762653685eb8aa6fdc977fd66da5e2d388ee253e3714255e2b", @ANYRES32=0x1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="00000003000000000000000000000000000000e6", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, 0x0, &(0x7f0000000380)=r1}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)=@generic={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xa, 0x22, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x4}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffd}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000000600)='syzkaller\x00', 0x6, 0xb, &(0x7f0000000800)=""/11, 0x41100, 0x2, '\x00', 0x0, @fallback=0x10, r5, 0x8, &(0x7f0000000840)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000880)={0x5, 0x1, 0x1, 0x4}, 0x10, 0xffffffffffffffff, r4, 0x9, &(0x7f00000008c0)=[r2, r2, r0, r0, r0], &(0x7f0000000900)=[{0x1, 0x2, 0x10, 0x2}, {0x0, 0x5, 0x6, 0xa}, {0x4, 0x3, 0xd, 0xc}, {0x1, 0x2, 0x7, 0x1f}, {0x0, 0x4, 0xe, 0x4}, {0x2, 0x3, 0xf, 0x7}, {0x2, 0x1, 0x9, 0x1}, {0x0, 0x1, 0x9, 0x1}, {0x5, 0x3, 0x5, 0xa}], 0x10, 0xd, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3b}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="f200000000000000b7043569353e43dd45cf9a0800000000ff00938af8ff00000000bfa24988f56d29360ea7eb409de3b1bc3f00000000000007029037caecc9eed98f5103d4f544d462040000000000f085000000210000e0a63f6469ea45daa843d752b6dc97dcdf6787b7ce44e7d46779a4272318a81fdd48f2a9cf36fd72c227e2014baacb9280112c74654c21948e62fd8bca60299334cd2bdde72ef721c0b4f52ef71ecb92b6"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r9) 615.49464ms ago: executing program 5 (id=12020): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xc, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b402000000400000611170000000000085000000000000009500000000000000"], &(0x7f0000000380)='GPL\x00', 0x5, 0xff92, &(0x7f00000003c0)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x64000000}, 0x36c, 0x10, &(0x7f0000000000), 0x26, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 613.95792ms ago: executing program 1 (id=12021): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r0}, 0x18) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000001580)=ANY=[@ANYRES32=r1], &(0x7f0000000680)=""/182, 0x2e, 0xb6, 0x1, 0x0, 0x0, @void, @value}, 0x28) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0xc, 0x10, &(0x7f0000000e40)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000008000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r3, 0xfffff000, 0xe, 0x0, &(0x7f0000000300)="61df712bc884fed5722780b605a7", 0x0, 0x2f00, 0x7000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000380)='syz0\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r5, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x18) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x10, 0x0, 0x8000, 0x2090, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000780)=ANY=[@ANYBLOB="18002db6575b357a49c0000000000000181100005a5e3c466031db055f4a772e7e660cb4fa7d96e4b399c25e30fa613082c083f7d7aff32af02a10edd822aaf69eef817b01d7c79dc12b6c8c7619998f6e74b3c93bf111a5518825b804c79d27c40c9a7255dbe7646d3b4a155e7a5fe22340d9c765fcc0283d5ffee4a0c1edd9d0d1f7776d351c6ac5ffee01ac63c90754b0f37f710fc448f9512f07171088160af5f2a32aec4a6410d66cf90faa2e", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r7}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x8000, 0x0, 0x0, 0x0, 0xff, 0x196e, 0x0, 0x0, 0x0, 0x0, 0xa9fd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 613.505771ms ago: executing program 4 (id=12022): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000180), 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/178, 0xb2}, {&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/241, 0xf1}, {&(0x7f00000003c0)=""/86, 0x56}], 0x5, &(0x7f0000000640)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xa0}, 0x40010060) 559.608721ms ago: executing program 5 (id=12023): bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="0a00000007000000ff0f000007"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x7, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000000100850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r2}, 0x18) unlink(&(0x7f0000000200)='./cgroup\x00') r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000400000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 558.961671ms ago: executing program 3 (id=12024): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x4004743d, 0x110e22fff6) write$cgroup_type(r3, &(0x7f0000000280), 0x9) 557.816201ms ago: executing program 4 (id=12025): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x4004743d, 0x110e22fff6) write$cgroup_type(r3, &(0x7f0000000280), 0x9) 100.463028ms ago: executing program 3 (id=12026): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x1100000000000000, &(0x7f0000000440)=@base={0x18, 0x4, 0x2, 0x0, 0x201, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 55.451579ms ago: executing program 1 (id=12027): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) r3 = perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd77, 0x4, @perf_bp={&(0x7f00000001c0), 0x7}, 0x8, 0xc8, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="7817884974f664cecc73cde72b8b2108000600000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=r3, @ANYRES32, @ANYBLOB="900000000000001a7255c6b58d000000000800"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r5}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r6}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x3}, 0x40000002) write$cgroup_subtree(r9, &(0x7f0000000540)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8102033200fe08000e7f0061cd915a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r10 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x183081, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f0000000b00)=ANY=[@ANYBLOB="18000000000000000000000000000010180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='mm_page_alloc\x00', r11}, 0x10) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r12) r13 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r13, 0xc004743e, 0x110e22fff6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00'}, 0x10) ioctl$TUNGETVNETLE(r12, 0x40047451, &(0x7f0000000180)) close(r10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000600)=""/8, 0x80, 0x8, 0x0, 0x9, 0x0, @void, @value}, 0x28) 0s ago: executing program 4 (id=12028): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="0a00000007000000ff0f000007"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r3}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r4}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000500000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r8, 0x0, 0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000002"], 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000001c0)={&(0x7f0000000280)="3e638c455724232249fd46f05195ec1f95bda7f62e95822481214313df76f0cfd59ffe62ebfbf52ae90cc6c0f4132a75a4c08334dbdbb15a0eefbe8fe4f82915bd6e9d80c90786ac58605942ba25e5f7f6f09e63dc674c2ba3510b9a173b220771feb70d4a934d1cdb2ed8f82dcc11e5cf54bf6692069cf5499aab6055d092a76400b83f10ae3aaed06b3ee9d3c08cd2d775e7aa7b4bf659933bcd163aa104d16f0b9b0d5cbb97b57a3fca5c964f0eaf905a1ca3aeb3f060ecad9963df6100592c63", &(0x7f0000000000)=""/49, &(0x7f0000000040)="c43c62cffc6ee4f710db", &(0x7f0000000380)="e4ddb82ac5fb1b2537476e1c7ccb9e4270e999998d096f0cc70ed9cd8f4c67096b2538ee0b2cb5338204bc8ca2f612b597aa73010945267cc52c09a27e35839cadb8207d6da1b483698059c376420f33491fb32a45dfd8c7c78445318160d67f26b1d48072258eed99f88b22dd9c1bd3b71c6a695c12939d01376ef85f4a5d45f3", 0x401, r0, 0x4}, 0x38) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r9}, 0x10) mkdir(0x0, 0x0) kernel console output (not intermixed with test programs): 42257][T28250] device pim6reg1 entered promiscuous mode [ 1065.330333][T28246] bridge0: port 1(bridge_slave_0) entered blocking state [ 1065.380135][T28246] bridge0: port 1(bridge_slave_0) entered disabled state [ 1065.431569][T28246] device bridge_slave_0 entered promiscuous mode [ 1065.501299][T28246] bridge0: port 2(bridge_slave_1) entered blocking state [ 1065.577385][T28246] bridge0: port 2(bridge_slave_1) entered disabled state [ 1065.585000][T28246] device bridge_slave_1 entered promiscuous mode [ 1065.663187][ T349] syzkaller: port 1(erspan0) entered disabled state [ 1065.703694][ T349] device erspan0 left promiscuous mode [ 1065.912918][ T349] syzkaller: port 1(erspan0) entered disabled state [ 1066.207717][ T349] device bridge_slave_1 left promiscuous mode [ 1066.213896][ T349] bridge0: port 2(bridge_slave_1) entered disabled state [ 1066.246640][ T349] device bridge_slave_0 left promiscuous mode [ 1066.252868][ T349] bridge0: port 1(bridge_slave_0) entered disabled state [ 1066.370205][ T349] device veth0_vlan left promiscuous mode [ 1067.234951][T28290] device pim6reg1 entered promiscuous mode [ 1067.375060][T20303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1067.388914][T20303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1067.467361][T20303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1067.516806][T20303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1067.567266][T20303] bridge0: port 1(bridge_slave_0) entered blocking state [ 1067.574378][T20303] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1067.700403][T20303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1067.790790][T20303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1067.887775][T20303] bridge0: port 2(bridge_slave_1) entered blocking state [ 1067.894879][T20303] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1067.958514][T20303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1068.046891][T20303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1068.085487][T20303] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1068.135995][T20303] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1068.192868][T28246] device veth0_vlan entered promiscuous mode [ 1068.286967][T20303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1068.309445][T20303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1068.347976][T20303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1068.391699][T20303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1068.474413][T20303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1068.514476][T20303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1068.558665][T28246] device veth1_macvtap entered promiscuous mode [ 1068.610905][T20303] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1068.621557][T20303] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1068.660580][T20303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1068.814338][T28311] device pim6reg1 entered promiscuous mode [ 1068.908945][T20303] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1068.929689][T20303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1070.225859][T28350] device pim6reg1 entered promiscuous mode [ 1070.579365][T28355] device pim6reg1 entered promiscuous mode [ 1071.537683][T28381] device pim6reg1 entered promiscuous mode [ 1071.660947][T28386] device pim6reg1 entered promiscuous mode [ 1072.380539][T28415] syz.5.10193[28415] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1072.380608][T28415] syz.5.10193[28415] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1072.437637][T28415] device pim6reg1 entered promiscuous mode [ 1072.998258][T28438] device pim6reg1 entered promiscuous mode [ 1073.183151][T28445] device pim6reg1 entered promiscuous mode [ 1073.867522][T28464] device pim6reg1 entered promiscuous mode [ 1074.284195][T28473] device pim6reg1 entered promiscuous mode [ 1074.344638][T28486] device pim6reg1 entered promiscuous mode [ 1075.173842][T28496] device pim6reg1 entered promiscuous mode [ 1076.133404][T28528] device sit0 entered promiscuous mode [ 1076.956724][T28555] device sit0 left promiscuous mode [ 1077.154985][T28568] device wg2 entered promiscuous mode [ 1077.298805][T28572] device pim6reg1 entered promiscuous mode [ 1077.532537][T28579] device pim6reg1 entered promiscuous mode [ 1078.134879][T28604] device sit0 entered promiscuous mode [ 1078.134995][T28607] FAULT_INJECTION: forcing a failure. [ 1078.134995][T28607] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1078.236312][T28607] CPU: 0 PID: 28607 Comm: syz.5.10261 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1078.246429][T28607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1078.256498][T28607] Call Trace: [ 1078.259788][T28607] [ 1078.262731][T28607] __dump_stack+0x21/0x30 [ 1078.267086][T28607] dump_stack_lvl+0xee/0x150 [ 1078.271702][T28607] ? show_regs_print_info+0x20/0x20 [ 1078.276922][T28607] dump_stack+0x15/0x20 [ 1078.281100][T28607] should_fail+0x3c1/0x510 [ 1078.285531][T28607] should_fail_alloc_page+0x55/0x80 [ 1078.290747][T28607] prepare_alloc_pages+0x156/0x600 [ 1078.295894][T28607] ? __alloc_pages_bulk+0xab0/0xab0 [ 1078.301115][T28607] ? tun_get_user+0xa9e/0x33c0 [ 1078.305905][T28607] ? tun_chr_write_iter+0x1eb/0x2e0 [ 1078.311120][T28607] ? vfs_write+0x802/0xf70 [ 1078.315555][T28607] ? ksys_write+0x140/0x240 [ 1078.320072][T28607] ? __x64_sys_write+0x7b/0x90 [ 1078.324852][T28607] ? do_syscall_64+0x4c/0xa0 [ 1078.329463][T28607] __alloc_pages+0x10a/0x440 [ 1078.334066][T28607] ? prep_new_page+0x110/0x110 [ 1078.338843][T28607] kmalloc_order+0x4c/0x160 [ 1078.343342][T28607] ? tun_get_user+0x102e/0x33c0 [ 1078.348192][T28607] kmalloc_order_trace+0x18/0xb0 [ 1078.353163][T28607] __kmalloc_track_caller+0x198/0x2c0 [ 1078.358538][T28607] ? tun_get_user+0x102e/0x33c0 [ 1078.363385][T28607] pskb_expand_head+0x11b/0x11d0 [ 1078.368322][T28607] ? __napi_alloc_skb+0x173/0x2e0 [ 1078.373352][T28607] tun_get_user+0x102e/0x33c0 [ 1078.378037][T28607] ? __kasan_init_slab_obj+0x1/0x40 [ 1078.383288][T28607] ? kmem_cache_free+0x100/0x320 [ 1078.388261][T28607] ? tun_do_read+0x1c40/0x1c40 [ 1078.393055][T28607] ? kstrtouint_from_user+0x1a0/0x200 [ 1078.398426][T28607] ? kstrtol_from_user+0x260/0x260 [ 1078.403534][T28607] ? trace_call_bpf+0x361/0x3c0 [ 1078.408391][T28607] ? avc_policy_seqno+0x1b/0x70 [ 1078.413237][T28607] ? selinux_file_permission+0x2aa/0x510 [ 1078.418869][T28607] tun_chr_write_iter+0x1eb/0x2e0 [ 1078.423895][T28607] vfs_write+0x802/0xf70 [ 1078.428159][T28607] ? file_end_write+0x1b0/0x1b0 [ 1078.433029][T28607] ? __fget_files+0x2c4/0x320 [ 1078.437715][T28607] ? __fdget_pos+0x1f7/0x380 [ 1078.442300][T28607] ? ksys_write+0x71/0x240 [ 1078.446717][T28607] ksys_write+0x140/0x240 [ 1078.451039][T28607] ? __ia32_sys_read+0x90/0x90 [ 1078.455796][T28607] ? debug_smp_processor_id+0x17/0x20 [ 1078.461170][T28607] __x64_sys_write+0x7b/0x90 [ 1078.465757][T28607] x64_sys_call+0x8ef/0x9a0 [ 1078.470263][T28607] do_syscall_64+0x4c/0xa0 [ 1078.474677][T28607] ? clear_bhb_loop+0x50/0xa0 [ 1078.479351][T28607] ? clear_bhb_loop+0x50/0xa0 [ 1078.484025][T28607] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1078.489916][T28607] RIP: 0033:0x7f119f346929 [ 1078.494327][T28607] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1078.513930][T28607] RSP: 002b:00007f119d9af038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1078.522339][T28607] RAX: ffffffffffffffda RBX: 00007f119f56dfa0 RCX: 00007f119f346929 [ 1078.530326][T28607] RDX: 000000000000fdef RSI: 0000200000000100 RDI: 0000000000000005 [ 1078.538293][T28607] RBP: 00007f119d9af090 R08: 0000000000000000 R09: 0000000000000000 [ 1078.546281][T28607] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1078.554281][T28607] R13: 0000000000000000 R14: 00007f119f56dfa0 R15: 00007fff37b24f28 [ 1078.562373][T28607] [ 1078.663109][T28615] Ÿë: port 1(syz_tun) entered blocking state [ 1078.677918][T28615] Ÿë: port 1(syz_tun) entered disabled state [ 1078.695481][T28615] device syz_tun entered promiscuous mode [ 1078.772211][T28628] device pim6reg1 entered promiscuous mode [ 1080.765279][T28666] device pim6reg1 entered promiscuous mode [ 1081.025705][T28662] device sit0 left promiscuous mode [ 1082.614231][T28685] bridge0: port 2(bridge_slave_1) entered disabled state [ 1082.623443][T28685] bridge0: port 1(bridge_slave_0) entered disabled state [ 1082.810650][T28690] device bridge_slave_1 left promiscuous mode [ 1082.850927][T28690] bridge0: port 2(bridge_slave_1) entered disabled state [ 1082.867280][T28690] device bridge_slave_0 left promiscuous mode [ 1082.948108][T28690] bridge0: port 1(bridge_slave_0) entered disabled state [ 1083.357668][T28707] FAULT_INJECTION: forcing a failure. [ 1083.357668][T28707] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1083.371013][T28707] CPU: 1 PID: 28707 Comm: syz.3.10298 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1083.381101][T28707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1083.391177][T28707] Call Trace: [ 1083.394468][T28707] [ 1083.397407][T28707] __dump_stack+0x21/0x30 [ 1083.401752][T28707] dump_stack_lvl+0xee/0x150 [ 1083.406358][T28707] ? show_regs_print_info+0x20/0x20 [ 1083.411575][T28707] ? format_decode+0x1bb/0x1520 [ 1083.416443][T28707] dump_stack+0x15/0x20 [ 1083.420607][T28707] should_fail+0x3c1/0x510 [ 1083.425043][T28707] should_fail_usercopy+0x1a/0x20 [ 1083.430100][T28707] _copy_from_user+0x20/0xd0 [ 1083.434704][T28707] kstrtouint_from_user+0xbe/0x200 [ 1083.439828][T28707] ? kstrtol_from_user+0x260/0x260 [ 1083.444950][T28707] ? 