last executing test programs: 9.257039817s ago: executing program 1 (id=2940): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b51811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x8000000000000001) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1d, 0x1, 0xfffffffc, &(0x7f0000000040)={0x0, 0x0}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x18) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000007902c00000000000950031a200000000"], &(0x7f0000000180)='syzkaller\x00', 0x4, 0x98, &(0x7f00000000c0)=""/152}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000008c0)={0xffffffffffffffff, &(0x7f00000001c0)="d41c78af2f1986a1c10aa708c394d8", &(0x7f0000000900)=""/163}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000006000000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYRES16=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="00000004000000050000008b9f141d20258ab6f27bc4c36cb484b85af1d782a6a4c05cfebad4beec86cc9e9d42831c8b9453a7c83bc7085c011112ffac042e0043af19b00454b849b71b7dd065b64b4fafbe03c3db970a074799164c7222c8bca2", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x4ca}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0xe62}, 0x8000, 0xc8, 0x0, 0x6, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x69}, 0xffffffffffffffff, 0x13, 0xffffffffffffffff, 0x3) close(0xffffffffffffffff) 4.658276778s ago: executing program 1 (id=2958): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB="000000000000000097d243e2cd4f880800000000dc5e57b45e2078c2b18403cd5d1fbe65f4b88e9d3cd668e141ff5c824a5d1f5396405e14e3132828fa6dbbafa158016aae5105afcde9b503fb8e23ace0eb3361fceb378e584c155605e8", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000004000000000000000000"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x18) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1329e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x14000, 0x1, 0xffe, 0x0, 0x2, 0x0, 0x400, 0x0, 0x400002}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x0, 0x0, 0x8000, 0x8000, 0xffffffffffffffff, 0xfffffffd}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r3, @ANYRES32=r5, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r6}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x2004, 0x4, 0x0, 0x0, 0x0, 0x5, 0x102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r8, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) 4.254161305s ago: executing program 1 (id=2961): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x600000000000000, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x58, 0x4, 0x5}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={r5, r0}, 0xc) syz_clone(0x44044000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/13], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x41}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = openat$cgroup_int(r6, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) r9 = openat$cgroup_procs(r6, &(0x7f0000001a80)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000380), 0x12) write$cgroup_int(r8, &(0x7f0000000040), 0x1) 4.172276277s ago: executing program 3 (id=2964): bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000240)={0x7}, 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f00000000c0)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[@ANYBLOB='-7'], 0x9) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000040a3eb2c0000000000000009000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000430000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000006100000085000000a00000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r5, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d88a8", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0xffa2, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x4}, 0x50) r6 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) write$cgroup_int(r6, &(0x7f0000000200)=0x8, 0x12) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r7}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11800, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000004000000bb7f5a00c600feff0000000a9500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 3.791258455s ago: executing program 0 (id=2967): write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB], 0xfdef) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) write$cgroup_subtree(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486"], 0x36) 3.388150103s ago: executing program 0 (id=2968): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup=r0, 0x11, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0}, 0x40) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f0000000340)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000d80)=@generic={&(0x7f0000000d40)='./file0\x00', 0x0, 0x8}, 0x18) bpf$PROG_BIND_MAP(0x23, &(0x7f00000006c0), 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000010700", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x3abe, 0x0, r4, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) 3.272035435s ago: executing program 2 (id=2970): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x40, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00'}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000), 0x8) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x40, 0x0) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) (async) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00'}, 0x10) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000), 0x8) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) (async) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) (async) 3.142328308s ago: executing program 2 (id=2971): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB="000000000000000097d243e2cd4f880800000000dc5e57b45e2078c2b18403cd5d1fbe65f4b88e9d3cd668e141ff5c824a5d1f5396405e14e3132828fa6dbbafa158016aae5105afcde9b503fb8e23ace0eb3361fceb378e584c155605e8", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000004000000000000000000"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x18) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1329e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x14000, 