0xffffffff81000000 [ 1083.449110][T28707] ? _copy_to_user+0x78/0x90 [ 1083.453720][T28707] ? simple_read_from_buffer+0x10f/0x160 [ 1083.459407][T28707] proc_fail_nth_write+0x85/0x1f0 [ 1083.464450][T28707] ? proc_fail_nth_read+0x210/0x210 [ 1083.469668][T28707] ? security_file_permission+0x79/0xa0 [ 1083.475232][T28707] ? security_file_permission+0x83/0xa0 [ 1083.480879][T28707] ? proc_fail_nth_read+0x210/0x210 [ 1083.486095][T28707] vfs_write+0x3ee/0xf70 [ 1083.490392][T28707] ? file_end_write+0x1b0/0x1b0 [ 1083.495252][T28707] ? __kasan_check_write+0x14/0x20 [ 1083.500402][T28707] ? mutex_lock+0x95/0x1a0 [ 1083.504842][T28707] ? wait_for_completion_killable_timeout+0x10/0x10 [ 1083.511466][T28707] ? __fget_files+0x2c4/0x320 [ 1083.516172][T28707] ? __fdget_pos+0x2d2/0x380 [ 1083.520773][T28707] ? ksys_write+0x71/0x240 [ 1083.525211][T28707] ksys_write+0x140/0x240 [ 1083.529548][T28707] ? __ia32_sys_read+0x90/0x90 [ 1083.534355][T28707] ? debug_smp_processor_id+0x17/0x20 [ 1083.539748][T28707] __x64_sys_write+0x7b/0x90 [ 1083.544534][T28707] x64_sys_call+0x8ef/0x9a0 [ 1083.549046][T28707] do_syscall_64+0x4c/0xa0 [ 1083.553479][T28707] ? clear_bhb_loop+0x50/0xa0 [ 1083.558280][T28707] ? clear_bhb_loop+0x50/0xa0 [ 1083.562979][T28707] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1083.568898][T28707] RIP: 0033:0x7f2450bbd3df [ 1083.573338][T28707] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 1083.592963][T28707] RSP: 002b:00007f244f227030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1083.601405][T28707] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2450bbd3df [ 1083.609396][T28707] RDX: 0000000000000001 RSI: 00007f244f2270a0 RDI: 0000000000000006 [ 1083.617488][T28707] RBP: 00007f244f227090 R08: 0000000000000000 R09: 0000000000000000 [ 1083.625493][T28707] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 1083.633499][T28707] R13: 0000000000000000 R14: 00007f2450de5fa0 R15: 00007ffd3eb1c4c8 [ 1083.641672][T28707] [ 1083.944912][T28708] device pim6reg1 entered promiscuous mode [ 1084.434467][T28730] device pim6reg1 entered promiscuous mode [ 1084.696915][T28733] device pim6reg1 entered promiscuous mode [ 1085.006034][T28738] device pim6reg1 entered promiscuous mode [ 1086.200083][T28770] device pim6reg1 entered promiscuous mode [ 1086.686998][T28792] device pim6reg1 entered promiscuous mode [ 1086.951658][T28804] FAULT_INJECTION: forcing a failure. [ 1086.951658][T28804] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1087.081970][T28804] CPU: 0 PID: 28804 Comm: syz.4.10330 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1087.092096][T28804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1087.102171][T28804] Call Trace: [ 1087.105464][T28804] [ 1087.108399][T28804] __dump_stack+0x21/0x30 [ 1087.112743][T28804] dump_stack_lvl+0xee/0x150 [ 1087.117357][T28804] ? show_regs_print_info+0x20/0x20 [ 1087.122570][T28804] dump_stack+0x15/0x20 [ 1087.126735][T28804] should_fail+0x3c1/0x510 [ 1087.131165][T28804] should_fail_usercopy+0x1a/0x20 [ 1087.136204][T28804] _copy_from_iter+0x21a/0x1050 [ 1087.141116][T28804] ? kasan_quarantine_put+0x34/0x190 [ 1087.146426][T28804] ? copy_mc_pipe_to_iter+0x770/0x770 [ 1087.151823][T28804] ? pskb_expand_head+0x36c/0x11d0 [ 1087.156959][T28804] ? check_stack_object+0x81/0x140 [ 1087.162085][T28804] ? __kasan_check_read+0x11/0x20 [ 1087.167129][T28804] ? __check_object_size+0x2f4/0x3c0 [ 1087.172429][T28804] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 1087.178171][T28804] tun_get_user+0xc3c/0x33c0 [ 1087.182894][T28804] ? __kasan_init_slab_obj+0x1/0x40 [ 1087.188116][T28804] ? kmem_cache_free+0x100/0x320 [ 1087.193074][T28804] ? tun_do_read+0x1c40/0x1c40 [ 1087.197863][T28804] ? kstrtouint_from_user+0x1a0/0x200 [ 1087.203269][T28804] ? kstrtol_from_user+0x260/0x260 [ 1087.208407][T28804] ? trace_call_bpf+0x361/0x3c0 [ 1087.213263][T28804] ? avc_policy_seqno+0x1b/0x70 [ 1087.218113][T28804] ? selinux_file_permission+0x2aa/0x510 [ 1087.223744][T28804] tun_chr_write_iter+0x1eb/0x2e0 [ 1087.228769][T28804] vfs_write+0x802/0xf70 [ 1087.233009][T28804] ? file_end_write+0x1b0/0x1b0 [ 1087.237859][T28804] ? __fget_files+0x2c4/0x320 [ 1087.242555][T28804] ? __fdget_pos+0x1f7/0x380 [ 1087.247142][T28804] ? ksys_write+0x71/0x240 [ 1087.251554][T28804] ksys_write+0x140/0x240 [ 1087.255900][T28804] ? __ia32_sys_read+0x90/0x90 [ 1087.260667][T28804] ? debug_smp_processor_id+0x17/0x20 [ 1087.266044][T28804] __x64_sys_write+0x7b/0x90 [ 1087.270630][T28804] x64_sys_call+0x8ef/0x9a0 [ 1087.275127][T28804] do_syscall_64+0x4c/0xa0 [ 1087.279537][T28804] ? clear_bhb_loop+0x50/0xa0 [ 1087.284210][T28804] ? clear_bhb_loop+0x50/0xa0 [ 1087.288887][T28804] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1087.294794][T28804] RIP: 0033:0x7f424cd8b929 [ 1087.299207][T28804] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1087.318808][T28804] RSP: 002b:00007f424b3d3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1087.327235][T28804] RAX: ffffffffffffffda RBX: 00007f424cfb3080 RCX: 00007f424cd8b929 [ 1087.335201][T28804] RDX: 000000000000fdef RSI: 0000200000000100 RDI: 0000000000000005 [ 1087.343170][T28804] RBP: 00007f424b3d3090 R08: 0000000000000000 R09: 0000000000000000 [ 1087.351139][T28804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1087.359104][T28804] R13: 0000000000000001 R14: 00007f424cfb3080 R15: 00007ffd75a85a88 [ 1087.367087][T28804] [ 1087.372042][T28806] device pim6reg1 entered promiscuous mode [ 1087.889830][T28818] device pim6reg1 entered promiscuous mode [ 1088.064977][T28833] device pim6reg1 entered promiscuous mode [ 1088.092612][T28844] FAULT_INJECTION: forcing a failure. [ 1088.092612][T28844] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1088.126855][T28844] CPU: 1 PID: 28844 Comm: syz.4.10349 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1088.136967][T28844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1088.147031][T28844] Call Trace: [ 1088.150313][T28844] [ 1088.153244][T28844] __dump_stack+0x21/0x30 [ 1088.157586][T28844] dump_stack_lvl+0xee/0x150 [ 1088.162196][T28844] ? show_regs_print_info+0x20/0x20 [ 1088.167394][T28844] ? get_page_from_freelist+0x2cc5/0x2d50 [ 1088.173121][T28844] dump_stack+0x15/0x20 [ 1088.177276][T28844] should_fail+0x3c1/0x510 [ 1088.181693][T28844] should_fail_alloc_page+0x55/0x80 [ 1088.186890][T28844] prepare_alloc_pages+0x156/0x600 [ 1088.192023][T28844] ? __alloc_pages_bulk+0xab0/0xab0 [ 1088.197220][T28844] ? __kasan_slab_alloc+0xcf/0xf0 [ 1088.202243][T28844] __alloc_pages+0x10a/0x440 [ 1088.206830][T28844] ? prep_new_page+0x110/0x110 [ 1088.211592][T28844] ? __alloc_pages+0x18f/0x440 [ 1088.216351][T28844] pte_alloc_one+0x70/0x180 [ 1088.220860][T28844] ? pfn_modify_allowed+0x2f0/0x2f0 [ 1088.226058][T28844] ? _raw_spin_lock+0x8e/0xe0 [ 1088.230732][T28844] ? _raw_spin_trylock_bh+0x130/0x130 [ 1088.236102][T28844] ? __mod_node_page_state+0x9e/0xd0 [ 1088.241386][T28844] ? vma_data_pages+0x58/0xa0 [ 1088.246055][T28844] handle_pte_fault+0x1886/0x2680 [ 1088.251162][T28844] ? _raw_spin_unlock+0x4d/0x70 [ 1088.256017][T28844] ? fault_around_bytes_set+0xc0/0xc0 [ 1088.261391][T28844] do_handle_mm_fault+0x1a6d/0x1d50 [ 1088.266588][T28844] ? stack_trace_save+0xe0/0xe0 [ 1088.271433][T28844] ? arch_stack_walk+0xee/0x140 [ 1088.276284][T28844] ? numa_migrate_prep+0xd0/0xd0 [ 1088.281221][T28844] ? vmacache_update+0xb7/0x120 [ 1088.286068][T28844] ? __find_vma+0x13b/0x150 [ 1088.290572][T28844] do_user_addr_fault+0x841/0x1180 [ 1088.295695][T28844] ? do_kern_addr_fault+0x80/0x80 [ 1088.300728][T28844] ? ioctl_has_perm+0x394/0x4d0 [ 1088.305598][T28844] exc_page_fault+0x51/0xb0 [ 1088.310097][T28844] asm_exc_page_fault+0x27/0x30 [ 1088.314941][T28844] RIP: 0010:__get_user_4+0x1c/0x30 [ 1088.320052][T28844] Code: 01 ca c3 90 90 90 90 90 90 90 90 90 90 90 48 ba fd ef ff ff ff 7f 00 00 48 39 d0 0f 83 90 00 00 00 48 19 d2 48 21 d0 0f 01 cb <8b> 10 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 90 90 48 ba [ 1088.339652][T28844] RSP: 0018:ffffc90000a57d38 EFLAGS: 00050206 [ 1088.345719][T28844] RAX: 000000110e22fff6 RBX: ffff88812dd84000 RCX: 0000000000000005 [ 1088.353691][T28844] RDX: ffffffffffffffff RSI: ffffffff86acdfd0 RDI: 00000000c004743e [ 1088.361660][T28844] RBP: ffffc90000a57e80 R08: ffff888133a3cf00 R09: 0000000000000003 [ 1088.369643][T28844] R10: 00000000c004743e R11: 0000000000000000 R12: 00000000c004743e [ 1088.377609][T28844] R13: ffff888120be2b58 R14: ffff888120be2a80 R15: 1ffff1102417c56b [ 1088.385584][T28844] ? ppp_ioctl+0x381/0x16a0 [ 1088.390090][T28844] ? mutex_unlock+0x89/0x220 [ 1088.394673][T28844] ? __mutex_lock_slowpath+0x10/0x10 [ 1088.399953][T28844] ? ppp_poll+0x250/0x250 [ 1088.404276][T28844] ? security_file_ioctl+0x84/0xa0 [ 1088.409384][T28844] ? ppp_poll+0x250/0x250 [ 1088.413703][T28844] __se_sys_ioctl+0x121/0x1a0 [ 1088.418393][T28844] __x64_sys_ioctl+0x7b/0x90 [ 1088.422991][T28844] x64_sys_call+0x2f/0x9a0 [ 1088.427439][T28844] do_syscall_64+0x4c/0xa0 [ 1088.431863][T28844] ? clear_bhb_loop+0x50/0xa0 [ 1088.436544][T28844] ? clear_bhb_loop+0x50/0xa0 [ 1088.441222][T28844] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1088.447119][T28844] RIP: 0033:0x7f424cd8b929 [ 1088.451529][T28844] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1088.471145][T28844] RSP: 002b:00007f424b3f4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1088.479550][T28844] RAX: ffffffffffffffda RBX: 00007f424cfb2fa0 RCX: 00007f424cd8b929 [ 1088.487519][T28844] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 000000000000000c [ 1088.495487][T28844] RBP: 00007f424b3f4090 R08: 0000000000000000 R09: 0000000000000000 [ 1088.503454][T28844] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1088.511419][T28844] R13: 0000000000000000 R14: 00007f424cfb2fa0 R15: 00007ffd75a85a88 [ 1088.519394][T28844] [ 1089.290733][T28882] device pim6reg1 entered promiscuous mode [ 1089.826911][T28885] device pim6reg1 entered promiscuous mode [ 1090.048310][T28894] device pim6reg1 entered promiscuous mode [ 1090.058366][T28895] device wg2 entered promiscuous mode [ 1091.152104][T28917] FAULT_INJECTION: forcing a failure. [ 1091.152104][T28917] name failslab, interval 1, probability 0, space 0, times 0 [ 1091.292411][T28917] CPU: 0 PID: 28917 Comm: syz.3.10372 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1091.302525][T28917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1091.312579][T28917] Call Trace: [ 1091.315850][T28917] [ 1091.318806][T28917] __dump_stack+0x21/0x30 [ 1091.323131][T28917] dump_stack_lvl+0xee/0x150 [ 1091.327806][T28917] ? show_regs_print_info+0x20/0x20 [ 1091.332992][T28917] ? __kasan_check_write+0x14/0x20 [ 1091.338118][T28917] ? rwsem_read_trylock+0x29a/0x620 [ 1091.343321][T28917] dump_stack+0x15/0x20 [ 1091.347468][T28917] should_fail+0x3c1/0x510 [ 1091.351875][T28917] __should_failslab+0xa4/0xe0 [ 1091.356639][T28917] should_failslab+0x9/0x20 [ 1091.361171][T28917] slab_pre_alloc_hook+0x3b/0xe0 [ 1091.366143][T28917] ? __alloc_skb+0xe0/0x740 [ 1091.370660][T28917] kmem_cache_alloc+0x44/0x260 [ 1091.375460][T28917] ? br_netlink_fini+0x30/0x30 [ 1091.380241][T28917] __alloc_skb+0xe0/0x740 [ 1091.384649][T28917] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 1091.389962][T28917] rtnetlink_event+0xd2/0x1a0 [ 1091.394660][T28917] raw_notifier_call_chain+0x90/0x100 [ 1091.400064][T28917] dev_set_mac_address+0x318/0x420 [ 1091.405197][T28917] ? dev_pre_changeaddr_notify+0x1c0/0x1c0 [ 1091.411023][T28917] dev_set_mac_address_user+0x31/0x50 [ 1091.416420][T28917] dev_ifsioc+0x757/0xe70 [ 1091.420767][T28917] ? dev_ioctl+0xd10/0xd10 [ 1091.425193][T28917] ? __kasan_check_write+0x14/0x20 [ 1091.430324][T28917] ? mutex_lock+0x95/0x1a0 [ 1091.434758][T28917] ? wait_for_completion_killable_timeout+0x10/0x10 [ 1091.441378][T28917] ? dev_get_by_name_rcu+0xc8/0xf0 [ 1091.446521][T28917] dev_ioctl+0x560/0xd10 [ 1091.450780][T28917] sock_do_ioctl+0x22e/0x300 [ 1091.455383][T28917] ? sock_show_fdinfo+0xa0/0xa0 [ 1091.460259][T28917] ? selinux_file_ioctl+0x377/0x480 [ 1091.465486][T28917] sock_ioctl+0x4bc/0x6b0 [ 1091.469838][T28917] ? sock_poll+0x3d0/0x3d0 [ 1091.474270][T28917] ? __fget_files+0x2c4/0x320 [ 1091.478969][T28917] ? security_file_ioctl+0x84/0xa0 [ 1091.484097][T28917] ? sock_poll+0x3d0/0x3d0 [ 1091.488523][T28917] __se_sys_ioctl+0x121/0x1a0 [ 1091.493219][T28917] __x64_sys_ioctl+0x7b/0x90 [ 1091.497831][T28917] x64_sys_call+0x2f/0x9a0 [ 1091.502258][T28917] do_syscall_64+0x4c/0xa0 [ 1091.506679][T28917] ? clear_bhb_loop+0x50/0xa0 [ 1091.511373][T28917] ? clear_bhb_loop+0x50/0xa0 [ 1091.516078][T28917] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1091.521991][T28917] RIP: 0033:0x7f2450bbe929 [ 1091.526432][T28917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1091.546057][T28917] RSP: 002b:00007f244f227038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1091.554493][T28917] RAX: ffffffffffffffda RBX: 00007f2450de5fa0 RCX: 00007f2450bbe929 [ 1091.562495][T28917] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000009 [ 1091.570487][T28917] RBP: 00007f244f227090 R08: 0000000000000000 R09: 0000000000000000 [ 1091.578483][T28917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1091.586475][T28917] R13: 0000000000000000 R14: 00007f2450de5fa0 R15: 00007ffd3eb1c4c8 [ 1091.594482][T28917] [ 1092.067859][ T30] audit: type=1400 audit(1750744361.761:164): avc: denied { read } for pid=28925 comm="syz.5.10377" name="cgroup.subtree_control" dev="cgroup2" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 1092.325018][T28938] device pim6reg1 entered promiscuous mode [ 1094.043026][T28993] device pim6reg1 entered promiscuous mode [ 1094.619509][T29000] FAULT_INJECTION: forcing a failure. [ 1094.619509][T29000] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1094.692243][T29000] CPU: 1 PID: 29000 Comm: syz.3.10402 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1094.702503][T29000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1094.712580][T29000] Call Trace: [ 1094.715873][T29000] [ 1094.718815][T29000] __dump_stack+0x21/0x30 [ 1094.723163][T29000] dump_stack_lvl+0xee/0x150 [ 1094.727766][T29000] ? show_regs_print_info+0x20/0x20 [ 1094.732983][T29000] ? __hrtimer_run_queues+0x97a/0x9e0 [ 1094.738382][T29000] dump_stack+0x15/0x20 [ 1094.742555][T29000] should_fail+0x3c1/0x510 [ 1094.746997][T29000] should_fail_usercopy+0x1a/0x20 [ 1094.752051][T29000] _copy_from_user+0x20/0xd0 [ 1094.756664][T29000] __sys_bpf+0x233/0x730 [ 1094.760927][T29000] ? bpf_link_show_fdinfo+0x310/0x310 [ 1094.766319][T29000] __x64_sys_bpf+0x7c/0x90 [ 1094.770753][T29000] x64_sys_call+0x4b9/0x9a0 [ 1094.775268][T29000] do_syscall_64+0x4c/0xa0 [ 1094.779698][T29000] ? clear_bhb_loop+0x50/0xa0 [ 1094.784378][T29000] ? clear_bhb_loop+0x50/0xa0 [ 1094.789064][T29000] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1094.794960][T29000] RIP: 0033:0x7f2450bbe929 [ 1094.799371][T29000] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1094.818995][T29000] RSP: 002b:00007f244f227038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1094.827413][T29000] RAX: ffffffffffffffda RBX: 00007f2450de5fa0 RCX: 00007f2450bbe929 [ 1094.835386][T29000] RDX: 0000000000000078 RSI: 0000200000000240 RDI: 0000000000000005 [ 1094.843355][T29000] RBP: 00007f244f227090 R08: 0000000000000000 R09: 0000000000000000 [ 1094.851334][T29000] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1094.859299][T29000] R13: 0000000000000000 R14: 00007f2450de5fa0 R15: 00007ffd3eb1c4c8 [ 1094.867275][T29000] [ 1095.284518][T29017] device pim6reg1 entered promiscuous mode [ 1095.343454][T29026] bridge0: port 1(bridge_slave_0) entered disabled state [ 1095.411775][T29021] device pim6reg1 entered promiscuous mode [ 1095.480667][T29028] device veth0_vlan left promiscuous mode [ 1095.499345][T29028] device veth0_vlan entered promiscuous mode [ 1095.539976][T20303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1095.548805][T20303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1095.556829][T20303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1096.002220][T29052] FAULT_INJECTION: forcing a failure. [ 1096.002220][T29052] name failslab, interval 1, probability 0, space 0, times 0 [ 1096.106274][T29052] CPU: 1 PID: 29052 Comm: syz.5.10422 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1096.116479][T29052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1096.126558][T29052] Call Trace: [ 1096.129853][T29052] [ 1096.132802][T29052] __dump_stack+0x21/0x30 [ 1096.137140][T29052] dump_stack_lvl+0xee/0x150 [ 1096.141748][T29052] ? show_regs_print_info+0x20/0x20 [ 1096.146982][T29052] dump_stack+0x15/0x20 [ 1096.151149][T29052] should_fail+0x3c1/0x510 [ 1096.155584][T29052] __should_failslab+0xa4/0xe0 [ 1096.160365][T29052] should_failslab+0x9/0x20 [ 1096.164884][T29052] slab_pre_alloc_hook+0x3b/0xe0 [ 1096.169965][T29052] __kmalloc+0x6d/0x2c0 [ 1096.174138][T29052] ? kvmalloc_node+0x242/0x330 [ 1096.178925][T29052] kvmalloc_node+0x242/0x330 [ 1096.183526][T29052] ? vm_mmap+0xb0/0xb0 [ 1096.187604][T29052] ? exc_page_fault+0x30/0xb0 [ 1096.192297][T29052] ? asm_exc_page_fault+0x27/0x30 [ 1096.197336][T29052] alloc_netdev_mqs+0x8d/0xc90 [ 1096.202119][T29052] ? ppp_ccp_closed+0x290/0x290 [ 1096.206985][T29052] ppp_ioctl+0x5aa/0x16a0 [ 1096.211326][T29052] ? mutex_unlock+0x89/0x220 [ 1096.215935][T29052] ? ppp_poll+0x250/0x250 [ 1096.220290][T29052] ? security_file_ioctl+0x84/0xa0 [ 1096.225422][T29052] ? ppp_poll+0x250/0x250 [ 1096.229766][T29052] __se_sys_ioctl+0x121/0x1a0 [ 1096.234469][T29052] __x64_sys_ioctl+0x7b/0x90 [ 1096.239079][T29052] x64_sys_call+0x2f/0x9a0 [ 1096.243518][T29052] do_syscall_64+0x4c/0xa0 [ 1096.247956][T29052] ? clear_bhb_loop+0x50/0xa0 [ 1096.252648][T29052] ? clear_bhb_loop+0x50/0xa0 [ 1096.257347][T29052] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1096.263265][T29052] RIP: 0033:0x7f119f346929 [ 1096.267697][T29052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1096.287336][T29052] RSP: 002b:00007f119d9af038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1096.295776][T29052] RAX: ffffffffffffffda RBX: 00007f119f56dfa0 RCX: 00007f119f346929 [ 1096.303774][T29052] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 000000000000000c [ 1096.311851][T29052] RBP: 00007f119d9af090 R08: 0000000000000000 R09: 0000000000000000 [ 1096.319845][T29052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1096.327839][T29052] R13: 0000000000000000 R14: 00007f119f56dfa0 R15: 00007fff37b24f28 [ 1096.335843][T29052] [ 1097.839370][T29097] device pim6reg1 entered promiscuous mode [ 1099.432550][T29136] device pim6reg1 entered promiscuous mode [ 1100.071753][T29138] syz.1.10451[29138] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1100.074497][T29140] device pim6reg1 entered promiscuous mode [ 1101.644237][T29181] GPL: port 1(erspan0) entered blocking state [ 1101.656401][T29181] GPL: port 1(erspan0) entered disabled state [ 1101.749117][T29181] device erspan0 entered promiscuous mode [ 1101.820676][T29185] GPL: port 1(erspan0) entered blocking state [ 1101.826929][T29185] GPL: port 1(erspan0) entered forwarding state [ 1102.340266][T29203] device pim6reg1 entered promiscuous mode [ 1104.159492][T29235] device pim6reg1 entered promiscuous mode [ 1104.574991][T29258] device sit0 entered promiscuous mode [ 1105.284718][T29273] FAULT_INJECTION: forcing a failure. [ 1105.284718][T29273] name failslab, interval 1, probability 0, space 0, times 0 [ 1105.378672][T29273] CPU: 0 PID: 29273 Comm: syz.0.10500 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1105.388827][T29273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1105.398907][T29273] Call Trace: [ 1105.402210][T29273] [ 1105.405156][T29273] __dump_stack+0x21/0x30 [ 1105.409506][T29273] dump_stack_lvl+0xee/0x150 [ 1105.414110][T29273] ? show_regs_print_info+0x20/0x20 [ 1105.419325][T29273] ? skb_put+0x10e/0x1f0 [ 1105.423585][T29273] ? memcpy+0x56/0x70 [ 1105.427586][T29273] dump_stack+0x15/0x20 [ 1105.431773][T29273] should_fail+0x3c1/0x510 [ 1105.436207][T29273] ? netlink_trim+0x193/0x230 [ 1105.440912][T29273] __should_failslab+0xa4/0xe0 [ 1105.445702][T29273] should_failslab+0x9/0x20 [ 1105.450217][T29273] slab_pre_alloc_hook+0x3b/0xe0 [ 1105.455172][T29273] ? netlink_trim+0x193/0x230 [ 1105.459868][T29273] ? netlink_trim+0x193/0x230 [ 1105.464549][T29273] __kmalloc_track_caller+0x6c/0x2c0 [ 1105.469834][T29273] ? netlink_trim+0x193/0x230 [ 1105.474516][T29273] ? netlink_trim+0x193/0x230 [ 1105.479196][T29273] pskb_expand_head+0x11b/0x11d0 [ 1105.484153][T29273] netlink_trim+0x193/0x230 [ 1105.488658][T29273] netlink_broadcast_filtered+0x75/0x1250 [ 1105.494380][T29273] ? __kmalloc_track_caller+0x13c/0x2c0 [ 1105.499929][T29273] ? rtmsg_ifinfo_build_skb+0xd8/0x180 [ 1105.505509][T29273] nlmsg_notify+0xed/0x1b0 [ 1105.509940][T29273] rtnetlink_event+0x13a/0x1a0 [ 1105.514722][T29273] raw_notifier_call_chain+0x90/0x100 [ 1105.520110][T29273] dev_set_mac_address+0x318/0x420 [ 1105.525240][T29273] ? dev_pre_changeaddr_notify+0x1c0/0x1c0 [ 1105.531074][T29273] dev_set_mac_address_user+0x31/0x50 [ 1105.536455][T29273] dev_ifsioc+0x757/0xe70 [ 1105.540790][T29273] ? dev_ioctl+0xd10/0xd10 [ 1105.545207][T29273] ? __kasan_check_write+0x14/0x20 [ 1105.550326][T29273] ? mutex_lock+0x95/0x1a0 [ 1105.554743][T29273] ? wait_for_completion_killable_timeout+0x10/0x10 [ 1105.561393][T29273] ? dev_get_by_name_rcu+0xc8/0xf0 [ 1105.566509][T29273] dev_ioctl+0x560/0xd10 [ 1105.570763][T29273] sock_do_ioctl+0x22e/0x300 [ 1105.575368][T29273] ? sock_show_fdinfo+0xa0/0xa0 [ 1105.580228][T29273] ? selinux_file_ioctl+0x377/0x480 [ 1105.585448][T29273] sock_ioctl+0x4bc/0x6b0 [ 1105.589802][T29273] ? sock_poll+0x3d0/0x3d0 [ 1105.594217][T29273] ? __fget_files+0x2c4/0x320 [ 1105.598898][T29273] ? security_file_ioctl+0x84/0xa0 [ 1105.604007][T29273] ? sock_poll+0x3d0/0x3d0 [ 1105.608425][T29273] __se_sys_ioctl+0x121/0x1a0 [ 1105.613099][T29273] __x64_sys_ioctl+0x7b/0x90 [ 1105.617684][T29273] x64_sys_call+0x2f/0x9a0 [ 1105.622095][T29273] do_syscall_64+0x4c/0xa0 [ 1105.626503][T29273] ? clear_bhb_loop+0x50/0xa0 [ 1105.631187][T29273] ? clear_bhb_loop+0x50/0xa0 [ 1105.636312][T29273] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1105.642215][T29273] RIP: 0033:0x7fc7dfda0929 [ 1105.646633][T29273] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1105.666242][T29273] RSP: 002b:00007fc7de409038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1105.674665][T29273] RAX: ffffffffffffffda RBX: 00007fc7dffc7fa0 RCX: 00007fc7dfda0929 [ 1105.682648][T29273] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000009 [ 1105.690626][T29273] RBP: 00007fc7de409090 R08: 0000000000000000 R09: 0000000000000000 [ 1105.698596][T29273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1105.706588][T29273] R13: 0000000000000000 R14: 00007fc7dffc7fa0 R15: 00007ffcd415fc68 [ 1105.714565][T29273] [ 1106.079189][T29299] device pim6reg1 entered promiscuous mode [ 1107.087611][T29331] device sit0 left promiscuous mode [ 1107.175595][T29336] device pim6reg1 entered promiscuous mode [ 1108.920192][T29389] device pim6reg1 entered promiscuous mode [ 1109.094936][T29398] device pim6reg1 entered promiscuous mode [ 1109.173514][T29403] device sit0 entered promiscuous mode [ 1110.152886][T29443] device pim6reg1 entered promiscuous mode [ 1111.971820][T29496] FAULT_INJECTION: forcing a failure. [ 1111.971820][T29496] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1112.128766][T29496] CPU: 1 PID: 29496 Comm: syz.1.10579 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1112.138887][T29496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1112.148978][T29496] Call Trace: [ 1112.152264][T29496] [ 1112.155207][T29496] __dump_stack+0x21/0x30 [ 1112.159577][T29496] dump_stack_lvl+0xee/0x150 [ 1112.164186][T29496] ? show_regs_print_info+0x20/0x20 [ 1112.169418][T29496] dump_stack+0x15/0x20 [ 1112.173589][T29496] should_fail+0x3c1/0x510 [ 1112.178022][T29496] should_fail_alloc_page+0x55/0x80 [ 1112.183246][T29496] prepare_alloc_pages+0x156/0x600 [ 1112.188373][T29496] ? __alloc_pages_bulk+0xab0/0xab0 [ 1112.193581][T29496] __alloc_pages+0x10a/0x440 [ 1112.198181][T29496] ? prep_new_page+0x110/0x110 [ 1112.202966][T29496] ? __vmalloc_node_range+0x2d9/0x840 [ 1112.208355][T29496] __vmalloc_node_range+0x440/0x840 [ 1112.213574][T29496] bpf_map_area_alloc+0xd5/0xe0 [ 1112.218440][T29496] ? bpf_ringbuf_alloc+0x37/0x470 [ 1112.223480][T29496] bpf_ringbuf_alloc+0x37/0x470 [ 1112.228334][T29496] ? kmem_cache_alloc_trace+0x119/0x270 [ 1112.233891][T29496] ? ringbuf_map_alloc+0x1a3/0x320 [ 1112.239017][T29496] ? bpf_map_init_from_attr+0x146/0x350 [ 1112.244576][T29496] ringbuf_map_alloc+0x1f6/0x320 [ 1112.249528][T29496] map_create+0x455/0x21b0 [ 1112.253965][T29496] __sys_bpf+0x2cf/0x730 [ 1112.258224][T29496] ? bpf_link_show_fdinfo+0x310/0x310 [ 1112.263620][T29496] ? debug_smp_processor_id+0x17/0x20 [ 1112.269013][T29496] __x64_sys_bpf+0x7c/0x90 [ 1112.273456][T29496] x64_sys_call+0x4b9/0x9a0 [ 1112.278021][T29496] do_syscall_64+0x4c/0xa0 [ 1112.282449][T29496] ? clear_bhb_loop+0x50/0xa0 [ 1112.287133][T29496] ? clear_bhb_loop+0x50/0xa0 [ 1112.291824][T29496] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1112.297731][T29496] RIP: 0033:0x7fb11a3a8929 [ 1112.302162][T29496] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1112.321793][T29496] RSP: 002b:00007fb118a11038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1112.330240][T29496] RAX: ffffffffffffffda RBX: 00007fb11a5cffa0 RCX: 00007fb11a3a8929 [ 1112.338236][T29496] RDX: 0000000000000048 RSI: 00002000000001c0 RDI: 0000000000000000 [ 1112.346228][T29496] RBP: 00007fb118a11090 R08: 0000000000000000 R09: 0000000000000000 [ 1112.354214][T29496] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1112.362195][T29496] R13: 0000000000000000 R14: 00007fb11a5cffa0 R15: 00007ffc090a27d8 [ 1112.370214][T29496] [ 1114.403296][T29517] device pim6reg1 entered promiscuous mode [ 1116.217920][T29556] device pim6reg1 entered promiscuous mode [ 1116.340255][T29564] device pim6reg1 entered promiscuous mode [ 1117.039736][T29589] device pim6reg1 entered promiscuous mode [ 1117.571359][T29608] device pim6reg1 entered promiscuous mode [ 1119.349181][T29654] device pim6reg1 entered promiscuous mode [ 1121.151215][T29706] -: renamed from syzkaller0 [ 1122.217085][T29737] syz.3.10673[29737] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1122.217186][T29737] syz.3.10673[29737] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1122.279357][T29746] device pim6reg1 entered promiscuous mode [ 1122.812329][T29762] device pim6reg1 entered promiscuous mode [ 1123.209158][T29767] device syzkaller0 entered promiscuous mode [ 1125.006570][T29825] FAULT_INJECTION: forcing a failure. [ 1125.006570][T29825] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1125.042573][T29818] device syzkaller0 entered promiscuous mode [ 1125.221946][T29825] CPU: 0 PID: 29825 Comm: syz.4.10705 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1125.232069][T29825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1125.242143][T29825] Call Trace: [ 1125.245438][T29825] [ 1125.248391][T29825] __dump_stack+0x21/0x30 [ 1125.252752][T29825] dump_stack_lvl+0xee/0x150 [ 1125.257353][T29825] ? show_regs_print_info+0x20/0x20 [ 1125.262571][T29825] dump_stack+0x15/0x20 [ 1125.266741][T29825] should_fail+0x3c1/0x510 [ 1125.271266][T29825] should_fail_alloc_page+0x55/0x80 [ 1125.276490][T29825] prepare_alloc_pages+0x156/0x600 [ 1125.281624][T29825] ? __alloc_pages_bulk+0xab0/0xab0 [ 1125.286842][T29825] ? slab_post_alloc_hook+0x4f/0x2b0 [ 1125.292158][T29825] ? alloc_vmap_area+0x17a/0x1990 [ 1125.297196][T29825] ? __get_vm_area_node+0x14e/0x350 [ 1125.302410][T29825] ? __vmalloc_node_range+0xe8/0x840 [ 1125.307719][T29825] ? kvmalloc_node+0x2b8/0x330 [ 1125.312488][T29825] __alloc_pages+0x10a/0x440 [ 1125.317088][T29825] ? prep_new_page+0x110/0x110 [ 1125.321846][T29825] ? __kasan_check_write+0x14/0x20 [ 1125.326969][T29825] __get_free_pages+0x10/0x30 [ 1125.331663][T29825] kasan_populate_vmalloc_pte+0x29/0x120 [ 1125.337315][T29825] __apply_to_page_range+0x8b0/0xbf0 [ 1125.342621][T29825] ? kasan_populate_vmalloc+0x70/0x70 [ 1125.348016][T29825] ? kasan_populate_vmalloc+0x70/0x70 [ 1125.353401][T29825] apply_to_page_range+0x3b/0x50 [ 1125.358360][T29825] kasan_populate_vmalloc+0x60/0x70 [ 1125.363585][T29825] alloc_vmap_area+0x185c/0x1990 [ 1125.368579][T29825] ? vm_map_ram+0xa60/0xa60 [ 1125.373134][T29825] ? kmem_cache_alloc_trace+0x119/0x270 [ 1125.378697][T29825] ? __get_vm_area_node+0x11d/0x350 [ 1125.383914][T29825] __get_vm_area_node+0x14e/0x350 [ 1125.388956][T29825] __vmalloc_node_range+0xe8/0x840 [ 1125.394079][T29825] ? btf_new_fd+0x1ee/0x920 [ 1125.398597][T29825] ? __kasan_kmalloc_large+0x1a/0xb0 [ 1125.403903][T29825] ? kmalloc_order+0xb9/0x160 [ 1125.408594][T29825] ? kmalloc_order_trace+0x18/0xb0 [ 1125.413720][T29825] ? btf_new_fd+0x1ee/0x920 [ 1125.418233][T29825] __vmalloc_node+0x7f/0x90 [ 1125.422750][T29825] ? btf_new_fd+0x1ee/0x920 [ 1125.427268][T29825] kvmalloc_node+0x2b8/0x330 [ 1125.431874][T29825] ? vm_mmap+0xb0/0xb0 [ 1125.435953][T29825] ? btf_new_fd+0x1b2/0x920 [ 1125.440482][T29825] btf_new_fd+0x1ee/0x920 [ 1125.444826][T29825] bpf_btf_load+0x6f/0x90 [ 1125.449305][T29825] __sys_bpf+0x515/0x730 [ 1125.453560][T29825] ? bpf_link_show_fdinfo+0x310/0x310 [ 1125.458954][T29825] ? debug_smp_processor_id+0x17/0x20 [ 1125.464338][T29825] __x64_sys_bpf+0x7c/0x90 [ 1125.468769][T29825] x64_sys_call+0x4b9/0x9a0 [ 1125.473283][T29825] do_syscall_64+0x4c/0xa0 [ 1125.477706][T29825] ? clear_bhb_loop+0x50/0xa0 [ 1125.482390][T29825] ? clear_bhb_loop+0x50/0xa0 [ 1125.487078][T29825] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1125.492986][T29825] RIP: 0033:0x7f424cd8b929 [ 1125.497425][T29825] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1125.517038][T29825] RSP: 002b:00007f424b3d3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1125.525471][T29825] RAX: ffffffffffffffda RBX: 00007f424cfb3080 RCX: 00007f424cd8b929 [ 1125.533465][T29825] RDX: 0000000000000020 RSI: 0000200000000280 RDI: 0000000000000012 [ 1125.541463][T29825] RBP: 00007f424b3d3090 R08: 0000000000000000 R09: 0000000000000000 [ 1125.549465][T29825] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1125.557459][T29825] R13: 0000000000000000 R14: 00007f424cfb3080 R15: 00007ffd75a85a88 [ 1125.565478][T29825] [ 1126.216346][T29844] device pim6reg1 entered promiscuous mode [ 1127.009508][T29883] device pim6reg1 entered promiscuous mode [ 1128.994228][T29927] device pim6reg1 entered promiscuous mode [ 1130.080317][T29951] FAULT_INJECTION: forcing a failure. [ 1130.080317][T29951] name failslab, interval 1, probability 0, space 0, times 0 [ 1130.207884][T29951] CPU: 0 PID: 29951 Comm: syz.3.10748 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1130.218009][T29951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1130.228083][T29951] Call Trace: [ 1130.231391][T29951] [ 1130.234338][T29951] __dump_stack+0x21/0x30 [ 1130.238699][T29951] dump_stack_lvl+0xee/0x150 [ 1130.243312][T29951] ? show_regs_print_info+0x20/0x20 [ 1130.248531][T29951] ? memset+0x35/0x40 [ 1130.252539][T29951] dump_stack+0x15/0x20 [ 1130.256707][T29951] should_fail+0x3c1/0x510 [ 1130.261132][T29951] __should_failslab+0xa4/0xe0 [ 1130.265897][T29951] should_failslab+0x9/0x20 [ 1130.270404][T29951] slab_pre_alloc_hook+0x3b/0xe0 [ 1130.275345][T29951] kmem_cache_alloc_trace+0x48/0x270 [ 1130.280630][T29951] ? register_netdevice+0x26a/0x13a0 [ 1130.285918][T29951] ? dev_prep_valid_name+0x2c5/0x340 [ 1130.291202][T29951] register_netdevice+0x26a/0x13a0 [ 1130.296312][T29951] ? snprintf+0xd7/0x120 [ 1130.300551][T29951] ? netif_stacked_transfer_operstate+0x220/0x220 [ 1130.306966][T29951] ? mutex_unlock+0x89/0x220 [ 1130.311550][T29951] ? __mutex_lock_slowpath+0x10/0x10 [ 1130.316829][T29951] ppp_dev_configure+0x814/0xac0 [ 1130.321767][T29951] ppp_ioctl+0x620/0x16a0 [ 1130.326090][T29951] ? mutex_unlock+0x89/0x220 [ 1130.330705][T29951] ? ppp_poll+0x250/0x250 [ 1130.335124][T29951] ? security_file_ioctl+0x84/0xa0 [ 1130.340238][T29951] ? ppp_poll+0x250/0x250 [ 1130.344559][T29951] __se_sys_ioctl+0x121/0x1a0 [ 1130.349246][T29951] __x64_sys_ioctl+0x7b/0x90 [ 1130.353852][T29951] x64_sys_call+0x2f/0x9a0 [ 1130.358261][T29951] do_syscall_64+0x4c/0xa0 [ 1130.362671][T29951] ? clear_bhb_loop+0x50/0xa0 [ 1130.367363][T29951] ? clear_bhb_loop+0x50/0xa0 [ 1130.372037][T29951] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1130.377933][T29951] RIP: 0033:0x7f2450bbe929 [ 1130.382377][T29951] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1130.401978][T29951] RSP: 002b:00007f244f227038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1130.410395][T29951] RAX: ffffffffffffffda RBX: 00007f2450de5fa0 RCX: 00007f2450bbe929 [ 1130.418378][T29951] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 000000000000000c [ 1130.426351][T29951] RBP: 00007f244f227090 R08: 0000000000000000 R09: 0000000000000000 [ 1130.434331][T29951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1130.442316][T29951] R13: 0000000000000000 R14: 00007f2450de5fa0 R15: 00007ffd3eb1c4c8 [ 1130.450296][T29951] [ 1130.592999][T29959] device sit0 left promiscuous mode [ 1130.714993][T29963] device sit0 entered promiscuous mode [ 1131.044004][T29970] device pim6reg1 entered promiscuous mode [ 1131.106047][T29977] FAULT_INJECTION: forcing a failure. [ 1131.106047][T29977] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1131.126151][T29977] CPU: 0 PID: 29977 Comm: syz.1.10757 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1131.136258][T29977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1131.146316][T29977] Call Trace: [ 1131.149589][T29977] [ 1131.152514][T29977] __dump_stack+0x21/0x30 [ 1131.156841][T29977] dump_stack_lvl+0xee/0x150 [ 1131.161424][T29977] ? show_regs_print_info+0x20/0x20 [ 1131.166624][T29977] ? __hrtimer_run_queues+0x97a/0x9e0 [ 1131.172038][T29977] dump_stack+0x15/0x20 [ 1131.176208][T29977] should_fail+0x3c1/0x510 [ 1131.180630][T29977] should_fail_usercopy+0x1a/0x20 [ 1131.185664][T29977] _copy_from_user+0x20/0xd0 [ 1131.190271][T29977] __sys_bpf+0x233/0x730 [ 1131.194511][T29977] ? bpf_link_show_fdinfo+0x310/0x310 [ 1131.199887][T29977] __x64_sys_bpf+0x7c/0x90 [ 1131.204304][T29977] x64_sys_call+0x4b9/0x9a0 [ 1131.208806][T29977] do_syscall_64+0x4c/0xa0 [ 1131.213227][T29977] ? clear_bhb_loop+0x50/0xa0 [ 1131.217911][T29977] ? clear_bhb_loop+0x50/0xa0 [ 1131.222597][T29977] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1131.228515][T29977] RIP: 0033:0x7fb11a3a8929 [ 1131.232935][T29977] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1131.252549][T29977] RSP: 002b:00007fb118a11038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1131.260976][T29977] RAX: ffffffffffffffda RBX: 00007fb11a5cffa0 RCX: 00007fb11a3a8929 [ 1131.268973][T29977] RDX: 0000000000000080 RSI: 0000200000000640 RDI: 0000000000000005 [ 1131.276956][T29977] RBP: 00007fb118a11090 R08: 0000000000000000 R09: 0000000000000000 [ 1131.284940][T29977] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1131.292924][T29977] R13: 0000000000000000 R14: 00007fb11a5cffa0 R15: 00007ffc090a27d8 [ 1131.301012][T29977] [ 1131.964925][T29977] device pim6reg1 entered promiscuous mode [ 1132.014032][T29983] device pim6reg1 entered promiscuous mode [ 1132.280174][T29995] FAULT_INJECTION: forcing a failure. [ 1132.280174][T29995] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1132.386547][T29995] CPU: 0 PID: 29995 Comm: syz.5.10764 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1132.396677][T29995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1132.406737][T29995] Call Trace: [ 1132.410010][T29995] [ 1132.412948][T29995] __dump_stack+0x21/0x30 [ 1132.417277][T29995] dump_stack_lvl+0xee/0x150 [ 1132.421869][T29995] ? show_regs_print_info+0x20/0x20 [ 1132.427061][T29995] dump_stack+0x15/0x20 [ 