0x1, 0xffe, 0x0, 0x2, 0x0, 0x400, 0x0, 0x400002}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x0, 0x0, 0x8000, 0x8000, 0xffffffffffffffff, 0xfffffffd}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r3, @ANYRES32=r5, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r6}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x2004, 0x4, 0x0, 0x0, 0x0, 0x5, 0x102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r8, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) 3.073957429s ago: executing program 0 (id=2972): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd77, 0x4, @perf_config_ext, 0x0, 0xc8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0900000004000000ff0f00000300000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000300000000000000f6aec9a318643bd14dce3e87d8a25c3e44ea0d202ffdb4f2"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xd, 0xc, &(0x7f0000000400)=ANY=[@ANYRESHEX=r0, @ANYRES32=r3, @ANYRESHEX=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYRES16=r2, @ANYRES8=r0, @ANYBLOB="00000000000000000000000010000800000000040f855fed25e12c10ad6caa77788feac9bd7973722006ec8c9e6c3e2ca3826c26b5c70d5fa79e10bf9d159eaf76807a90063d26dd9fd9519c8e6906794efce9472eb5903002f349da40ee386f5edfdb1ab161f3fdcfe870eeb69fb56360e4dfc4b12ebfc419fd0301c02f2e1477a2eecf0e3c835dfa128c7ee8a69dd5f3f129af55c9ac7839c0185ed8fe50b5db73c2731d0179ea6ca743a92ad7907e5362ab8c4b8e208be9169ba6177cb91670075c939150ba5c1d3a8e39c64ba5", @ANYRESDEC=r0, @ANYRESDEC=r3, @ANYRESOCT=r4], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, 0x0, 0x0) write$cgroup_pid(r6, &(0x7f0000000880), 0x12) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r7 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) write$cgroup_subtree(r7, &(0x7f00000000c0)=ANY=[], 0x4) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.786771685s ago: executing program 2 (id=2973): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000180), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x48, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, @perf_config_ext={0x9, 0xfffffffffffffff6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001000000000000000020000000000"], 0x0, 0x1a}, 0x28) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1}, 0x0, &(0x7f0000000040)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002500)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x94) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a1, &(0x7f0000000080)) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)={0x0, 0x0}) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) r5 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000c40), 0x12) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) 2.49641972s ago: executing program 0 (id=2974): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@fallback=r2, 0xffffffffffffffff, 0x22, 0x0, r2, @void, @value=r3}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r0, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa6c"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0xe, &(0x7f0000000180)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4}, @ldst={0x2, 0x3, 0x0, 0x8, 0x8, 0x18, 0x1}, @alu={0x7, 0x0, 0x5, 0x3, 0xd3d6167014f30445, 0x30, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x81}}], &(0x7f0000000080)='syzkaller\x00', 0x49e, 0xc5, &(0x7f0000000540)=""/197, 0x40f00, 0x29, '\x00', r4, 0x25, r6, 0x8, &(0x7f00000003c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xb, 0xfffff859, 0xe}, 0x10, 0x0, 0x0, 0x6, &(0x7f00000004c0)=[r0, r3, r0, r0, r0, r1, r0, r0, r1], &(0x7f0000000640)=[{0x4, 0x1, 0x7, 0x3}, {0x1, 0x1, 0x10}, {0x3, 0x4, 0xb, 0xb}, {0x0, 0x1, 0x1, 0x8}, {0x4, 0x3, 0x10, 0xa}, {0x4, 0x3, 0x10, 0x1}], 0x10, 0x78e4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0xa, 0x8, 0x1, 0x40, 0x42}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003, r8}, 0x38) ioctl$PERF_EVENT_IOC_ID(r7, 0x80082407, &(0x7f0000000000)) 2.382326003s ago: executing program 3 (id=2975): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x12, 0x8, 0x4, 0x7cb4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xd, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4315}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000240)=[0x0], &(0x7f0000000280)=[0x0, 0x0], 0x0, 0xe6, &(0x7f00000003c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x98, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0x6, 0x4, 0x8d, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x11, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x2c, &(0x7f0000000080)=""/44, 0x40f00, 0x11, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000840)={0x2001, 0x10, 0x2, 0x5}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000880), &(0x7f00000008c0)=[{0x4, 0x5, 0xa, 0xb}, {0x2, 0x5, 0x0, 0x5}, {0x3, 0x2, 0x0, 0xb}, {0x2, 0x5, 0x8, 0x5}, {0x0, 0x2, 0x1, 0xb}], 0x10, 0x10001}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYRES64=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) 2.100014748s ago: executing program 3 (id=2976): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000"], 0x0, 0x37}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0b000000080000000c000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB="0400000004000000040000000500010000000000", @ANYRES32, @ANYBLOB="ffffff7f00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000dfffffff00000000000200000000000000"], 0x50) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x58, &(0x7f0000000340)}, 0x10) close(0xffffffffffffffff) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)=0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) syz_clone(0x60002080, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8982, &(0x7f0000000080)) 2.00267026s ago: executing program 4 (id=2978): write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea033a00fe08000e40"], 