1132.431212][T29995] should_fail+0x3c1/0x510 [ 1132.435627][T29995] should_fail_alloc_page+0x55/0x80 [ 1132.440825][T29995] prepare_alloc_pages+0x156/0x600 [ 1132.445940][T29995] ? __alloc_pages_bulk+0xab0/0xab0 [ 1132.451136][T29995] ? slab_post_alloc_hook+0x4f/0x2b0 [ 1132.456428][T29995] ? alloc_vmap_area+0x17a/0x1990 [ 1132.461444][T29995] ? __get_vm_area_node+0x14e/0x350 [ 1132.466640][T29995] ? __vmalloc_node_range+0xe8/0x840 [ 1132.471924][T29995] ? kvmalloc_node+0x2b8/0x330 [ 1132.476687][T29995] __alloc_pages+0x10a/0x440 [ 1132.481273][T29995] ? prep_new_page+0x110/0x110 [ 1132.486030][T29995] ? __kasan_check_write+0x14/0x20 [ 1132.491142][T29995] __get_free_pages+0x10/0x30 [ 1132.495815][T29995] kasan_populate_vmalloc_pte+0x29/0x120 [ 1132.501452][T29995] __apply_to_page_range+0x8b0/0xbf0 [ 1132.506739][T29995] ? kasan_populate_vmalloc+0x70/0x70 [ 1132.512120][T29995] ? kasan_populate_vmalloc+0x70/0x70 [ 1132.517500][T29995] apply_to_page_range+0x3b/0x50 [ 1132.522435][T29995] kasan_populate_vmalloc+0x60/0x70 [ 1132.527634][T29995] alloc_vmap_area+0x185c/0x1990 [ 1132.532575][T29995] ? vm_map_ram+0xa60/0xa60 [ 1132.537072][T29995] ? kmem_cache_alloc_trace+0x119/0x270 [ 1132.542616][T29995] ? __get_vm_area_node+0x11d/0x350 [ 1132.547827][T29995] __get_vm_area_node+0x14e/0x350 [ 1132.552860][T29995] __vmalloc_node_range+0xe8/0x840 [ 1132.557963][T29995] ? btf_new_fd+0x1ee/0x920 [ 1132.562461][T29995] ? __kasan_kmalloc_large+0x1a/0xb0 [ 1132.567741][T29995] ? kmalloc_order+0xb9/0x160 [ 1132.572427][T29995] ? kmalloc_order_trace+0x18/0xb0 [ 1132.577550][T29995] ? btf_new_fd+0x1ee/0x920 [ 1132.582083][T29995] __vmalloc_node+0x7f/0x90 [ 1132.586595][T29995] ? btf_new_fd+0x1ee/0x920 [ 1132.591095][T29995] kvmalloc_node+0x2b8/0x330 [ 1132.595696][T29995] ? vm_mmap+0xb0/0xb0 [ 1132.599786][T29995] ? btf_new_fd+0x1b2/0x920 [ 1132.604308][T29995] btf_new_fd+0x1ee/0x920 [ 1132.608654][T29995] bpf_btf_load+0x6f/0x90 [ 1132.612994][T29995] __sys_bpf+0x515/0x730 [ 1132.617245][T29995] ? bpf_link_show_fdinfo+0x310/0x310 [ 1132.622638][T29995] ? debug_smp_processor_id+0x17/0x20 [ 1132.628020][T29995] __x64_sys_bpf+0x7c/0x90 [ 1132.632450][T29995] x64_sys_call+0x4b9/0x9a0 [ 1132.637064][T29995] do_syscall_64+0x4c/0xa0 [ 1132.641491][T29995] ? clear_bhb_loop+0x50/0xa0 [ 1132.646178][T29995] ? clear_bhb_loop+0x50/0xa0 [ 1132.650863][T29995] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1132.656774][T29995] RIP: 0033:0x7f119f346929 [ 1132.661199][T29995] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1132.680807][T29995] RSP: 002b:00007f119d9af038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1132.689238][T29995] RAX: ffffffffffffffda RBX: 00007f119f56dfa0 RCX: 00007f119f346929 [ 1132.697213][T29995] RDX: 0000000000000020 RSI: 0000200000000280 RDI: 0000000000000012 [ 1132.705178][T29995] RBP: 00007f119d9af090 R08: 0000000000000000 R09: 0000000000000000 [ 1132.713143][T29995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1132.721108][T29995] R13: 0000000000000000 R14: 00007f119f56dfa0 R15: 00007fff37b24f28 [ 1132.729084][T29995] [ 1133.637412][T30033] device pim6reg1 entered promiscuous mode [ 1134.727757][T30078] @0Ù: renamed from bond_slave_1 [ 1135.248924][T30098] FAULT_INJECTION: forcing a failure. [ 1135.248924][T30098] name failslab, interval 1, probability 0, space 0, times 0 [ 1135.266266][T30098] CPU: 0 PID: 30098 Comm: syz.3.10798 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1135.276396][T30098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1135.286468][T30098] Call Trace: [ 1135.289769][T30098] [ 1135.292717][T30098] __dump_stack+0x21/0x30 [ 1135.297061][T30098] dump_stack_lvl+0xee/0x150 [ 1135.301659][T30098] ? show_regs_print_info+0x20/0x20 [ 1135.306878][T30098] dump_stack+0x15/0x20 [ 1135.311144][T30098] should_fail+0x3c1/0x510 [ 1135.315579][T30098] __should_failslab+0xa4/0xe0 [ 1135.320365][T30098] should_failslab+0x9/0x20 [ 1135.324883][T30098] slab_pre_alloc_hook+0x3b/0xe0 [ 1135.329840][T30098] ? kvasprintf_const+0xd7/0x240 [ 1135.334902][T30098] __kmalloc_track_caller+0x6c/0x2c0 [ 1135.340202][T30098] ? x64_sys_call+0x2f/0x9a0 [ 1135.344818][T30098] ? kvasprintf_const+0xd7/0x240 [ 1135.349772][T30098] kstrdup_const+0x55/0x90 [ 1135.354198][T30098] kvasprintf_const+0xd7/0x240 [ 1135.358994][T30098] kobject_set_name_vargs+0x61/0x110 [ 1135.364321][T30098] dev_set_name+0xd1/0x120 [ 1135.368749][T30098] ? get_device+0x30/0x30 [ 1135.373111][T30098] ? pm_runtime_init+0x258/0x330 [ 1135.378062][T30098] ? device_initialize+0x1e1/0x420 [ 1135.383194][T30098] netdev_register_kobject+0xb2/0x320 [ 1135.388823][T30098] ? raw_notifier_call_chain+0xe9/0x100 [ 1135.394408][T30098] register_netdevice+0xdfa/0x13a0 [ 1135.399558][T30098] ? netif_stacked_transfer_operstate+0x220/0x220 [ 1135.406011][T30098] ? mutex_unlock+0x89/0x220 [ 1135.410644][T30098] ? __mutex_lock_slowpath+0x10/0x10 [ 1135.415950][T30098] ppp_dev_configure+0x814/0xac0 [ 1135.420906][T30098] ppp_ioctl+0x620/0x16a0 [ 1135.425250][T30098] ? mutex_unlock+0x89/0x220 [ 1135.429857][T30098] ? ppp_poll+0x250/0x250 [ 1135.434202][T30098] ? security_file_ioctl+0x84/0xa0 [ 1135.439329][T30098] ? ppp_poll+0x250/0x250 [ 1135.443682][T30098] __se_sys_ioctl+0x121/0x1a0 [ 1135.448372][T30098] __x64_sys_ioctl+0x7b/0x90 [ 1135.452973][T30098] x64_sys_call+0x2f/0x9a0 [ 1135.457408][T30098] do_syscall_64+0x4c/0xa0 [ 1135.461843][T30098] ? clear_bhb_loop+0x50/0xa0 [ 1135.466537][T30098] ? clear_bhb_loop+0x50/0xa0 [ 1135.471222][T30098] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1135.477154][T30098] RIP: 0033:0x7f2450bbe929 [ 1135.481604][T30098] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1135.501239][T30098] RSP: 002b:00007f244f227038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1135.509675][T30098] RAX: ffffffffffffffda RBX: 00007f2450de5fa0 RCX: 00007f2450bbe929 [ 1135.517775][T30098] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 000000000000000c [ 1135.525774][T30098] RBP: 00007f244f227090 R08: 0000000000000000 R09: 0000000000000000 [ 1135.533763][T30098] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1135.541830][T30098] R13: 0000000000000000 R14: 00007f2450de5fa0 R15: 00007ffd3eb1c4c8 [ 1135.549830][T30098] [ 1135.653339][T30100] device pim6reg1 entered promiscuous mode [ 1135.804795][T30103] device pim6reg1 entered promiscuous mode [ 1135.855864][T30109] device syzkaller0 entered promiscuous mode [ 1136.760157][T30152] device sit0 left promiscuous mode [ 1136.855024][T30143] device pim6reg1 entered promiscuous mode [ 1136.953441][T30160] FAULT_INJECTION: forcing a failure. [ 1136.953441][T30160] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1136.969625][T30160] CPU: 0 PID: 30160 Comm: syz.4.10823 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1136.979742][T30160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1136.989825][T30160] Call Trace: [ 1136.993116][T30160] [ 1136.996052][T30160] __dump_stack+0x21/0x30 [ 1137.000400][T30160] dump_stack_lvl+0xee/0x150 [ 1137.005007][T30160] ? show_regs_print_info+0x20/0x20 [ 1137.010224][T30160] dump_stack+0x15/0x20 [ 1137.014379][T30160] should_fail+0x3c1/0x510 [ 1137.018796][T30160] should_fail_usercopy+0x1a/0x20 [ 1137.023821][T30160] strncpy_from_user+0x24/0x2e0 [ 1137.028694][T30160] bpf_prog_load+0x1b8/0x1550 [ 1137.033375][T30160] ? map_freeze+0x360/0x360 [ 1137.037882][T30160] ? selinux_bpf+0xc7/0xf0 [ 1137.042307][T30160] ? security_bpf+0x82/0xa0 [ 1137.046807][T30160] __sys_bpf+0x4c3/0x730 [ 1137.051056][T30160] ? bpf_link_show_fdinfo+0x310/0x310 [ 1137.056446][T30160] __x64_sys_bpf+0x7c/0x90 [ 1137.060877][T30160] x64_sys_call+0x4b9/0x9a0 [ 1137.065391][T30160] do_syscall_64+0x4c/0xa0 [ 1137.069809][T30160] ? clear_bhb_loop+0x50/0xa0 [ 1137.074495][T30160] ? clear_bhb_loop+0x50/0xa0 [ 1137.079182][T30160] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1137.085095][T30160] RIP: 0033:0x7f424cd8b929 [ 1137.089534][T30160] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1137.109150][T30160] RSP: 002b:00007f424b3f4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1137.117575][T30160] RAX: ffffffffffffffda RBX: 00007f424cfb2fa0 RCX: 00007f424cd8b929 [ 1137.125553][T30160] RDX: 0000000000000080 RSI: 0000200000000640 RDI: 0000000000000005 [ 1137.133531][T30160] RBP: 00007f424b3f4090 R08: 0000000000000000 R09: 0000000000000000 [ 1137.141511][T30160] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1137.149489][T30160] R13: 0000000000000000 R14: 00007f424cfb2fa0 R15: 00007ffd75a85a88 [ 1137.157475][T30160] [ 1137.223601][T30165] device syzkaller0 entered promiscuous mode [ 1137.257631][T30160] device pim6reg1 entered promiscuous mode [ 1137.331660][T30176] bridge0: port 2(bridge_slave_1) entered blocking state [ 1137.338771][T30176] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1137.346135][T30176] bridge0: port 1(bridge_slave_0) entered blocking state [ 1137.353225][T30176] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1137.413572][T30176] device bridge0 entered promiscuous mode [ 1137.453468][T30184] FAULT_INJECTION: forcing a failure. [ 1137.453468][T30184] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1137.596905][T30184] CPU: 0 PID: 30184 Comm: syz.0.10832 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1137.606966][T30183] device sit0 entered promiscuous mode [ 1137.607024][T30184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1137.607041][T30184] Call Trace: [ 1137.607048][T30184] [ 1137.607064][T30184] __dump_stack+0x21/0x30 [ 1137.607092][T30184] dump_stack_lvl+0xee/0x150 [ 1137.607112][T30184] ? show_regs_print_info+0x20/0x20 [ 1137.643094][T30184] ? ctx_sched_in+0x259/0x2f0 [ 1137.647800][T30184] dump_stack+0x15/0x20 [ 1137.651978][T30184] should_fail+0x3c1/0x510 [ 1137.656414][T30184] should_fail_alloc_page+0x55/0x80 [ 1137.661634][T30184] prepare_alloc_pages+0x156/0x600 [ 1137.666771][T30184] ? __alloc_pages_bulk+0xab0/0xab0 [ 1137.671992][T30184] __alloc_pages+0x10a/0x440 [ 1137.676619][T30184] ? prep_new_page+0x110/0x110 [ 1137.681404][T30184] ? __kasan_check_write+0x14/0x20 [ 1137.686529][T30184] ? release_firmware_map_entry+0x190/0x190 [ 1137.692444][T30184] __get_free_pages+0x10/0x30 [ 1137.697137][T30184] kasan_populate_vmalloc_pte+0x29/0x120 [ 1137.702793][T30184] __apply_to_page_range+0x8b0/0xbf0 [ 1137.708103][T30184] ? kasan_populate_vmalloc+0x70/0x70 [ 1137.713580][T30184] ? kasan_populate_vmalloc+0x70/0x70 [ 1137.718967][T30184] apply_to_page_range+0x3b/0x50 [ 1137.723934][T30184] kasan_populate_vmalloc+0x60/0x70 [ 1137.729148][T30184] alloc_vmap_area+0x185c/0x1990 [ 1137.734112][T30184] ? vm_map_ram+0xa60/0xa60 [ 1137.738646][T30184] ? kmem_cache_alloc_trace+0x119/0x270 [ 1137.744206][T30184] ? __get_vm_area_node+0x11d/0x350 [ 1137.749418][T30184] __get_vm_area_node+0x14e/0x350 [ 1137.754461][T30184] __vmalloc_node_range+0xe8/0x840 [ 1137.759594][T30184] ? btf_new_fd+0x1ee/0x920 [ 1137.764113][T30184] ? __kasan_kmalloc_large+0x1a/0xb0 [ 1137.769418][T30184] ? kmalloc_order+0xb9/0x160 [ 1137.774114][T30184] ? kmalloc_order_trace+0x18/0xb0 [ 1137.779246][T30184] ? btf_new_fd+0x1ee/0x920 [ 1137.783769][T30184] __vmalloc_node+0x7f/0x90 [ 1137.788284][T30184] ? btf_new_fd+0x1ee/0x920 [ 1137.792799][T30184] kvmalloc_node+0x2b8/0x330 [ 1137.797414][T30184] ? vm_mmap+0xb0/0xb0 [ 1137.801499][T30184] ? btf_new_fd+0x1b2/0x920 [ 1137.806032][T30184] btf_new_fd+0x1ee/0x920 [ 1137.810387][T30184] bpf_btf_load+0x6f/0x90 [ 1137.814742][T30184] __sys_bpf+0x515/0x730 [ 1137.819018][T30184] ? bpf_link_show_fdinfo+0x310/0x310 [ 1137.824421][T30184] ? debug_smp_processor_id+0x17/0x20 [ 1137.829814][T30184] __x64_sys_bpf+0x7c/0x90 [ 1137.834243][T30184] x64_sys_call+0x4b9/0x9a0 [ 1137.838768][T30184] do_syscall_64+0x4c/0xa0 [ 1137.843201][T30184] ? clear_bhb_loop+0x50/0xa0 [ 1137.847893][T30184] ? clear_bhb_loop+0x50/0xa0 [ 1137.852580][T30184] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1137.858499][T30184] RIP: 0033:0x7fc7dfda0929 [ 1137.862930][T30184] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1137.882555][T30184] RSP: 002b:00007fc7de3e8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1137.890997][T30184] RAX: ffffffffffffffda RBX: 00007fc7dffc8080 RCX: 00007fc7dfda0929 [ 1137.899004][T30184] RDX: 0000000000000020 RSI: 0000200000000280 RDI: 0000000000000012 [ 1137.907002][T30184] RBP: 00007fc7de3e8090 R08: 0000000000000000 R09: 0000000000000000 [ 1137.915003][T30184] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1137.923023][T30184] R13: 0000000000000000 R14: 00007fc7dffc8080 R15: 00007ffcd415fc68 [ 1137.931056][T30184] [ 1137.946408][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1139.881966][T30229] ip6_vti0: mtu greater than device maximum [ 1140.090348][T30240] device pim6reg1 entered promiscuous mode [ 1140.297948][T30242] @0ÿ: renamed from bond_slave_0 [ 1140.729269][T30272] FAULT_INJECTION: forcing a failure. [ 1140.729269][T30272] name failslab, interval 1, probability 0, space 0, times 0 [ 1140.742126][T30272] CPU: 1 PID: 30272 Comm: syz.1.10865 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1140.752236][T30272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1140.762313][T30272] Call Trace: [ 1140.765615][T30272] [ 1140.768562][T30272] __dump_stack+0x21/0x30 [ 1140.772914][T30272] dump_stack_lvl+0xee/0x150 [ 1140.777524][T30272] ? show_regs_print_info+0x20/0x20 [ 1140.782741][T30272] ? kfree_const+0x39/0x40 [ 1140.787176][T30272] dump_stack+0x15/0x20 [ 1140.791346][T30272] should_fail+0x3c1/0x510 [ 1140.795777][T30272] __should_failslab+0xa4/0xe0 [ 1140.800565][T30272] should_failslab+0x9/0x20 [ 1140.805083][T30272] slab_pre_alloc_hook+0x3b/0xe0 [ 1140.810037][T30272] kmem_cache_alloc_trace+0x48/0x270 [ 1140.815341][T30272] ? device_add+0xbf/0xed0 [ 1140.819773][T30272] device_add+0xbf/0xed0 [ 1140.824024][T30272] ? pm_runtime_init+0x258/0x330 [ 1140.828981][T30272] ? device_initialize+0x1e1/0x420 [ 1140.834111][T30272] netdev_register_kobject+0x179/0x320 [ 1140.839583][T30272] ? raw_notifier_call_chain+0xe9/0x100 [ 1140.845143][T30272] register_netdevice+0xdfa/0x13a0 [ 1140.850278][T30272] ? netif_stacked_transfer_operstate+0x220/0x220 [ 1140.856716][T30272] ? mutex_unlock+0x89/0x220 [ 1140.861408][T30272] ? __mutex_lock_slowpath+0x10/0x10 [ 1140.866721][T30272] ppp_dev_configure+0x814/0xac0 [ 1140.871680][T30272] ppp_ioctl+0x620/0x16a0 [ 1140.876023][T30272] ? mutex_unlock+0x89/0x220 [ 1140.880627][T30272] ? ppp_poll+0x250/0x250 [ 1140.884973][T30272] ? security_file_ioctl+0x84/0xa0 [ 1140.890100][T30272] ? ppp_poll+0x250/0x250 [ 1140.894460][T30272] __se_sys_ioctl+0x121/0x1a0 [ 1140.899161][T30272] __x64_sys_ioctl+0x7b/0x90 [ 1140.903766][T30272] x64_sys_call+0x2f/0x9a0 [ 1140.908191][T30272] do_syscall_64+0x4c/0xa0 [ 1140.912604][T30272] ? clear_bhb_loop+0x50/0xa0 [ 1140.917275][T30272] ? clear_bhb_loop+0x50/0xa0 [ 1140.921947][T30272] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1140.927842][T30272] RIP: 0033:0x7fb11a3a8929 [ 1140.932262][T30272] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1140.951862][T30272] RSP: 002b:00007fb118a11038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1140.960286][T30272] RAX: ffffffffffffffda RBX: 00007fb11a5cffa0 RCX: 00007fb11a3a8929 [ 1140.968256][T30272] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 000000000000000c [ 1140.976222][T30272] RBP: 00007fb118a11090 R08: 0000000000000000 R09: 0000000000000000 [ 1140.984188][T30272] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1140.992151][T30272] R13: 0000000000000000 R14: 00007fb11a5cffa0 R15: 00007ffc090a27d8 [ 1141.000123][T30272] [ 1141.092042][T30279] FAULT_INJECTION: forcing a failure. [ 1141.092042][T30279] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1141.145442][T30279] CPU: 1 PID: 30279 Comm: syz.4.10868 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1141.155609][T30279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1141.165695][T30279] Call Trace: [ 1141.168975][T30279] [ 1141.171905][T30279] __dump_stack+0x21/0x30 [ 1141.176238][T30279] dump_stack_lvl+0xee/0x150 [ 1141.180828][T30279] ? show_regs_print_info+0x20/0x20 [ 1141.186029][T30279] ? cpu_clock_event_read+0x50/0x50 [ 1141.191226][T30279] dump_stack+0x15/0x20 [ 1141.195380][T30279] should_fail+0x3c1/0x510 [ 1141.199795][T30279] should_fail_usercopy+0x1a/0x20 [ 1141.204813][T30279] strncpy_from_user+0x24/0x2e0 [ 1141.209686][T30279] bpf_prog_load+0x1b8/0x1550 [ 1141.214363][T30279] ? map_freeze+0x360/0x360 [ 1141.218872][T30279] ? selinux_bpf+0xc7/0xf0 [ 1141.223285][T30279] ? security_bpf+0x82/0xa0 [ 1141.227783][T30279] __sys_bpf+0x4c3/0x730 [ 1141.232024][T30279] ? bpf_link_show_fdinfo+0x310/0x310 [ 1141.237396][T30279] __x64_sys_bpf+0x7c/0x90 [ 1141.241901][T30279] x64_sys_call+0x4b9/0x9a0 [ 1141.246400][T30279] do_syscall_64+0x4c/0xa0 [ 1141.250808][T30279] ? clear_bhb_loop+0x50/0xa0 [ 1141.255485][T30279] ? clear_bhb_loop+0x50/0xa0 [ 1141.260162][T30279] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1141.266067][T30279] RIP: 0033:0x7f424cd8b929 [ 1141.270481][T30279] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1141.290087][T30279] RSP: 002b:00007f424b3f4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1141.298510][T30279] RAX: ffffffffffffffda RBX: 00007f424cfb2fa0 RCX: 00007f424cd8b929 [ 1141.306480][T30279] RDX: 0000000000000080 RSI: 0000200000003480 RDI: 0000000000000005 [ 1141.314448][T30279] RBP: 00007f424b3f4090 R08: 0000000000000000 R09: 0000000000000000 [ 1141.322416][T30279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1141.330380][T30279] R13: 0000000000000000 R14: 00007f424cfb2fa0 R15: 00007ffd75a85a88 [ 1141.338355][T30279] [ 1141.697770][T30295] syz.3.10874[30295] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1141.697862][T30295] syz.3.10874[30295] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1143.059371][T30352] FAULT_INJECTION: forcing a failure. [ 1143.059371][T30352] name failslab, interval 1, probability 0, space 0, times 0 [ 1143.083658][T30352] CPU: 1 PID: 30352 Comm: syz.4.10893 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1143.093732][T30352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1143.103788][T30352] Call Trace: [ 1143.107071][T30352] [ 1143.109999][T30352] __dump_stack+0x21/0x30 [ 1143.114329][T30352] dump_stack_lvl+0xee/0x150 [ 1143.118923][T30352] ? show_regs_print_info+0x20/0x20 [ 1143.124141][T30352] ? dev_queue_xmit+0x20/0x20 [ 1143.128825][T30352] dump_stack+0x15/0x20 [ 1143.132979][T30352] should_fail+0x3c1/0x510 [ 1143.137395][T30352] __should_failslab+0xa4/0xe0 [ 1143.142160][T30352] should_failslab+0x9/0x20 [ 1143.146672][T30352] slab_pre_alloc_hook+0x3b/0xe0 [ 1143.151617][T30352] ? skb_clone+0x1cf/0x360 [ 1143.156034][T30352] kmem_cache_alloc+0x44/0x260 [ 1143.160814][T30352] skb_clone+0x1cf/0x360 [ 1143.165067][T30352] bpf_clone_redirect+0xa7/0x380 [ 1143.170009][T30352] bpf_prog_da1e0ee5f8d5c8f5+0x55/0x87c [ 1143.175550][T30352] ? __kasan_slab_alloc+0xcf/0xf0 [ 1143.180574][T30352] ? __kasan_slab_alloc+0xbd/0xf0 [ 1143.185601][T30352] ? slab_post_alloc_hook+0x4f/0x2b0 [ 1143.190885][T30352] ? kmem_cache_alloc+0xf7/0x260 [ 1143.195820][T30352] ? __build_skb+0x2d/0x310 [ 1143.200318][T30352] ? build_skb+0x24/0x200 [ 1143.204644][T30352] ? bpf_prog_test_run_skb+0x279/0x1150 [ 1143.210189][T30352] ? bpf_prog_test_run+0x3d5/0x620 [ 1143.215301][T30352] ? __sys_bpf+0x52c/0x730 [ 1143.219724][T30352] ? __x64_sys_bpf+0x7c/0x90 [ 1143.224313][T30352] ? x64_sys_call+0x4b9/0x9a0 [ 1143.229020][T30352] ? do_syscall_64+0x4c/0xa0 [ 1143.233613][T30352] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1143.239692][T30352] ? __kasan_check_read+0x11/0x20 [ 1143.244710][T30352] ? bpf_test_timer_continue+0x146/0x4a0 [ 1143.250344][T30352] bpf_test_run+0x33d/0x8d0 [ 1143.254874][T30352] ? convert___skb_to_skb+0x4f0/0x4f0 [ 1143.260246][T30352] ? eth_get_headlen+0x1f0/0x1f0 [ 1143.265187][T30352] ? convert___skb_to_skb+0x41/0x4f0 [ 1143.270472][T30352] bpf_prog_test_run_skb+0x9ec/0x1150 [ 1143.275849][T30352] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 1143.281769][T30352] bpf_prog_test_run+0x3d5/0x620 [ 1143.286706][T30352] ? bpf_prog_query+0x230/0x230 [ 1143.291549][T30352] ? selinux_bpf+0xce/0xf0 [ 1143.295970][T30352] ? security_bpf+0x82/0xa0 [ 1143.300475][T30352] __sys_bpf+0x52c/0x730 [ 1143.304719][T30352] ? bpf_link_show_fdinfo+0x310/0x310 [ 1143.310097][T30352] ? debug_smp_processor_id+0x17/0x20 [ 1143.315473][T30352] __x64_sys_bpf+0x7c/0x90 [ 1143.319894][T30352] x64_sys_call+0x4b9/0x9a0 [ 1143.324399][T30352] do_syscall_64+0x4c/0xa0 [ 1143.328813][T30352] ? clear_bhb_loop+0x50/0xa0 [ 1143.333486][T30352] ? clear_bhb_loop+0x50/0xa0 [ 1143.338165][T30352] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1143.344058][T30352] RIP: 0033:0x7f424cd8b929 [ 1143.348560][T30352] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1143.368173][T30352] RSP: 002b:00007f424b3f4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1143.376590][T30352] RAX: ffffffffffffffda RBX: 00007f424cfb2fa0 RCX: 00007f424cd8b929 [ 1143.384562][T30352] RDX: 0000000000000028 RSI: 00002000000000c0 RDI: 000000000000000a [ 1143.392539][T30352] RBP: 00007f424b3f4090 R08: 0000000000000000 R09: 0000000000000000 [ 1143.400514][T30352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1143.408514][T30352] R13: 0000000000000000 R14: 00007f424cfb2fa0 R15: 00007ffd75a85a88 [ 1143.416496][T30352] [ 1143.846093][T30371] FAULT_INJECTION: forcing a failure. [ 1143.846093][T30371] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1143.861821][T30371] CPU: 0 PID: 30371 Comm: syz.5.10901 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1143.871919][T30371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1143.881988][T30371] Call Trace: [ 1143.885278][T30371] [ 1143.888218][T30371] __dump_stack+0x21/0x30 [ 1143.892577][T30371] dump_stack_lvl+0xee/0x150 [ 1143.897204][T30371] ? show_regs_print_info+0x20/0x20 [ 1143.902419][T30371] dump_stack+0x15/0x20 [ 1143.906582][T30371] should_fail+0x3c1/0x510 [ 1143.911013][T30371] should_fail_usercopy+0x1a/0x20 [ 1143.916072][T30371] _copy_from_user+0x20/0xd0 [ 1143.920678][T30371] __sys_bpf+0x233/0x730 [ 1143.924963][T30371] ? bpf_link_show_fdinfo+0x310/0x310 [ 1143.930356][T30371] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1143.936528][T30371] __x64_sys_bpf+0x7c/0x90 [ 1143.940942][T30371] x64_sys_call+0x4b9/0x9a0 [ 1143.945441][T30371] do_syscall_64+0x4c/0xa0 [ 1143.949854][T30371] ? clear_bhb_loop+0x50/0xa0 [ 1143.954528][T30371] ? clear_bhb_loop+0x50/0xa0 [ 1143.959204][T30371] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1143.965105][T30371] RIP: 0033:0x7f119f346929 [ 1143.969531][T30371] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1143.989159][T30371] RSP: 002b:00007f119d9af038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1143.997583][T30371] RAX: ffffffffffffffda RBX: 00007f119f56dfa0 RCX: 00007f119f346929 [ 1144.005555][T30371] RDX: 0000000000000090 RSI: 0000200000000840 RDI: 0000000000000005 [ 1144.013551][T30371] RBP: 00007f119d9af090 R08: 0000000000000000 R09: 0000000000000000 [ 1144.021518][T30371] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1144.029491][T30371] R13: 0000000000000000 R14: 00007f119f56dfa0 R15: 00007fff37b24f28 [ 1144.037469][T30371] [ 1144.464404][T30379] syz.4.10904[30379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1144.464512][T30379] syz.4.10904[30379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1144.567095][T30381] syz.4.10904[30381] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1144.716676][T30381] syz.4.10904[30381] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1146.746640][T30419] device wg2 entered promiscuous mode [ 1147.451839][T30435] device veth0_to_team entered promiscuous mode [ 1147.721840][T30456] FAULT_INJECTION: forcing a failure. [ 1147.721840][T30456] name failslab, interval 1, probability 0, space 0, times 0 [ 1147.806864][T30456] CPU: 0 PID: 30456 Comm: syz.5.10935 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1147.816992][T30456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1147.827060][T30456] Call Trace: [ 1147.830353][T30456] [ 1147.833290][T30456] __dump_stack+0x21/0x30 [ 1147.833748][T30465] device pim6reg1 entered promiscuous mode [ 1147.837630][T30456] dump_stack_lvl+0xee/0x150 [ 1147.837651][T30456] ? show_regs_print_info+0x20/0x20 [ 1147.837673][T30456] ? update_load_avg+0x410/0x1110 [ 1147.837700][T30456] dump_stack+0x15/0x20 [ 1147.837718][T30456] should_fail+0x3c1/0x510 [ 1147.837741][T30456] __should_failslab+0xa4/0xe0 [ 1147.837766][T30456] should_failslab+0x9/0x20 [ 1147.837787][T30456] slab_pre_alloc_hook+0x3b/0xe0 [ 1147.837817][T30456] kmem_cache_alloc_trace+0x48/0x270 [ 1147.886387][T30456] ? __get_vm_area_node+0x11d/0x350 [ 1147.891607][T30456] __get_vm_area_node+0x11d/0x350 [ 1147.896645][T30456] __vmalloc_node_range+0xe8/0x840 [ 1147.901767][T30456] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 1147.907335][T30456] ? selinux_capset+0xf0/0xf0 [ 1147.912026][T30456] ? check_preempt_wakeup+0x8d0/0xb80 [ 1147.917415][T30456] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 1147.922970][T30456] __vmalloc+0x79/0x90 [ 1147.927061][T30456] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 1147.932629][T30456] bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 1147.938017][T30456] bpf_prog_alloc+0x1f/0x1e0 [ 1147.942624][T30456] bpf_prog_load+0x7c3/0x1550 [ 1147.947331][T30456] ? map_freeze+0x360/0x360 [ 1147.951865][T30456] ? selinux_bpf+0xc7/0xf0 [ 1147.956300][T30456] ? security_bpf+0x82/0xa0 [ 1147.960838][T30456] __sys_bpf+0x4c3/0x730 [ 1147.965104][T30456] ? bpf_link_show_fdinfo+0x310/0x310 [ 1147.970492][T30456] __x64_sys_bpf+0x7c/0x90 [ 1147.974920][T30456] x64_sys_call+0x4b9/0x9a0 [ 1147.979429][T30456] do_syscall_64+0x4c/0xa0 [ 1147.983856][T30456] ? clear_bhb_loop+0x50/0xa0 [ 1147.988545][T30456] ? clear_bhb_loop+0x50/0xa0 [ 1147.993231][T30456] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1147.999145][T30456] RIP: 0033:0x7f119f346929 [ 1148.003577][T30456] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1148.023195][T30456] RSP: 002b:00007f119d9af038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1148.031626][T30456] RAX: ffffffffffffffda RBX: 00007f119f56dfa0 RCX: 00007f119f346929 [ 1148.039611][T30456] RDX: 0000000000000080 RSI: 0000200000003480 RDI: 0000000000000005 [ 1148.047595][T30456] RBP: 00007f119d9af090 R08: 0000000000000000 R09: 0000000000000000 [ 1148.055575][T30456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1148.063566][T30456] R13: 0000000000000000 R14: 00007f119f56dfa0 R15: 00007fff37b24f28 [ 1148.071558][T30456] [ 1148.264612][T30456] syz.5.10935: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz5,mems_allowed=0 [ 1148.441138][T30487] device sit0 entered promiscuous mode [ 1148.450529][T30456] CPU: 1 PID: 30456 Comm: syz.5.10935 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1148.460646][T30456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1148.470712][T30456] Call Trace: [ 1148.474003][T30456] [ 1148.476945][T30456] __dump_stack+0x21/0x30 [ 1148.481291][T30456] dump_stack_lvl+0xee/0x150 [ 1148.485896][T30456] ? show_regs_print_info+0x20/0x20 [ 1148.491116][T30456] ? pr_cont_kernfs_name+0xe3/0xf0 [ 1148.496247][T30456] dump_stack+0x15/0x20 [ 1148.500416][T30456] warn_alloc+0x1b0/0x1d0 [ 1148.504765][T30456] ? __should_failslab+0xa4/0xe0 [ 1148.509745][T30456] ? zone_watermark_ok_safe+0x270/0x270 [ 1148.515327][T30456] ? kmem_cache_alloc_trace+0x119/0x270 [ 1148.520898][T30456] __vmalloc_node_range+0x2c4/0x840 [ 1148.526117][T30456] ? selinux_capset+0xf0/0xf0 [ 1148.530809][T30456] ? check_preempt_wakeup+0x8d0/0xb80 [ 1148.536427][T30456] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 1148.541996][T30456] __vmalloc+0x79/0x90 [ 1148.546080][T30456] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 1148.551656][T30456] bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 1148.557047][T30456] bpf_prog_alloc+0x1f/0x1e0 [ 1148.561669][T30456] bpf_prog_load+0x7c3/0x1550 [ 1148.566367][T30456] ? map_freeze+0x360/0x360 [ 1148.571000][T30456] ? selinux_bpf+0xc7/0xf0 [ 1148.575442][T30456] ? security_bpf+0x82/0xa0 [ 1148.579964][T30456] __sys_bpf+0x4c3/0x730 [ 1148.584232][T30456] ? bpf_link_show_fdinfo+0x310/0x310 [ 1148.589626][T30456] __x64_sys_bpf+0x7c/0x90 [ 1148.594060][T30456] x64_sys_call+0x4b9/0x9a0 [ 1148.598578][T30456] do_syscall_64+0x4c/0xa0 [ 1148.603009][T30456] ? clear_bhb_loop+0x50/0xa0 [ 1148.607702][T30456] ? clear_bhb_loop+0x50/0xa0 [ 1148.612414][T30456] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1148.618327][T30456] RIP: 0033:0x7f119f346929 [ 1148.622758][T30456] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1148.642381][T30456] RSP: 002b:00007f119d9af038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1148.650810][T30456] RAX: ffffffffffffffda RBX: 00007f119f56dfa0 RCX: 00007f119f346929 [ 1148.658812][T30456] RDX: 0000000000000080 RSI: 0000200000003480 RDI: 0000000000000005 [ 1148.666800][T30456] RBP: 00007f119d9af090 R08: 0000000000000000 R09: 0000000000000000 [ 1148.674809][T30456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1148.682801][T30456] R13: 0000000000000000 R14: 00007f119f56dfa0 R15: 00007fff37b24f28 [ 1148.690801][T30456] [ 1149.124775][T30456] Mem-Info: [ 1149.209533][T30456] active_anon:39 inactive_anon:26100 isolated_anon:0 [ 1149.209533][T30456] active_file:26230 inactive_file:3091 isolated_file:0 [ 1149.209533][T30456] unevictable:0 dirty:413 writeback:0 [ 1149.209533][T30456] slab_reclaimable:8389 slab_unreclaimable:73004 [ 1149.209533][T30456] mapped:36066 shmem:6387 pagetables:634 bounce:0 [ 1149.209533][T30456] kernel_misc_reclaimable:0 [ 1149.209533][T30456] free:1526692 free_pcp:15343 free_cma:0 [ 1149.477435][T30456] Node 0 active_anon:156kB inactive_anon:104460kB active_file:104920kB inactive_file:12364kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:144200kB dirty:1676kB writeback:0kB shmem:25548kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4268kB pagetables:2612kB all_unreclaimable? no [ 1150.076535][T30456] DMA32 free:2978772kB min:62612kB low:78264kB high:93916kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2983024kB mlocked:0kB bounce:0kB free_pcp:4252kB local_pcp:0kB free_cma:0kB [ 1150.202543][T30456] lowmem_reserve[]: 0 3941 3941 [ 1150.246419][T30456] Normal free:3127808kB min:84840kB low:106048kB high:127256kB reserved_highatomic:0KB active_anon:156kB inactive_anon:112620kB active_file:104920kB inactive_file:12364kB unevictable:0kB writepending:1676kB present:5242880kB managed:4036096kB mlocked:0kB bounce:0kB free_pcp:52900kB local_pcp:26444kB free_cma:0kB [ 1150.400480][T30456] lowmem_reserve[]: 0 0 0 [ 1150.433601][T30456] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2978772kB [ 1150.504449][T30533] ÿÿÿÿÿÿ: renamed from vlan1 [ 1150.612836][T30456] Normal: 2249*4kB (UME) 2222*8kB (UME) 1989*16kB (UM) 1126*32kB (UM) 760*64kB (UME) 611*128kB (UME) 346*256kB (UM) 243*512kB (UM) 170*1024kB (UM) 107*2048kB (UME) 561*4096kB (UM) = 3125540kB [ 1150.823363][T30456] 40533 total pagecache pages [ 1150.873439][T30456] 0 pages in swap cache [ 1150.934782][T30456] Swap cache stats: add 0, delete 0, find 0/0 [ 1150.996424][T30456] Free swap = 124996kB [ 1151.004204][T30456] Total swap = 124996kB [ 1151.038716][T30456] 2097051 pages RAM [ 1151.066358][T30456] 0 pages HighMem/MovableOnly [ 1151.071075][T30456] 342271 pages reserved [ 1151.105682][T30456] 0 pages cma reserved [ 1151.885911][T30586] FAULT_INJECTION: forcing a failure. [ 1151.885911][T30586] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1151.985555][T30586] CPU: 0 PID: 30586 Comm: syz.1.10982 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1151.995687][T30586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1152.005761][T30586] Call Trace: [ 1152.009053][T30586] [ 1152.012003][T30586] __dump_stack+0x21/0x30 [ 1152.016355][T30586] dump_stack_lvl+0xee/0x150 [ 1152.020967][T30586] ? show_regs_print_info+0x20/0x20 [ 1152.026190][T30586] dump_stack+0x15/0x20 [ 1152.030366][T30586] should_fail+0x3c1/0x510 [ 1152.034807][T30586] should_fail_usercopy+0x1a/0x20 [ 1152.039858][T30586] _copy_from_user+0x20/0xd0 [ 1152.044470][T30586] __sys_bpf+0x233/0x730 [ 1152.048733][T30586] ? bpf_link_show_fdinfo+0x310/0x310 [ 1152.054130][T30586] ? debug_smp_processor_id+0x17/0x20 [ 1152.059527][T30586] __x64_sys_bpf+0x7c/0x90 [ 1152.063971][T30586] x64_sys_call+0x4b9/0x9a0 [ 1152.068491][T30586] do_syscall_64+0x4c/0xa0 [ 1152.072931][T30586] ? clear_bhb_loop+0x50/0xa0 [ 1152.077626][T30586] ? clear_bhb_loop+0x50/0xa0 [ 1152.082329][T30586] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1152.088245][T30586] RIP: 0033:0x7fb11a3a8929 [ 1152.092684][T30586] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1152.112309][T30586] RSP: 002b:00007fb118a11038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1152.120735][T30586] RAX: ffffffffffffffda RBX: 00007fb11a5cffa0 RCX: 00007fb11a3a8929 [ 1152.128731][T30586] RDX: 0000000000000050 RSI: 0000200000000280 RDI: 2000000000000000 [ 1152.136724][T30586] RBP: 00007fb118a11090 R08: 0000000000000000 R09: 0000000000000000 [ 1152.144784][T30586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1152.152754][T30586] R13: 0000000000000000 R14: 00007fb11a5cffa0 R15: 00007ffc090a27d8 [ 1152.160734][T30586] [ 1153.410611][T30636] device syzkaller0 entered promiscuous mode [ 1154.340545][T30680] FAULT_INJECTION: forcing a failure. [ 1154.340545][T30680] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1154.508883][T30680] CPU: 1 PID: 30680 Comm: syz.3.11013 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1154.519041][T30680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1154.529208][T30680] Call Trace: [ 1154.532512][T30680] [ 1154.535476][T30680] __dump_stack+0x21/0x30 [ 1154.539947][T30680] dump_stack_lvl+0xee/0x150 [ 1154.544556][T30680] ? show_regs_print_info+0x20/0x20 [ 1154.549777][T30680] dump_stack+0x15/0x20 [ 1154.553971][T30680] should_fail+0x3c1/0x510 [ 1154.558408][T30680] should_fail_alloc_page+0x55/0x80 [ 1154.563629][T30680] prepare_alloc_pages+0x156/0x600 [ 1154.568776][T30680] ? __alloc_pages_bulk+0xab0/0xab0 [ 1154.573989][T30680] ? slab_post_alloc_hook+0x4f/0x2b0 [ 1154.579294][T30680] ? alloc_vmap_area+0x17a/0x1990 [ 1154.584344][T30680] ? __get_vm_area_node+0x14e/0x350 [ 1154.589561][T30680] ? __vmalloc_node_range+0xe8/0x840 [ 1154.594861][T30680] ? kvmalloc_node+0x2b8/0x330 [ 1154.599664][T30680] __alloc_pages+0x10a/0x440 [ 1154.604277][T30680] ? prep_new_page+0x110/0x110 [ 1154.609083][T30680] ? __kasan_check_write+0x14/0x20 [ 1154.614255][T30680] __get_free_pages+0x10/0x30 [ 1154.618984][T30680] kasan_populate_vmalloc_pte+0x29/0x120 [ 1154.624638][T30680] __apply_to_page_range+0x8b0/0xbf0 [ 1154.629945][T30680] ? kasan_populate_vmalloc+0x70/0x70 [ 1154.635339][T30680] ? kasan_populate_vmalloc+0x70/0x70 [ 1154.640765][T30680] apply_to_page_range+0x3b/0x50 [ 1154.645726][T30680] kasan_populate_vmalloc+0x60/0x70 [ 1154.650951][T30680] alloc_vmap_area+0x185c/0x1990 [ 1154.655970][T30680] ? vm_map_ram+0xa60/0xa60 [ 1154.660506][T30680] ? kmem_cache_alloc_trace+0x119/0x270 [ 1154.666086][T30680] ? __get_vm_area_node+0x11d/0x350 [ 1154.671313][T30680] __get_vm_area_node+0x14e/0x350 [ 1154.676367][T30680] __vmalloc_node_range+0xe8/0x840 [ 1154.681572][T30680] ? btf_new_fd+0x1ee/0x920 [ 1154.686101][T30680] ? __kasan_kmalloc_large+0x1a/0xb0 [ 1154.691408][T30680] ? kmalloc_order+0xb9/0x160 [ 1154.696107][T30680] ? kmalloc_order_trace+0x18/0xb0 [ 1154.701238][T30680] ? btf_new_fd+0x1ee/0x920 [ 1154.705859][T30680] __vmalloc_node+0x7f/0x90 [ 1154.710385][T30680] ? btf_new_fd+0x1ee/0x920 [ 1154.714911][T30680] kvmalloc_node+0x2b8/0x330 [ 1154.719526][T30680] ? vm_mmap+0xb0/0xb0 [ 1154.723617][T30680] ? btf_new_fd+0x1b2/0x920 [ 1154.728142][T30680] btf_new_fd+0x1ee/0x920 [ 1154.732491][T30680] bpf_btf_load+0x6f/0x90 [ 1154.736838][T30680] __sys_bpf+0x515/0x730 [ 1154.741101][T30680] ? bpf_link_show_fdinfo+0x310/0x310 [ 1154.746595][T30680] ? debug_smp_processor_id+0x17/0x20 [ 1154.752000][T30680] __x64_sys_bpf+0x7c/0x90 [ 1154.756435][T30680] x64_sys_call+0x4b9/0x9a0 [ 1154.761096][T30680] do_syscall_64+0x4c/0xa0 [ 1154.765532][T30680] ? clear_bhb_loop+0x50/0xa0 [ 1154.770241][T30680] ? clear_bhb_loop+0x50/0xa0 [ 1154.774936][T30680] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1154.780864][T30680] RIP: 0033:0x7f2450bbe929 [ 1154.785312][T30680] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1154.804937][T30680] RSP: 002b:00007f244f227038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1154.813380][T30680] RAX: ffffffffffffffda RBX: 00007f2450de5fa0 RCX: 00007f2450bbe929 [ 1154.821379][T30680] RDX: 0000000000000020 RSI: 0000200000000280 RDI: 0000000000000012 [ 1154.829367][T30680] RBP: 00007f244f227090 R08: 0000000000000000 R09: 0000000000000000 [ 1154.837358][T30680] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1154.845342][T30680] R13: 0000000000000000 R14: 00007f2450de5fa0 R15: 00007ffd3eb1c4c8 [ 1154.853338][T30680] [ 1155.188335][T30709] FAULT_INJECTION: forcing a failure. [ 1155.188335][T30709] name failslab, interval 1, probability 0, space 0, times 0 [ 1155.221939][T30709] CPU: 0 PID: 30709 Comm: syz.4.11023 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1155.232065][T30709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1155.242137][T30709] Call Trace: [ 1155.245419][T30709] [ 1155.248349][T30709] __dump_stack+0x21/0x30 [ 1155.252762][T30709] dump_stack_lvl+0xee/0x150 [ 1155.257368][T30709] ? show_regs_print_info+0x20/0x20 [ 1155.262568][T30709] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1155.268719][T30709] dump_stack+0x15/0x20 [ 1155.272870][T30709] should_fail+0x3c1/0x510 [ 1155.277285][T30709] __should_failslab+0xa4/0xe0 [ 1155.282059][T30709] should_failslab+0x9/0x20 [ 1155.286557][T30709] slab_pre_alloc_hook+0x3b/0xe0 [ 1155.291494][T30709] kmem_cache_alloc_trace+0x48/0x270 [ 1155.296788][T30709] ? __get_vm_area_node+0x11d/0x350 [ 1155.301993][T30709] __get_vm_area_node+0x11d/0x350 [ 1155.307015][T30709] __vmalloc_node_range+0xe8/0x840 [ 1155.312123][T30709] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 1155.317664][T30709] ? selinux_capset+0xf0/0xf0 [ 1155.322339][T30709] ? _kstrtoull+0x3c0/0x4d0 [ 1155.326843][T30709] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 1155.332386][T30709] __vmalloc+0x79/0x90 [ 1155.336455][T30709] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 1155.342003][T30709] bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 1155.347378][T30709] bpf_prog_alloc+0x1f/0x1e0 [ 1155.351976][T30709] bpf_prog_load+0x7c3/0x1550 [ 1155.356669][T30709] ? __kasan_check_write+0x14/0x20 [ 1155.361802][T30709] ? map_freeze+0x360/0x360 [ 1155.366332][T30709] ? selinux_bpf+0xc7/0xf0 [ 1155.370755][T30709] ? security_bpf+0x82/0xa0 [ 1155.375268][T30709] __sys_bpf+0x4c3/0x730 [ 1155.379516][T30709] ? bpf_link_show_fdinfo+0x310/0x310 [ 1155.384906][T30709] ? debug_smp_processor_id+0x17/0x20 [ 1155.390303][T30709] __x64_sys_bpf+0x7c/0x90 [ 1155.394734][T30709] x64_sys_call+0x4b9/0x9a0 [ 1155.399246][T30709] do_syscall_64+0x4c/0xa0 [ 1155.403672][T30709] ? clear_bhb_loop+0x50/0xa0 [ 1155.408357][T30709] ? clear_bhb_loop+0x50/0xa0 [ 1155.413066][T30709] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1155.418974][T30709] RIP: 0033:0x7f424cd8b929 [ 1155.423390][T30709] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1155.442991][T30709] RSP: 002b:00007f424b3f4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1155.451416][T30709] RAX: ffffffffffffffda RBX: 00007f424cfb2fa0 RCX: 00007f424cd8b929 [ 1155.459382][T30709] RDX: 0000000000000090 RSI: 0000200000000840 RDI: 0000000000000005 [ 1155.467346][T30709] RBP: 00007f424b3f4090 R08: 0000000000000000 R09: 0000000000000000 [ 1155.475314][T30709] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1155.483285][T30709] R13: 0000000000000000 R14: 00007f424cfb2fa0 R15: 00007ffd75a85a88 [ 1155.491283][T30709] [ 1155.524875][T30695] bridge0: port 1(bridge_slave_0) entered blocking state [ 1155.542664][T30695] bridge0: port 1(bridge_slave_0) entered disabled state [ 1155.625599][T30695] device bridge_slave_0 entered promiscuous mode [ 1155.955386][T30695] bridge0: port 2(bridge_slave_1) entered blocking state [ 1155.962494][T30695] bridge0: port 2(bridge_slave_1) entered disabled state [ 1155.970315][T30695] device bridge_slave_1 entered promiscuous mode [ 1156.081762][T30721] device pim6reg1 entered promiscuous mode [ 1156.281977][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1156.295897][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1156.318046][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1156.326610][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1156.334881][ T349] bridge0: port 1(bridge_slave_0) entered blocking state [ 1156.341962][ T349] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1156.353233][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1156.362062][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1156.370564][ T349] bridge0: port 2(bridge_slave_1) entered blocking state [ 1156.377787][ T349] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1156.409035][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1156.416949][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1156.425035][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1156.442341][T30695] device veth0_vlan entered promiscuous mode [ 1156.450480][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1156.461166][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1156.476782][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1156.490261][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1156.501557][ T10] device bridge_slave_1 left promiscuous mode [ 1156.516500][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 1156.606757][ T10] device bridge_slave_0 left promiscuous mode [ 1156.612967][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 1156.706319][ T10] device veth0_vlan left promiscuous mode [ 1157.302909][T30695] device veth1_macvtap entered promiscuous mode [ 1157.362157][T30757] device pim6reg1 entered promiscuous mode [ 1157.375576][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1157.398600][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1157.460881][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1157.537337][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1157.596642][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1157.605237][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1157.654118][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1157.975634][T30784] device pim6reg1 entered promiscuous mode [ 1158.589644][T30809] device sit0 entered promiscuous mode [ 1159.860158][T30837] device pim6reg1 entered promiscuous mode [ 1159.915599][T30848] device sit0 left promiscuous mode [ 1161.788223][T30909] device pim6reg1 entered promiscuous mode [ 1163.014238][T30934] FAULT_INJECTION: forcing a failure. [ 1163.014238][T30934] name failslab, interval 1, probability 0, space 0, times 0 [ 1163.103042][T30934] CPU: 0 PID: 30934 Comm: syz.3.11102 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1163.113257][T30934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1163.123338][T30934] Call Trace: [ 1163.126633][T30934] [ 1163.129577][T30934] __dump_stack+0x21/0x30 [ 1163.133939][T30934] dump_stack_lvl+0xee/0x150 [ 1163.138545][T30934] ? show_regs_print_info+0x20/0x20 [ 1163.143760][T30934] dump_stack+0x15/0x20 [ 1163.147929][T30934] should_fail+0x3c1/0x510 [ 1163.152359][T30934] ? skb_ensure_writable+0x2e7/0x460 [ 1163.157659][T30934] __should_failslab+0xa4/0xe0 [ 1163.162436][T30934] should_failslab+0x9/0x20 [ 1163.166969][T30934] slab_pre_alloc_hook+0x3b/0xe0 [ 1163.171929][T30934] ? skb_ensure_writable+0x2e7/0x460 [ 1163.177231][T30934] ? skb_ensure_writable+0x2e7/0x460 [ 1163.182531][T30934] __kmalloc_track_caller+0x6c/0x2c0 [ 1163.187839][T30934] ? skb_ensure_writable+0x2e7/0x460 [ 1163.193149][T30934] ? skb_ensure_writable+0x2e7/0x460 [ 1163.198453][T30934] pskb_expand_head+0x11b/0x11d0 [ 1163.203414][T30934] ? __copy_skb_header+0x437/0x600 [ 1163.208538][T30934] ? __kasan_check_write+0x14/0x20 [ 1163.213664][T30934] ? __skb_clone+0x47a/0x790 [ 1163.218274][T30934] skb_ensure_writable+0x2e7/0x460 [ 1163.223405][T30934] bpf_clone_redirect+0x10b/0x380 [ 1163.228454][T30934] bpf_prog_da1e0ee5f8d5c8f5+0x55/0xfb4 [ 1163.234017][T30934] ? __kasan_slab_alloc+0xcf/0xf0 [ 1163.239066][T30934] ? __kasan_slab_alloc+0xbd/0xf0 [ 1163.244105][T30934] ? slab_post_alloc_hook+0x4f/0x2b0 [ 1163.249409][T30934] ? kmem_cache_alloc+0xf7/0x260 [ 1163.254371][T30934] ? __build_skb+0x2d/0x310 [ 1163.258884][T30934] ? build_skb+0x24/0x200 [ 1163.263225][T30934] ? bpf_prog_test_run_skb+0x279/0x1150 [ 1163.268783][T30934] ? bpf_prog_test_run+0x3d5/0x620 [ 1163.273912][T30934] ? __sys_bpf+0x52c/0x730 [ 1163.278340][T30934] ? __x64_sys_bpf+0x7c/0x90 [ 1163.282934][T30934] ? x64_sys_call+0x4b9/0x9a0 [ 1163.287608][T30934] ? do_syscall_64+0x4c/0xa0 [ 1163.292196][T30934] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1163.298358][T30934] ? __kasan_check_read+0x11/0x20 [ 1163.303386][T30934] ? bpf_test_timer_continue+0x146/0x4a0 [ 1163.309042][T30934] bpf_test_run+0x33d/0x8d0 [ 1163.313550][T30934] ? convert___skb_to_skb+0x4f0/0x4f0 [ 1163.318916][T30934] ? eth_get_headlen+0x1f0/0x1f0 [ 1163.323852][T30934] ? convert___skb_to_skb+0x41/0x4f0 [ 1163.329134][T30934] bpf_prog_test_run_skb+0x9ec/0x1150 [ 1163.334507][T30934] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 1163.340403][T30934] bpf_prog_test_run+0x3d5/0x620 [ 1163.345337][T30934] ? bpf_prog_query+0x230/0x230 [ 1163.350183][T30934] ? selinux_bpf+0xce/0xf0 [ 1163.354604][T30934] ? security_bpf+0x82/0xa0 [ 1163.359118][T30934] __sys_bpf+0x52c/0x730 [ 1163.363367][T30934] ? bpf_link_show_fdinfo+0x310/0x310 [ 1163.368857][T30934] ? debug_smp_processor_id+0x17/0x20 [ 1163.374248][T30934] __x64_sys_bpf+0x7c/0x90 [ 1163.378679][T30934] x64_sys_call+0x4b9/0x9a0 [ 1163.383194][T30934] do_syscall_64+0x4c/0xa0 [ 1163.387624][T30934] ? clear_bhb_loop+0x50/0xa0 [ 1163.392407][T30934] ? clear_bhb_loop+0x50/0xa0 [ 1163.397099][T30934] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1163.403015][T30934] RIP: 0033:0x7f2450bbe929 [ 1163.407444][T30934] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1163.427209][T30934] RSP: 002b:00007f244f227038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1163.435644][T30934] RAX: ffffffffffffffda RBX: 00007f2450de5fa0 RCX: 00007f2450bbe929 [ 1163.443615][T30934] RDX: 0000000000000028 RSI: 00002000000000c0 RDI: 000000000000000a [ 1163.451587][T30934] RBP: 00007f244f227090 R08: 0000000000000000 R09: 0000000000000000 [ 1163.459557][T30934] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1163.467544][T30934] R13: 0000000000000000 R14: 00007f2450de5fa0 R15: 00007ffd3eb1c4c8 [ 1163.475520][T30934] [ 1163.783463][T30957] device sit0 left promiscuous mode [ 1164.011392][T30966] device pim6reg1 entered promiscuous mode [ 1164.136328][T30972] device syzkaller0 entered promiscuous mode [ 1166.113320][T31026] device pim6reg1 entered promiscuous mode [ 1166.288798][T31031] device veth0_vlan left promiscuous mode [ 1166.341311][T31031] device veth0_vlan entered promiscuous mode [ 1166.445287][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1166.487046][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1166.516723][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1166.727445][T31042] device pim6reg1 entered promiscuous mode [ 1166.909079][T31054] device pim6reg1 entered promiscuous mode [ 1167.127210][T31061] device sit0 left promiscuous mode [ 1167.207890][T31066] FAULT_INJECTION: forcing a failure. [ 1167.207890][T31066] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1167.266723][T31066] CPU: 1 PID: 31066 Comm: syz.3.11150 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1167.276852][T31066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1167.286944][T31066] Call Trace: [ 1167.290243][T31066] [ 1167.293190][T31066] __dump_stack+0x21/0x30 [ 1167.297540][T31066] dump_stack_lvl+0xee/0x150 [ 1167.302146][T31066] ? show_regs_print_info+0x20/0x20 [ 1167.307353][T31066] ? vfs_write+0xc17/0xf70 [ 1167.311792][T31066] dump_stack+0x15/0x20 [ 1167.315957][T31066] should_fail+0x3c1/0x510 [ 1167.320403][T31066] should_fail_usercopy+0x1a/0x20 [ 1167.325447][T31066] _copy_from_user+0x20/0xd0 [ 1167.330062][T31066] __sys_bpf+0x233/0x730 [ 1167.334335][T31066] ? bpf_link_show_fdinfo+0x310/0x310 [ 1167.339726][T31066] ? debug_smp_processor_id+0x17/0x20 [ 1167.345134][T31066] __x64_sys_bpf+0x7c/0x90 [ 1167.349571][T31066] x64_sys_call+0x4b9/0x9a0 [ 1167.354090][T31066] do_syscall_64+0x4c/0xa0 [ 1167.358522][T31066] ? clear_bhb_loop+0x50/0xa0 [ 1167.363233][T31066] ? clear_bhb_loop+0x50/0xa0 [ 1167.367931][T31066] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1167.373850][T31066] RIP: 0033:0x7f2450bbe929 [ 1167.378281][T31066] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1167.398013][T31066] RSP: 002b:00007f244f206038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1167.406533][T31066] RAX: ffffffffffffffda RBX: 00007f2450de6080 RCX: 00007f2450bbe929 [ 1167.414601][T31066] RDX: 0000000000000094 RSI: 0000200000000b00 RDI: 0000000000000005 [ 1167.422588][T31066] RBP: 00007f244f206090 R08: 0000000000000000 R09: 0000000000000000 [ 1167.430578][T31066] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1167.438557][T31066] R13: 0000000000000000 R14: 00007f2450de6080 R15: 00007ffd3eb1c4c8 [ 1167.446658][T31066] [ 1167.731921][T31078] device pim6reg1 entered promiscuous mode [ 1167.881858][T31089] device pim6reg1 entered promiscuous mode [ 1168.098173][T31099] FAULT_INJECTION: forcing a failure. [ 1168.098173][T31099] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1168.226312][T31099] CPU: 0 PID: 31099 Comm: syz.0.11166 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1168.236443][T31099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1168.246516][T31099] Call Trace: [ 1168.249792][T31099] [ 1168.252719][T31099] __dump_stack+0x21/0x30 [ 1168.257051][T31099] dump_stack_lvl+0xee/0x150 [ 1168.261636][T31099] ? show_regs_print_info+0x20/0x20 [ 1168.266832][T31099] dump_stack+0x15/0x20 [ 1168.270983][T31099] should_fail+0x3c1/0x510 [ 1168.275392][T31099] should_fail_alloc_page+0x55/0x80 [ 1168.280593][T31099] prepare_alloc_pages+0x156/0x600 [ 1168.285703][T31099] ? __alloc_pages_bulk+0xab0/0xab0 [ 1168.290902][T31099] ? slab_post_alloc_hook+0x4f/0x2b0 [ 1168.296185][T31099] ? alloc_vmap_area+0x17a/0x1990 [ 1168.301203][T31099] ? __get_vm_area_node+0x14e/0x350 [ 1168.306418][T31099] ? __vmalloc_node_range+0xe8/0x840 [ 1168.311703][T31099] ? kvmalloc_node+0x2b8/0x330 [ 1168.316463][T31099] __alloc_pages+0x10a/0x440 [ 1168.321045][T31099] ? prep_new_page+0x110/0x110 [ 1168.325802][T31099] ? __kasan_check_write+0x14/0x20 [ 1168.330911][T31099] __get_free_pages+0x10/0x30 [ 1168.335583][T31099] kasan_populate_vmalloc_pte+0x29/0x120 [ 1168.341215][T31099] __apply_to_page_range+0x8b0/0xbf0 [ 1168.346635][T31099] ? kasan_populate_vmalloc+0x70/0x70 [ 1168.352031][T31099] ? kasan_populate_vmalloc+0x70/0x70 [ 1168.357415][T31099] apply_to_page_range+0x3b/0x50 [ 1168.362361][T31099] kasan_populate_vmalloc+0x60/0x70 [ 1168.367566][T31099] alloc_vmap_area+0x185c/0x1990 [ 1168.372510][T31099] ? vm_map_ram+0xa60/0xa60 [ 1168.377010][T31099] ? kmem_cache_alloc_trace+0x119/0x270 [ 1168.382557][T31099] ? __get_vm_area_node+0x11d/0x350 [ 1168.387748][T31099] __get_vm_area_node+0x14e/0x350 [ 1168.392766][T31099] __vmalloc_node_range+0xe8/0x840 [ 1168.397869][T31099] ? btf_new_fd+0x1ee/0x920 [ 1168.402372][T31099] ? __kasan_kmalloc_large+0x1a/0xb0 [ 1168.407658][T31099] ? kmalloc_order+0xb9/0x160 [ 1168.412354][T31099] ? kmalloc_order_trace+0x18/0xb0 [ 1168.417461][T31099] ? btf_new_fd+0x1ee/0x920 [ 1168.421965][T31099] __vmalloc_node+0x7f/0x90 [ 1168.426460][T31099] ? btf_new_fd+0x1ee/0x920 [ 1168.430972][T31099] kvmalloc_node+0x2b8/0x330 [ 1168.435561][T31099] ? vm_mmap+0xb0/0xb0 [ 1168.439629][T31099] ? btf_new_fd+0x1b2/0x920 [ 1168.444139][T31099] btf_new_fd+0x1ee/0x920 [ 1168.448471][T31099] bpf_btf_load+0x6f/0x90 [ 1168.452796][T31099] __sys_bpf+0x515/0x730 [ 1168.457047][T31099] ? bpf_link_show_fdinfo+0x310/0x310 [ 1168.462415][T31099] ? debug_smp_processor_id+0x17/0x20 [ 1168.467784][T31099] __x64_sys_bpf+0x7c/0x90 [ 1168.472207][T31099] x64_sys_call+0x4b9/0x9a0 [ 1168.476797][T31099] do_syscall_64+0x4c/0xa0 [ 1168.481208][T31099] ? clear_bhb_loop+0x50/0xa0 [ 1168.485881][T31099] ? clear_bhb_loop+0x50/0xa0 [ 1168.490554][T31099] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1168.496449][T31099] RIP: 0033:0x7fc7dfda0929 [ 1168.500880][T31099] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1168.520483][T31099] RSP: 002b:00007fc7de409038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1168.528893][T31099] RAX: ffffffffffffffda RBX: 00007fc7dffc7fa0 RCX: 00007fc7dfda0929 [ 1168.536973][T31099] RDX: 0000000000000020 RSI: 0000200000000280 RDI: 0000000000000012 [ 1168.544950][T31099] RBP: 00007fc7de409090 R08: 0000000000000000 R09: 0000000000000000 [ 