0xfdef) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) write$cgroup_subtree(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486"], 0x36) 1.927356232s ago: executing program 2 (id=2979): bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000240)={0x7}, 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f00000000c0)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[@ANYBLOB='-7'], 0x9) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000040a3eb2c0000000000000009000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000430000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000006100000085000000a00000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r5, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d88a8", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0xffa2, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x4}, 0x50) r6 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) write$cgroup_int(r6, &(0x7f0000000200)=0x8, 0x12) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r7}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11800, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000004000000bb7f5a00c600feff0000000a9500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 1.584069198s ago: executing program 0 (id=2980): perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) 1.583625988s ago: executing program 4 (id=2981): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x4004743d, 0x110e22fff6) close(r2) write$cgroup_type(r3, &(0x7f0000000100), 0x9) 1.559023969s ago: executing program 0 (id=2982): write$cgroup_devices(0xffffffffffffffff, 0x0, 0x9) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x81e0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x10, 0x0, 0x0, 0x9}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000040)='signal_deliver\x00', r0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x18, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000400000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000001007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000008500000082000000bf91000000000000b7020000020000008500000084000000b700000000000000958500"/104], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000180)='signal_generate\x00', r2}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x3, 0x5, &(0x7f0000000080)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x4, 0xc7, &(0x7f0000000900)=""/199, 0x0, 0x5}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d280f", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x17, &(0x7f0000000a00)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x3}, @ldst={0x0, 0x0, 0x6, 0x7, 0x2, 0x2, 0xfffffffffffffff0}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_fd={0x18, 0xb, 0x1, 0x0, r2}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x15ce}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x200}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffd}, @generic={0xb8, 0xc, 0x1, 0x8000, 0x6}], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB="1300000004000000040000000500010000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000050000001b00"/28], 0x50) openat$cgroup_ro(r3, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_clone(0xc0000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x2000, 0x4000000000, 0x0, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) gettid() 1.431360691s ago: executing program 4 (id=2983): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB="000000000000000097d243e2cd4f880800000000dc5e57b45e2078c2b18403cd5d1fbe65f4b88e9d3cd668e141ff5c824a5d1f5396405e14e3132828fa6dbbafa158016aae5105afcde9b503fb8e23ace0eb3361fceb378e584c155605e8", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000004000000000000000000"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x18) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1329e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x14000, 0x1, 0xffe, 0x0, 0x2, 0x0, 0x400, 0x0, 0x400002}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x0, 0x0, 0x8000, 0x8000, 0xffffffffffffffff, 0xfffffffd}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r3, @ANYRES32=r5, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r6}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x2004, 0x4, 0x0, 0x0, 0x0, 0x5, 0x102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r8, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) 1.221036236s ago: executing program 3 (id=2984): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYRES16=r0], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r2}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58, &(0x7f00000004c0)}, 0x10) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x0, 0x0, 0x6e, 0x0, 0x0, 0x200, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8820, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r3 = bpf$MAP_CREATE(0x600000000000000, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={r5, r3}, 0xc) syz_clone(0x44044000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/13], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x41}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r8 = openat$cgroup_int(r6, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) r9 = openat$cgroup_procs(r6, &(0x7f0000001a80)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000380), 0x12) write$cgroup_int(r8, &(0x7f0000000040), 0x1) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x8, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000380)) 1.043640249s ago: executing program 1 (id=2985): r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001240)={0x0, 0x4, 0x8}, 0xc) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001440)={0x6, 0x2, &(0x7f0000001280)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}], &(0x7f00000012c0)='GPL\x00', 0xffff8000, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001300)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000001340)={0x0, 