1168.553073][T31099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1168.561047][T31099] R13: 0000000000000000 R14: 00007fc7dffc7fa0 R15: 00007ffcd415fc68 [ 1168.569025][T31099] [ 1169.879039][T31147] FAULT_INJECTION: forcing a failure. [ 1169.879039][T31147] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1169.913642][T31145] device sit0 entered promiscuous mode [ 1169.920212][T31147] CPU: 1 PID: 31147 Comm: syz.4.11186 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1169.930321][T31147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1169.940395][T31147] Call Trace: [ 1169.943670][T31147] [ 1169.946593][T31147] __dump_stack+0x21/0x30 [ 1169.950918][T31147] dump_stack_lvl+0xee/0x150 [ 1169.955498][T31147] ? show_regs_print_info+0x20/0x20 [ 1169.960691][T31147] ? perf_sched_cb_inc+0x240/0x240 [ 1169.965799][T31147] dump_stack+0x15/0x20 [ 1169.969959][T31147] should_fail+0x3c1/0x510 [ 1169.974367][T31147] should_fail_alloc_page+0x55/0x80 [ 1169.979554][T31147] prepare_alloc_pages+0x156/0x600 [ 1169.984659][T31147] ? __alloc_pages_bulk+0xab0/0xab0 [ 1169.989847][T31147] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 1169.995474][T31147] __alloc_pages+0x10a/0x440 [ 1170.000061][T31147] ? prep_new_page+0x110/0x110 [ 1170.004875][T31147] ? pcpu_populate_chunk+0x1b3/0xcb0 [ 1170.010180][T31147] pcpu_populate_chunk+0x184/0xcb0 [ 1170.015317][T31147] ? _find_next_bit+0x1b5/0x200 [ 1170.020184][T31147] pcpu_alloc+0xc4d/0x1660 [ 1170.024615][T31147] __alloc_percpu_gfp+0x25/0x30 [ 1170.029494][T31147] bpf_map_alloc_percpu+0xc5/0x150 [ 1170.034622][T31147] array_map_alloc+0x39a/0x6d0 [ 1170.039405][T31147] map_create+0x455/0x21b0 [ 1170.043850][T31147] __sys_bpf+0x2cf/0x730 [ 1170.048109][T31147] ? bpf_link_show_fdinfo+0x310/0x310 [ 1170.053504][T31147] ? debug_smp_processor_id+0x17/0x20 [ 1170.058892][T31147] __x64_sys_bpf+0x7c/0x90 [ 1170.063327][T31147] x64_sys_call+0x4b9/0x9a0 [ 1170.067842][T31147] do_syscall_64+0x4c/0xa0 [ 1170.072288][T31147] ? clear_bhb_loop+0x50/0xa0 [ 1170.076977][T31147] ? clear_bhb_loop+0x50/0xa0 [ 1170.081665][T31147] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1170.087569][T31147] RIP: 0033:0x7f424cd8b929 [ 1170.091979][T31147] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1170.111580][T31147] RSP: 002b:00007f424b3f4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1170.119988][T31147] RAX: ffffffffffffffda RBX: 00007f424cfb2fa0 RCX: 00007f424cd8b929 [ 1170.127975][T31147] RDX: 0000000000000050 RSI: 0000200000000280 RDI: 2000000000000000 [ 1170.136279][T31147] RBP: 00007f424b3f4090 R08: 0000000000000000 R09: 0000000000000000 [ 1170.144242][T31147] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1170.152205][T31147] R13: 0000000000000000 R14: 00007f424cfb2fa0 R15: 00007ffd75a85a88 [ 1170.160194][T31147] [ 1170.294638][T31166] device pim6reg1 entered promiscuous mode [ 1171.350711][T31195] device pim6reg1 entered promiscuous mode [ 1171.388121][T31207] device sit0 left promiscuous mode [ 1171.606222][T31227] FAULT_INJECTION: forcing a failure. [ 1171.606222][T31227] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1171.619920][T31227] CPU: 1 PID: 31227 Comm: syz.5.11218 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1171.630033][T31227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1171.640092][T31227] Call Trace: [ 1171.643376][T31227] [ 1171.646318][T31227] __dump_stack+0x21/0x30 [ 1171.650650][T31227] dump_stack_lvl+0xee/0x150 [ 1171.655237][T31227] ? show_regs_print_info+0x20/0x20 [ 1171.660438][T31227] dump_stack+0x15/0x20 [ 1171.664600][T31227] should_fail+0x3c1/0x510 [ 1171.669013][T31227] should_fail_alloc_page+0x55/0x80 [ 1171.674214][T31227] prepare_alloc_pages+0x156/0x600 [ 1171.679322][T31227] ? __alloc_pages_bulk+0xab0/0xab0 [ 1171.684522][T31227] ? slab_post_alloc_hook+0x4f/0x2b0 [ 1171.689799][T31227] ? alloc_vmap_area+0x17a/0x1990 [ 1171.694823][T31227] __alloc_pages+0x10a/0x440 [ 1171.699420][T31227] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1171.705572][T31227] ? prep_new_page+0x110/0x110 [ 1171.710334][T31227] ? __kasan_check_write+0x14/0x20 [ 1171.715443][T31227] ? kasan_check_range+0x173/0x290 [ 1171.720558][T31227] __get_free_pages+0x10/0x30 [ 1171.725306][T31227] kasan_populate_vmalloc_pte+0x29/0x120 [ 1171.730936][T31227] __apply_to_page_range+0x8b0/0xbf0 [ 1171.736221][T31227] ? kasan_populate_vmalloc+0x70/0x70 [ 1171.741601][T31227] ? kasan_populate_vmalloc+0x70/0x70 [ 1171.746970][T31227] apply_to_page_range+0x3b/0x50 [ 1171.751906][T31227] kasan_populate_vmalloc+0x60/0x70 [ 1171.757100][T31227] alloc_vmap_area+0x185c/0x1990 [ 1171.762053][T31227] ? vm_map_ram+0xa60/0xa60 [ 1171.766556][T31227] ? kmem_cache_alloc_trace+0x119/0x270 [ 1171.772100][T31227] ? __get_vm_area_node+0x11d/0x350 [ 1171.777289][T31227] __get_vm_area_node+0x14e/0x350 [ 1171.782310][T31227] __vmalloc_node_range+0xe8/0x840 [ 1171.787416][T31227] ? btf_new_fd+0x1ee/0x920 [ 1171.791914][T31227] ? __kasan_kmalloc_large+0x1a/0xb0 [ 1171.797199][T31227] ? kmalloc_order+0xb9/0x160 [ 1171.801873][T31227] ? kmalloc_order_trace+0x18/0xb0 [ 1171.806978][T31227] ? btf_new_fd+0x1ee/0x920 [ 1171.811475][T31227] __vmalloc_node+0x7f/0x90 [ 1171.815976][T31227] ? btf_new_fd+0x1ee/0x920 [ 1171.820566][T31227] kvmalloc_node+0x2b8/0x330 [ 1171.825153][T31227] ? vm_mmap+0xb0/0xb0 [ 1171.829218][T31227] ? btf_new_fd+0x1b2/0x920 [ 1171.833721][T31227] btf_new_fd+0x1ee/0x920 [ 1171.838055][T31227] bpf_btf_load+0x6f/0x90 [ 1171.842388][T31227] __sys_bpf+0x515/0x730 [ 1171.846631][T31227] ? bpf_link_show_fdinfo+0x310/0x310 [ 1171.852007][T31227] ? debug_smp_processor_id+0x17/0x20 [ 1171.857374][T31227] __x64_sys_bpf+0x7c/0x90 [ 1171.861786][T31227] x64_sys_call+0x4b9/0x9a0 [ 1171.866302][T31227] do_syscall_64+0x4c/0xa0 [ 1171.870716][T31227] ? clear_bhb_loop+0x50/0xa0 [ 1171.875509][T31227] ? clear_bhb_loop+0x50/0xa0 [ 1171.880182][T31227] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1171.886081][T31227] RIP: 0033:0x7fed0363e929 [ 1171.890503][T31227] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1171.910108][T31227] RSP: 002b:00007fed01ca7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1171.918521][T31227] RAX: ffffffffffffffda RBX: 00007fed03865fa0 RCX: 00007fed0363e929 [ 1171.926493][T31227] RDX: 0000000000000020 RSI: 0000200000000280 RDI: 0000000000000012 [ 1171.934473][T31227] RBP: 00007fed01ca7090 R08: 0000000000000000 R09: 0000000000000000 [ 1171.942440][T31227] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1171.950408][T31227] R13: 0000000000000000 R14: 00007fed03865fa0 R15: 00007ffc1713ca08 [ 1171.958384][T31227] [ 1175.452035][T31357] bridge0: port 2(bridge_slave_1) entered disabled state [ 1175.460895][T31357] bridge0: port 1(bridge_slave_0) entered disabled state [ 1175.665061][T31369] FAULT_INJECTION: forcing a failure. [ 1175.665061][T31369] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1175.880665][T31369] CPU: 1 PID: 31369 Comm: syz.4.11265 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1175.890938][T31369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1175.901009][T31369] Call Trace: [ 1175.904297][T31369] [ 1175.907238][T31369] __dump_stack+0x21/0x30 [ 1175.911594][T31369] dump_stack_lvl+0xee/0x150 [ 1175.916193][T31369] ? show_regs_print_info+0x20/0x20 [ 1175.921409][T31369] dump_stack+0x15/0x20 [ 1175.925577][T31369] should_fail+0x3c1/0x510 [ 1175.930009][T31369] should_fail_alloc_page+0x55/0x80 [ 1175.935226][T31369] prepare_alloc_pages+0x156/0x600 [ 1175.940353][T31369] ? __alloc_pages_bulk+0xab0/0xab0 [ 1175.945583][T31369] ? slab_post_alloc_hook+0x4f/0x2b0 [ 1175.950857][T31369] ? alloc_vmap_area+0x17a/0x1990 [ 1175.955868][T31369] ? __get_vm_area_node+0x14e/0x350 [ 1175.961055][T31369] ? __vmalloc_node_range+0xe8/0x840 [ 1175.966522][T31369] ? kvmalloc_node+0x2b8/0x330 [ 1175.971310][T31369] __alloc_pages+0x10a/0x440 [ 1175.975889][T31369] ? prep_new_page+0x110/0x110 [ 1175.980644][T31369] ? __kasan_check_write+0x14/0x20 [ 1175.985757][T31369] __get_free_pages+0x10/0x30 [ 1175.990439][T31369] kasan_populate_vmalloc_pte+0x29/0x120 [ 1175.996087][T31369] __apply_to_page_range+0x8b0/0xbf0 [ 1176.001375][T31369] ? kasan_populate_vmalloc+0x70/0x70 [ 1176.006758][T31369] ? kasan_populate_vmalloc+0x70/0x70 [ 1176.012135][T31369] apply_to_page_range+0x3b/0x50 [ 1176.017078][T31369] kasan_populate_vmalloc+0x60/0x70 [ 1176.022278][T31369] alloc_vmap_area+0x185c/0x1990 [ 1176.027225][T31369] ? vm_map_ram+0xa60/0xa60 [ 1176.031726][T31369] ? kmem_cache_alloc_trace+0x119/0x270 [ 1176.037268][T31369] ? __get_vm_area_node+0x11d/0x350 [ 1176.042470][T31369] __get_vm_area_node+0x14e/0x350 [ 1176.047490][T31369] __vmalloc_node_range+0xe8/0x840 [ 1176.052617][T31369] ? btf_new_fd+0x1ee/0x920 [ 1176.057133][T31369] ? debug_smp_processor_id+0x17/0x20 [ 1176.062498][T31369] ? perf_trace_kmem_alloc+0x4b/0x130 [ 1176.067871][T31369] ? kmalloc_order_trace+0x93/0xb0 [ 1176.072983][T31369] ? btf_new_fd+0x1ee/0x920 [ 1176.077490][T31369] __vmalloc_node+0x7f/0x90 [ 1176.081990][T31369] ? btf_new_fd+0x1ee/0x920 [ 1176.086493][T31369] kvmalloc_node+0x2b8/0x330 [ 1176.091083][T31369] ? vm_mmap+0xb0/0xb0 [ 1176.095145][T31369] ? btf_new_fd+0x1b2/0x920 [ 1176.099660][T31369] btf_new_fd+0x1ee/0x920 [ 1176.103988][T31369] bpf_btf_load+0x6f/0x90 [ 1176.108324][T31369] __sys_bpf+0x515/0x730 [ 1176.112583][T31369] ? bpf_link_show_fdinfo+0x310/0x310 [ 1176.117959][T31369] ? debug_smp_processor_id+0x17/0x20 [ 1176.123335][T31369] __x64_sys_bpf+0x7c/0x90 [ 1176.127743][T31369] x64_sys_call+0x4b9/0x9a0 [ 1176.132247][T31369] do_syscall_64+0x4c/0xa0 [ 1176.136667][T31369] ? clear_bhb_loop+0x50/0xa0 [ 1176.141342][T31369] ? clear_bhb_loop+0x50/0xa0 [ 1176.146013][T31369] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1176.151905][T31369] RIP: 0033:0x7f424cd8b929 [ 1176.156322][T31369] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1176.175923][T31369] RSP: 002b:00007f424b3f4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1176.184330][T31369] RAX: ffffffffffffffda RBX: 00007f424cfb2fa0 RCX: 00007f424cd8b929 [ 1176.192298][T31369] RDX: 0000000000000020 RSI: 0000200000000280 RDI: 0000000000000012 [ 1176.200270][T31369] RBP: 00007f424b3f4090 R08: 0000000000000000 R09: 0000000000000000 [ 1176.208237][T31369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1176.216197][T31369] R13: 0000000000000000 R14: 00007f424cfb2fa0 R15: 00007ffd75a85a88 [ 1176.224174][T31369] [ 1176.662688][T31388] device pim6reg1 entered promiscuous mode [ 1176.783573][T31401] device sit0 entered promiscuous mode [ 1177.209143][T31417] device pim6reg1 entered promiscuous mode [ 1177.348634][T31423] FAULT_INJECTION: forcing a failure. [ 1177.348634][T31423] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1177.404701][T31423] CPU: 1 PID: 31423 Comm: syz.3.11284 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1177.414828][T31423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1177.424896][T31423] Call Trace: [ 1177.428186][T31423] [ 1177.431129][T31423] __dump_stack+0x21/0x30 [ 1177.435493][T31423] dump_stack_lvl+0xee/0x150 [ 1177.440091][T31423] ? show_regs_print_info+0x20/0x20 [ 1177.445307][T31423] ? __schedule+0xb76/0x14c0 [ 1177.449912][T31423] dump_stack+0x15/0x20 [ 1177.454110][T31423] should_fail+0x3c1/0x510 [ 1177.458537][T31423] should_fail_alloc_page+0x55/0x80 [ 1177.463745][T31423] prepare_alloc_pages+0x156/0x600 [ 1177.468886][T31423] ? __alloc_pages_bulk+0xab0/0xab0 [ 1177.474105][T31423] ? _find_next_bit+0x1fa/0x200 [ 1177.478979][T31423] __alloc_pages+0x10a/0x440 [ 1177.483590][T31423] ? prep_new_page+0x110/0x110 [ 1177.488380][T31423] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 1177.494205][T31423] pcpu_populate_chunk+0x184/0xcb0 [ 1177.499342][T31423] ? _find_next_bit+0x106/0x200 [ 1177.504219][T31423] pcpu_alloc+0xc4d/0x1660 [ 1177.508656][T31423] __alloc_percpu_gfp+0x25/0x30 [ 1177.513530][T31423] bpf_map_alloc_percpu+0xc5/0x150 [ 1177.518657][T31423] array_map_alloc+0x39a/0x6d0 [ 1177.523441][T31423] map_create+0x455/0x21b0 [ 1177.527868][T31423] __sys_bpf+0x2cf/0x730 [ 1177.532121][T31423] ? bpf_link_show_fdinfo+0x310/0x310 [ 1177.537513][T31423] __x64_sys_bpf+0x7c/0x90 [ 1177.541954][T31423] x64_sys_call+0x4b9/0x9a0 [ 1177.546478][T31423] do_syscall_64+0x4c/0xa0 [ 1177.550908][T31423] ? clear_bhb_loop+0x50/0xa0 [ 1177.555598][T31423] ? clear_bhb_loop+0x50/0xa0 [ 1177.560298][T31423] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1177.566240][T31423] RIP: 0033:0x7f2450bbe929 [ 1177.570670][T31423] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1177.590414][T31423] RSP: 002b:00007f244f227038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1177.598848][T31423] RAX: ffffffffffffffda RBX: 00007f2450de5fa0 RCX: 00007f2450bbe929 [ 1177.606832][T31423] RDX: 0000000000000050 RSI: 0000200000000280 RDI: 2000000000000000 [ 1177.614818][T31423] RBP: 00007f244f227090 R08: 0000000000000000 R09: 0000000000000000 [ 1177.622811][T31423] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1177.630830][T31423] R13: 0000000000000000 R14: 00007f2450de5fa0 R15: 00007ffd3eb1c4c8 [ 1177.638820][T31423] [ 1179.406444][T31471] device veth0_vlan left promiscuous mode [ 1179.471476][T31471] device veth0_vlan entered promiscuous mode [ 1179.528902][T20303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1179.537478][T20303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1179.568589][T20303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1179.618779][T31482] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1179.687229][T31482] device syzkaller0 entered promiscuous mode [ 1181.494146][T31540] device pim6reg1 entered promiscuous mode [ 1182.100318][T31566] device veth1_macvtap left promiscuous mode [ 1182.146312][T31566] device macsec0 entered promiscuous mode [ 1182.798347][T31605] device sit0 entered promiscuous mode [ 1184.105492][T31648] FAULT_INJECTION: forcing a failure. [ 1184.105492][T31648] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1184.126669][T31648] CPU: 0 PID: 31648 Comm: syz.4.11370 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1184.136796][T31648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1184.146877][T31648] Call Trace: [ 1184.150167][T31648] [ 1184.153105][T31648] __dump_stack+0x21/0x30 [ 1184.157446][T31648] dump_stack_lvl+0xee/0x150 [ 1184.162054][T31648] ? show_regs_print_info+0x20/0x20 [ 1184.167256][T31648] dump_stack+0x15/0x20 [ 1184.171407][T31648] should_fail+0x3c1/0x510 [ 1184.175820][T31648] should_fail_alloc_page+0x55/0x80 [ 1184.181022][T31648] prepare_alloc_pages+0x156/0x600 [ 1184.186164][T31648] ? __alloc_pages_bulk+0xab0/0xab0 [ 1184.191364][T31648] ? slab_post_alloc_hook+0x4f/0x2b0 [ 1184.196650][T31648] ? alloc_vmap_area+0x17a/0x1990 [ 1184.201690][T31648] ? __get_vm_area_node+0x14e/0x350 [ 1184.206884][T31648] ? __vmalloc_node_range+0xe8/0x840 [ 1184.212165][T31648] ? kvmalloc_node+0x2b8/0x330 [ 1184.216927][T31648] __alloc_pages+0x10a/0x440 [ 1184.221518][T31648] ? prep_new_page+0x110/0x110 [ 1184.226286][T31648] ? __kasan_check_write+0x14/0x20 [ 1184.231399][T31648] __get_free_pages+0x10/0x30 [ 1184.236071][T31648] kasan_populate_vmalloc_pte+0x29/0x120 [ 1184.241702][T31648] __apply_to_page_range+0x8b0/0xbf0 [ 1184.246985][T31648] ? kasan_populate_vmalloc+0x70/0x70 [ 1184.252355][T31648] ? kasan_populate_vmalloc+0x70/0x70 [ 1184.257724][T31648] apply_to_page_range+0x3b/0x50 [ 1184.262657][T31648] kasan_populate_vmalloc+0x60/0x70 [ 1184.267852][T31648] alloc_vmap_area+0x185c/0x1990 [ 1184.272796][T31648] ? vm_map_ram+0xa60/0xa60 [ 1184.277300][T31648] ? kmem_cache_alloc_trace+0x119/0x270 [ 1184.282857][T31648] ? __get_vm_area_node+0x11d/0x350 [ 1184.288053][T31648] __get_vm_area_node+0x14e/0x350 [ 1184.293079][T31648] __vmalloc_node_range+0xe8/0x840 [ 1184.298183][T31648] ? btf_new_fd+0x1ee/0x920 [ 1184.302676][T31648] ? __kasan_kmalloc_large+0x1a/0xb0 [ 1184.307976][T31648] ? kmalloc_order+0xb9/0x160 [ 1184.312676][T31648] ? kmalloc_order_trace+0x18/0xb0 [ 1184.317778][T31648] ? btf_new_fd+0x1ee/0x920 [ 1184.322276][T31648] __vmalloc_node+0x7f/0x90 [ 1184.326806][T31648] ? btf_new_fd+0x1ee/0x920 [ 1184.331304][T31648] kvmalloc_node+0x2b8/0x330 [ 1184.335885][T31648] ? vm_mmap+0xb0/0xb0 [ 1184.339950][T31648] ? btf_new_fd+0x1b2/0x920 [ 1184.344567][T31648] btf_new_fd+0x1ee/0x920 [ 1184.348917][T31648] bpf_btf_load+0x6f/0x90 [ 1184.353253][T31648] __sys_bpf+0x515/0x730 [ 1184.357510][T31648] ? bpf_link_show_fdinfo+0x310/0x310 [ 1184.362888][T31648] ? debug_smp_processor_id+0x17/0x20 [ 1184.368278][T31648] __x64_sys_bpf+0x7c/0x90 [ 1184.372699][T31648] x64_sys_call+0x4b9/0x9a0 [ 1184.377201][T31648] do_syscall_64+0x4c/0xa0 [ 1184.381629][T31648] ? clear_bhb_loop+0x50/0xa0 [ 1184.386303][T31648] ? clear_bhb_loop+0x50/0xa0 [ 1184.390975][T31648] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1184.396872][T31648] RIP: 0033:0x7f424cd8b929 [ 1184.401282][T31648] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1184.420882][T31648] RSP: 002b:00007f424b3f4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1184.429292][T31648] RAX: ffffffffffffffda RBX: 00007f424cfb2fa0 RCX: 00007f424cd8b929 [ 1184.437282][T31648] RDX: 0000000000000020 RSI: 0000200000000280 RDI: 0000000000000012 [ 1184.445254][T31648] RBP: 00007f424b3f4090 R08: 0000000000000000 R09: 0000000000000000 [ 1184.453219][T31648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1184.461185][T31648] R13: 0000000000000000 R14: 00007f424cfb2fa0 R15: 00007ffd75a85a88 [ 1184.469162][T31648] [ 1185.488841][T31683] device pim6reg1 entered promiscuous mode [ 1185.590259][T31687] device pim6reg1 entered promiscuous mode [ 1185.719108][T31693] device pim6reg1 entered promiscuous mode [ 1186.070085][T31699] device sit0 left promiscuous mode [ 1186.937525][T31730] device pim6reg1 entered promiscuous mode [ 1188.188107][T31776] device pim6reg1 entered promiscuous mode [ 1188.491481][T31774] device syzkaller0 entered promiscuous mode [ 1188.961723][T31802] bond_slave_1: mtu greater than device maximum [ 1195.520827][T31897] device pim6reg1 entered promiscuous mode [ 1195.641717][T31895] device veth1_macvtap left promiscuous mode [ 1195.684335][T31895] device macsec0 entered promiscuous mode [ 1196.816649][T31925] device sit0 entered promiscuous mode [ 1197.366527][T31937] device syzkaller0 entered promiscuous mode [ 1197.428937][T31939] @0ÿ: renamed from bond_slave_0 [ 1200.120196][T31990] device pim6reg1 entered promiscuous mode [ 1200.780199][T32004] bridge0: port 1(bridge_slave_0) entered blocking state [ 1200.796310][T32004] bridge0: port 1(bridge_slave_0) entered disabled state [ 1200.831124][T32004] device bridge_slave_0 entered promiscuous mode [ 1200.891968][T32004] bridge0: port 2(bridge_slave_1) entered blocking state [ 1200.934582][T32004] bridge0: port 2(bridge_slave_1) entered disabled state [ 1200.949351][T32004] device bridge_slave_1 entered promiscuous mode [ 1201.045234][T32028] device pim6reg1 entered promiscuous mode [ 1201.384488][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1201.405137][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1201.508908][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1201.519475][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1201.527776][ T349] bridge0: port 1(bridge_slave_0) entered blocking state [ 1201.534846][ T349] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1201.542535][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1201.586896][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1201.608813][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1201.626706][ T349] bridge0: port 2(bridge_slave_1) entered blocking state [ 1201.633793][ T349] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1201.706560][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1201.727064][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1201.785451][T32067] device pim6reg1 entered promiscuous mode [ 1201.794468][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1201.891755][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1201.926726][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1201.976648][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1202.033629][T32004] device veth0_vlan entered promiscuous mode [ 1202.085868][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1202.116059][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1202.207515][T32004] device veth1_macvtap entered promiscuous mode [ 1202.237365][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1202.249489][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1202.282385][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1202.304818][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1202.326747][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1202.659222][T32124] FAULT_INJECTION: forcing a failure. [ 1202.659222][T32124] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1202.696317][T32124] CPU: 1 PID: 32124 Comm: syz.0.11532 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1202.706439][T32124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1202.716513][T32124] Call Trace: [ 1202.719837][T32124] [ 1202.722775][T32124] __dump_stack+0x21/0x30 [ 1202.727175][T32124] dump_stack_lvl+0xee/0x150 [ 1202.731781][T32124] ? show_regs_print_info+0x20/0x20 [ 1202.736992][T32124] dump_stack+0x15/0x20 [ 1202.741165][T32124] should_fail+0x3c1/0x510 [ 1202.745690][T32124] should_fail_alloc_page+0x55/0x80 [ 1202.750904][T32124] prepare_alloc_pages+0x156/0x600 [ 1202.756007][T32124] ? __alloc_pages_bulk+0xab0/0xab0 [ 1202.761195][T32124] __alloc_pages+0x10a/0x440 [ 1202.765774][T32124] ? prep_new_page+0x110/0x110 [ 1202.770542][T32124] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 1202.776386][T32124] pcpu_populate_chunk+0x184/0xcb0 [ 1202.781580][T32124] ? _find_next_bit+0x106/0x200 [ 1202.786435][T32124] pcpu_alloc+0xc4d/0x1660 [ 1202.790843][T32124] __alloc_percpu_gfp+0x25/0x30 [ 1202.795685][T32124] bpf_map_alloc_percpu+0xc5/0x150 [ 1202.800850][T32124] array_map_alloc+0x39a/0x6d0 [ 1202.805692][T32124] map_create+0x455/0x21b0 [ 1202.810106][T32124] __sys_bpf+0x2cf/0x730 [ 1202.814336][T32124] ? bpf_link_show_fdinfo+0x310/0x310 [ 1202.819699][T32124] __x64_sys_bpf+0x7c/0x90 [ 1202.824105][T32124] x64_sys_call+0x4b9/0x9a0 [ 1202.828595][T32124] do_syscall_64+0x4c/0xa0 [ 1202.832998][T32124] ? clear_bhb_loop+0x50/0xa0 [ 1202.837753][T32124] ? clear_bhb_loop+0x50/0xa0 [ 1202.842426][T32124] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1202.848312][T32124] RIP: 0033:0x7fc7dfda0929 [ 1202.852715][T32124] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1202.872309][T32124] RSP: 002b:00007fc7de409038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1202.880719][T32124] RAX: ffffffffffffffda RBX: 00007fc7dffc7fa0 RCX: 00007fc7dfda0929 [ 1202.888684][T32124] RDX: 0000000000000050 RSI: 0000200000000280 RDI: 2000000000000000 [ 1202.896646][T32124] RBP: 00007fc7de409090 R08: 0000000000000000 R09: 0000000000000000 [ 1202.904618][T32124] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1202.912586][T32124] R13: 0000000000000000 R14: 00007fc7dffc7fa0 R15: 00007ffcd415fc68 [ 1202.920558][T32124] [ 1203.178977][ T10] device bridge_slave_1 left promiscuous mode [ 1203.186714][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 1203.195455][ T10] device bridge_slave_0 left promiscuous mode [ 1203.207935][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 1203.337266][T32144] device sit0 entered promiscuous mode [ 1204.509029][T32200] device sit0 left promiscuous mode [ 1204.692989][T32197] device sit0 entered promiscuous mode [ 1204.990134][T32213] device pim6reg1 entered promiscuous mode [ 1205.294886][T32229] device sit0 left promiscuous mode [ 1206.345722][T32265] device pim6reg1 entered promiscuous mode [ 1207.177191][T32295] device bridge0 entered promiscuous mode [ 1207.410829][T32300] device pim6reg1 entered promiscuous mode [ 1207.608861][T32295] device sit0 entered promiscuous mode [ 1209.119997][T32333] device sit0 left promiscuous mode [ 1209.686022][T32357] device pim6reg1 entered promiscuous mode [ 1210.663754][T32387] device pim6reg1 entered promiscuous mode [ 1212.242001][T32432] tun0: tun_chr_ioctl cmd 1074025677 [ 1212.317737][T32432] tun0: linktype set to 768 [ 1212.465568][T32429] device pim6reg1 entered promiscuous mode [ 1212.832126][T32451] device sit0 left promiscuous mode [ 1213.050135][T32455] device sit0 entered promiscuous mode [ 1213.706416][T32478] device pim6reg1 entered promiscuous mode [ 1214.336498][T32493] device pim6reg1 entered promiscuous mode [ 1215.146393][T32523] device pim6reg1 entered promiscuous mode [ 1215.803358][T32532] device wg2 left promiscuous mode [ 1216.852408][T32554] device pim6reg1 entered promiscuous mode [ 1218.789049][T32591] device pim6reg1 entered promiscuous mode [ 1219.502120][T32619] device pim6reg1 entered promiscuous mode [ 1219.585755][T32621] device sit0 entered promiscuous mode [ 1220.133867][T32625] device pim6reg1 entered promiscuous mode [ 1220.865309][T32639] device veth1_macvtap left promiscuous mode [ 1221.265184][T32646] device syzkaller0 entered promiscuous mode [ 1221.356933][T32651] device pim6reg1 entered promiscuous mode [ 1221.722835][T32658] device pim6reg1 entered promiscuous mode [ 1222.407170][T32682] device pim6reg1 entered promiscuous mode [ 1222.593043][T32693] device pim6reg1 entered promiscuous mode [ 1222.958449][T32699] device pim6reg1 entered promiscuous mode [ 1223.467963][T32735] device sit0 left promiscuous mode [ 1223.596869][T32733] device sit0 entered promiscuous mode [ 1225.665789][ T335] syz.1.11769[335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1225.670458][ T323] device pim6reg1 entered promiscuous mode [ 1225.851513][ T343] device sit0 left promiscuous mode [ 1227.232371][ T369] FAULT_INJECTION: forcing a failure. [ 1227.232371][ T369] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1227.265738][ T369] CPU: 0 PID: 369 Comm: syz.4.11779 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1227.275769][ T369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1227.285830][ T369] Call Trace: [ 1227.289131][ T369] [ 1227.292054][ T369] __dump_stack+0x21/0x30 [ 1227.296373][ T369] dump_stack_lvl+0xee/0x150 [ 1227.300948][ T369] ? show_regs_print_info+0x20/0x20 [ 1227.306133][ T369] dump_stack+0x15/0x20 [ 1227.310276][ T369] should_fail+0x3c1/0x510 [ 1227.314681][ T369] should_fail_alloc_page+0x55/0x80 [ 1227.319878][ T369] prepare_alloc_pages+0x156/0x600 [ 1227.325006][ T369] ? __alloc_pages_bulk+0xab0/0xab0 [ 1227.330196][ T369] ? slab_post_alloc_hook+0x4f/0x2b0 [ 1227.335503][ T369] ? alloc_vmap_area+0x17a/0x1990 [ 1227.340515][ T369] ? __get_vm_area_node+0x14e/0x350 [ 1227.345701][ T369] ? __vmalloc_node_range+0xe8/0x840 [ 1227.350972][ T369] ? kvmalloc_node+0x2b8/0x330 [ 1227.355748][ T369] __alloc_pages+0x10a/0x440 [ 1227.360337][ T369] ? prep_new_page+0x110/0x110 [ 1227.365122][ T369] ? __kasan_check_write+0x14/0x20 [ 1227.370326][ T369] __get_free_pages+0x10/0x30 [ 1227.375015][ T369] kasan_populate_vmalloc_pte+0x29/0x120 [ 1227.380686][ T369] __apply_to_page_range+0x8b0/0xbf0 [ 1227.386137][ T369] ? kasan_populate_vmalloc+0x70/0x70 [ 1227.391522][ T369] ? kasan_populate_vmalloc+0x70/0x70 [ 1227.396901][ T369] apply_to_page_range+0x3b/0x50 [ 1227.401844][ T369] kasan_populate_vmalloc+0x60/0x70 [ 1227.407041][ T369] alloc_vmap_area+0x185c/0x1990 [ 1227.412082][ T369] ? vm_map_ram+0xa60/0xa60 [ 1227.416666][ T369] ? kmem_cache_alloc_trace+0x119/0x270 [ 1227.422210][ T369] ? __get_vm_area_node+0x11d/0x350 [ 1227.427410][ T369] __get_vm_area_node+0x14e/0x350 [ 1227.432448][ T369] __vmalloc_node_range+0xe8/0x840 [ 1227.437573][ T369] ? btf_new_fd+0x1ee/0x920 [ 1227.442076][ T369] ? __kasan_kmalloc_large+0x1a/0xb0 [ 1227.447361][ T369] ? kmalloc_order+0xb9/0x160 [ 1227.452124][ T369] ? kmalloc_order_trace+0x18/0xb0 [ 1227.457256][ T369] ? btf_new_fd+0x1ee/0x920 [ 1227.461769][ T369] __vmalloc_node+0x7f/0x90 [ 1227.466272][ T369] ? btf_new_fd+0x1ee/0x920 [ 1227.470780][ T369] kvmalloc_node+0x2b8/0x330 [ 1227.475369][ T369] ? vm_mmap+0xb0/0xb0 [ 1227.479434][ T369] ? btf_new_fd+0x1b2/0x920 [ 1227.483935][ T369] btf_new_fd+0x1ee/0x920 [ 1227.488262][ T369] bpf_btf_load+0x6f/0x90 [ 1227.492587][ T369] __sys_bpf+0x515/0x730 [ 1227.496822][ T369] ? bpf_link_show_fdinfo+0x310/0x310 [ 1227.502198][ T369] ? debug_smp_processor_id+0x17/0x20 [ 1227.507573][ T369] __x64_sys_bpf+0x7c/0x90 [ 1227.511990][ T369] x64_sys_call+0x4b9/0x9a0 [ 1227.516492][ T369] do_syscall_64+0x4c/0xa0 [ 1227.520904][ T369] ? clear_bhb_loop+0x50/0xa0 [ 1227.525579][ T369] ? clear_bhb_loop+0x50/0xa0 [ 1227.530254][ T369] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1227.536267][ T369] RIP: 0033:0x7f0d6c4d7929 [ 1227.540696][ T369] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1227.560310][ T369] RSP: 002b:00007f0d6ab1f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1227.568739][ T369] RAX: ffffffffffffffda RBX: 00007f0d6c6ff080 RCX: 00007f0d6c4d7929 [ 1227.576710][ T369] RDX: 0000000000000020 RSI: 0000200000000280 RDI: 0000000000000012 [ 1227.584679][ T369] RBP: 00007f0d6ab1f090 R08: 0000000000000000 R09: 0000000000000000 [ 1227.592670][ T369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1227.600749][ T369] R13: 0000000000000000 R14: 00007f0d6c6ff080 R15: 00007ffe5c0273e8 [ 1227.608726][ T369] [ 1229.787369][ T423] device sit0 left promiscuous mode [ 1230.708678][ T458] device sit0 entered promiscuous mode [ 1231.514418][ T476] device pim6reg1 entered promiscuous mode [ 1231.747060][ T483] device veth1_to_bond entered promiscuous mode [ 1232.930427][ T507] FAULT_INJECTION: forcing a failure. [ 1232.930427][ T507] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1232.990465][ T507] CPU: 1 PID: 507 Comm: syz.0.11826 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 1233.000506][ T507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1233.010564][ T507] Call Trace: [ 1233.013846][ T507] [ 1233.016780][ T507] __dump_stack+0x21/0x30 [ 1233.021113][ T507] dump_stack_lvl+0xee/0x150 [ 1233.025699][ T507] ? show_regs_print_info+0x20/0x20 [ 1233.030897][ T507] dump_stack+0x15/0x20 [ 1233.035048][ T507] should_fail+0x3c1/0x510 [ 1233.039464][ T507] should_fail_alloc_page+0x55/0x80 [ 1233.044666][ T507] prepare_alloc_pages+0x156/0x600 [ 1233.049778][ T507] ? __alloc_pages_bulk+0xab0/0xab0 [ 1233.054976][ T507] ? slab_post_alloc_hook+0x4f/0x2b0 [ 1233.060280][ T507] ? alloc_vmap_area+0x17a/0x1990 [ 1233.065299][ T507] ? __get_vm_area_node+0x14e/0x350 [ 1233.070492][ T507] ? __vmalloc_node_range+0xe8/0x840 [ 1233.075776][ T507] ? kvmalloc_node+0x2b8/0x330 [ 1233.080549][ T507] __alloc_pages+0x10a/0x440 [ 1233.085139][ T507] ? prep_new_page+0x110/0x110 [ 1233.089908][ T507] ? __kasan_check_write+0x14/0x20 [ 1233.095023][ T507] __get_free_pages+0x10/0x30 [ 1233.099698][ T507] kasan_populate_vmalloc_pte+0x29/0x120 [ 1233.105334][ T507] __apply_to_page_range+0x8b0/0xbf0 [ 1233.110617][ T507] ? kasan_populate_vmalloc+0x70/0x70 [ 1233.115991][ T507] ? kasan_populate_vmalloc+0x70/0x70 [ 1233.121360][ T507] apply_to_page_range+0x3b/0x50 [ 1233.126305][ T507] kasan_populate_vmalloc+0x60/0x70 [ 1233.131501][ T507] alloc_vmap_area+0x185c/0x1990 [ 1233.136450][ T507] ? vm_map_ram+0xa60/0xa60 [ 1233.140952][ T507] ? kmem_cache_alloc_trace+0x119/0x270 [ 1233.146494][ T507] ? __get_vm_area_node+0x11d/0x350 [ 1233.151690][ T507] __get_vm_area_node+0x14e/0x350 [ 1233.156712][ T507] __vmalloc_node_range+0xe8/0x840 [ 1233.161818][ T507] ? btf_new_fd+0x1ee/0x920 [ 1233.166338][ T507] ? __kasan_kmalloc_large+0x1a/0xb0 [ 1233.171617][ T507] ? kmalloc_order+0xb9/0x160 [ 1233.176317][ T507] ? kmalloc_order_trace+0x18/0xb0 [ 1233.181431][ T507] ? btf_new_fd+0x1ee/0x920 [ 1233.186103][ T507] __vmalloc_node+0x7f/0x90 [ 1233.190603][ T507] ? btf_new_fd+0x1ee/0x920 [ 1233.195103][ T507] kvmalloc_node+0x2b8/0x330 [ 1233.199692][ T507] ? vm_mmap+0xb0/0xb0 [ 1233.203766][ T507] ? btf_new_fd+0x1b2/0x920 [ 1233.208267][ T507] btf_new_fd+0x1ee/0x920 [ 1233.212597][ T507] bpf_btf_load+0x6f/0x90 [ 1233.216923][ T507] __sys_bpf+0x515/0x730 [ 1233.221164][ T507] ? bpf_link_show_fdinfo+0x310/0x310 [ 1233.226531][ T507] ? debug_smp_processor_id+0x17/0x20 [ 1233.231903][ T507] __x64_sys_bpf+0x7c/0x90 [ 1233.236317][ T507] x64_sys_call+0x4b9/0x9a0 [ 1233.240819][ T507] do_syscall_64+0x4c/0xa0 [ 1233.245232][ T507] ? clear_bhb_loop+0x50/0xa0 [ 1233.249904][ T507] ? clear_bhb_loop+0x50/0xa0 [ 1233.254577][ T507] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1233.260472][ T507] RIP: 0033:0x7fc7dfda0929 [ 1233.264886][ T507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1233.284501][ T507] RSP: 002b:00007fc7de3e8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1233.292916][ T507] RAX: ffffffffffffffda RBX: 00007fc7dffc8080 RCX: 00007fc7dfda0929 [ 1233.300886][ T507] RDX: 0000000000000020 RSI: 0000200000000280 RDI: 0000000000000012 [ 1233.308855][ T507] RBP: 00007fc7de3e8090 R08: 0000000000000000 R09: 0000000000000000 [ 1233.316830][ T507] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1233.324815][ T507] R13: 0000000000000001 R14: 00007fc7dffc8080 R15: 00007ffcd415fc68 [ 1233.332793][ T507] [ 1235.049169][ T557] device pim6reg1 entered promiscuous mode [ 1236.880362][ T594] device pim6reg1 entered promiscuous mode [ 1237.107786][ T597] device pim6reg1 entered promiscuous mode [ 1238.785686][ T646] device pim6reg1 entered promiscuous mode [ 1239.289751][ T676] device pim6reg1 entered promiscuous mode [ 1239.964640][ T684] device pim6reg1 entered promiscuous mode [ 1240.672487][ T714] device wg2 entered promiscuous mode [ 1240.751226][ T711] device pim6reg1 entered promiscuous mode [ 1240.848162][ T719] device wg2 entered promiscuous mode [ 1241.917335][ T745] device pim6reg1 entered promiscuous mode [ 1242.648113][ T763] device pim6reg1 entered promiscuous mode [ 1242.965092][ T765] device pim6reg1 entered promiscuous mode [ 1243.123943][ T778] device macsec0 entered promiscuous mode [ 1243.480680][ T787] device pim6reg1 entered promiscuous mode [ 1244.471357][ T807] device syzkaller0 entered promiscuous mode [ 1244.678107][ T815] device sit0 entered promiscuous mode [ 1244.738757][ T809] device pim6reg1 entered promiscuous mode [ 1244.773861][ T813] device pim6reg1 entered promiscuous mode [ 1244.812592][ T820] syz.5.11930[820] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1244.812702][ T820] syz.5.11930[820] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1245.100551][ T820] device wg2 entered promiscuous mode [ 1245.206596][ T822] device sit0 left promiscuous mode [ 1245.851669][ T30] audit: type=1400 audit(1750744515.551:165): avc: denied { create } for pid=839 comm="syz.5.11936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1246.211801][ T851] device syzkaller0 entered promiscuous mode [ 1246.547390][ T869] device pim6reg1 entered promiscuous mode [ 1247.315868][ T915] device pim6reg1 entered promiscuous mode [ 1248.733858][ T936] device syzkaller0 entered promiscuous mode [ 1248.760961][ T953] device sit0 left promiscuous mode [ 1248.907581][ T954] device sit0 entered promiscuous mode [ 1249.285859][ T968] Â: renamed from pim6reg1 [ 1250.639900][ T1015] device pim6reg1 entered promiscuous mode [ 1251.305681][ T1028] device sit0 left promiscuous mode [ 1251.612011][ T1031] device sit0 left promiscuous mode [ 1252.286204][ T1055] device pim6reg1 entered promiscuous mode [ 1254.302558][ T1089] device pim6reg1 entered promiscuous mode