0x2, 0xa, 0x1c}, 0x10, 0x0, 0x0, 0xa, 0x0, &(0x7f0000001380)=[{0x3, 0x2, 0x8, 0xc}, {0x4, 0x4, 0x3, 0xb}, {0x4, 0x5, 0x5, 0x5}, {0x1, 0x10001, 0x9, 0x2}, {0x0, 0x4, 0x1}, {0x2, 0x2}, {0xf, 0x3, 0xb, 0x9}, {0x2, 0x1, 0x5}, {0x5, 0x2, 0x7, 0x2}, {0x1, 0x2, 0xd}], 0x10, 0x6}, 0x94) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_tracing={0x1a, 0x4, &(0x7f0000000200)=@raw=[@generic={0x6, 0x8, 0xe, 0x5, 0x2}, @jmp={0x5, 0x0, 0x5, 0xb, 0x7, 0x6, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, 0x1}], &(0x7f0000000240)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41100, 0x65, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0x7, 0xa, 0x4}, 0x10, 0x15576, r1, 0x1, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, r0], &(0x7f0000000440)=[{0x0, 0x1, 0x9, 0x3}], 0x10, 0xfffffdf9}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000840)={r2, 0x0, 0x3c, 0x7d, &(0x7f0000000480)="0840f8ce9d4557e5ed0ec03450f0e0c4d37899ddb8ddf623b3cd4dadcd43c0898816a04e4e16cf3ad307cb3af9889bae2b51e259b747ad234db78919", &(0x7f0000000540)=""/125, 0x1, 0x0, 0x23, 0x39, &(0x7f0000000680)="c1f85f314d69d4e531fed4d32d0b7f68f3417691d4f680876ec07e44acd9fefa36a4bd", &(0x7f00000006c0)="13a38b544fbdc7d1d6bd60c12d8b4faf52a37b94d003820a6b11945c22c7b4027d1171e6ea30270ba44adbc6dca801b14b0db6453ecbbeec11", 0x6, 0x0, 0x7ff}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001580)=@base={0x1b, 0x0, 0x0, 0x5}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000700)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x2e}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}}]}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000001500), 0x8000, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r4, 0x18000000000002a0, 0x4f, 0x0, &(0x7f00000002c0)="d2ff03076003008cb89e08f086dd", 0x0, 0xd5b1, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000080000000000000000000d4d428ac577e43b3d18b6980303a12f725fa3fa453a566def5aef03d577a060a651483", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0xfffffffc}, 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffffe, 0x0, 0xffffffffffffffff, 0xfffffcf2}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x700, 0xe, 0x0, &(0x7f0000000380)="e460cdfbef2408000008019386dd", 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000, 0x10000000000}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001180)={r2, 0xe0, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000ec0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000000f00)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000f40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x88, &(0x7f0000000f80)=[{}, {}], 0x10, 0x10, &(0x7f0000000fc0), &(0x7f0000001000), 0x8, 0xe1, 0x8, 0x8, &(0x7f0000001040)}}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000001540)=r0, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000940)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f0000000d40)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="12000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000e40)=ANY=[@ANYRES32=r9, @ANYRES32=r8, @ANYBLOB="05"], 0x10) close(r8) close(r9) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r10, &(0x7f0000000180), 0x40010) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000011c0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x2, '\x00', r7, r10}, 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r12}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32=r12, @ANYBLOB="00000000000000ec00da7c9c3b9ee3d1eb000000", @ANYRES16, @ANYRES32=r10, @ANYBLOB='\x00'/25], 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c80)={r11, 0xe0, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000009c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, &(0x7f0000000a00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000a40)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x6c, &(0x7f0000000a80)=[{}], 0x8, 0x10, &(0x7f0000000ac0), &(0x7f0000000b00), 0x8, 0x55, 0x8, 0x8, &(0x7f0000000b40)}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) 914.478641ms ago: executing program 1 (id=2986): bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000240)={0x7}, 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f00000000c0)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[@ANYBLOB='-7'], 0x9) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000040a3eb2c0000000000000009000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000430000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000006100000085000000a00000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r5, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d88a8", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0xffa2, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x4}, 0x50) r6 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) write$cgroup_int(r6, &(0x7f0000000200)=0x8, 0x12) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r7}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11800, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000004000000bb7f5a00c600feff0000000a9500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 581.386888ms ago: executing program 3 (id=2987): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000000040000cd00000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@func={0x9, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x2e, 0x2e, 0x30, 0x5f, 0x30, 0x5f]}}, &(0x7f0000000500)=""/130, 0x2c, 0x82, 0x0, 0x8}, 0x28) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r6, 0x0, 0xf, 0x0, &(0x7f00000000c0)="5cdd3086ddffff6633c9bbac88a886", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="850000006b0000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) recvmsg$unix(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000002380)=[{&(0x7f0000002480)=""/195, 0xc3}], 0x1}, 0x2000) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x4000800) 581.186068ms ago: executing program 4 (id=2988): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[], 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x5c, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000000000000000000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000340)='fdb_delete\x00', r0}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 528.160399ms ago: executing program 4 (id=2989): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='kmem_cache_free\x00', r0}, 0x18) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c000, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x401}, 0x100080, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x25, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000700), &(0x7f0000000540), 0x8, 0x496, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="1e000000a01200000a000000fc69ab7703000000", @ANYRES32, @ANYBLOB="085fff00"/20, @ANYRES32=r1, @ANYRES32, @ANYBLOB="0500000003000000040000000900"/28], 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000900)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x9, [@type_tag={0x10, 0x0, 0x0, 0x12, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x1, 0x2}}, @int={0x9, 0x0, 0x0, 0x1, 0x0, 0x33, 0x0, 0x45, 0x4}, @type_tag={0x1, 0x0, 0x0, 0x12, 0x4}, @volatile={0xa, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x2e, 0x30, 0xb0, 0x6f, 0x0, 0x2e, 0x1e]}}, &(0x7f0000000e80)=""/4096, 0x6d, 0x1000, 0x0, 0x6}, 0x28) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='blkio.bfq.io_service_time\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0xffffffffffffffff, 0x5, 0xc}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000540), &(0x7f0000000580)=r0}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000600)={0x1}, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYRES64=r3], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, r2}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000900)=ANY=[@ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r6}, &(0x7f00000006c0), &(0x7f0000000700)=r5}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r8, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r9}, 0x10) sendmsg$inet(r4, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x4040086) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r10}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x7, 0xfffffff7, 0xfffffffb, 0x1010, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3, 0x5}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000006c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x7f, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x50) 478.31177ms ago: executing program 3 (id=2990): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b5181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x8000000000000001) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1d, 0x1, 0xfffffffc, &(0x7f0000000040)={0x0, 0x0}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x18) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000007902c00000000000950031a200000000"], &(0x7f0000000180)='syzkaller\x00', 0x4, 0x98, &(0x7f00000000c0)=""/152}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000008c0)={0xffffffffffffffff, &(0x7f00000001c0)="d41c78af2f1986a1c10aa708c394d8", &(0x7f0000000900)=""/163}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000006000000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYRES16=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="00000004000000050000008b9f141d20258ab6f27bc4c36cb484b85af1d782a6a4c05cfebad4beec86cc9e9d42831c8b9453a7c83bc7085c011112ffac042e0043af19b00454b849b71b7dd065b64b4fafbe03c3db970a074799164c7222c8bca2", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x4ca}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0xe62}, 0x8000, 0xc8, 0x0, 0x6, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x69}, 0xffffffffffffffff, 0x13, 0xffffffffffffffff, 0x3) close(0xffffffffffffffff) 403.169772ms ago: executing program 4 (id=2991): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x8000000000000001) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1d, 0x1, 0xfffffffc, &(0x7f0000000040)={0x0, 0x0}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x18) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000007902c00000000000950031a200000000"], &(0x7f0000000180)='syzkaller\x00', 0x4, 0x98, &(0x7f00000000c0)=""/152}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000008c0)={0xffffffffffffffff, &(0x7f00000001c0)="d41c78af2f1986a1c10aa708c394d8", &(0x7f0000000900)=""/163}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000006000000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYRES16=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="00000004000000050000008b9f141d20258ab6f27bc4c36cb484b85af1d782a6a4c05cfebad4beec86cc9e9d42831c8b9453a7c83bc7085c011112ffac042e0043af19b00454b849b71b7dd065b64b4fafbe03c3db970a074799164c7222c8bca2", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x4ca}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0xe62}, 0x8000, 0xc8, 0x0, 0x6, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x69}, 0xffffffffffffffff, 0x13, 0xffffffffffffffff, 0x3) close(0xffffffffffffffff) 402.462131ms ago: executing program 2 (id=2992): write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd"], 0xfdef) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) write$cgroup_subtree(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486"], 0x36) 38.057789ms ago: executing program 1 (id=2993): perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x0, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x200, 0xc0430, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x1, 0x5}, 0x9, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1fffffff}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRESOCT=0x0, @ANYBLOB="07000000000000000000000000e171d38caf0532a448e2336bac00000000b4d800", @ANYRES32, @ANYBLOB="02000000000000000000e2ff0000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=@base={0x9, 0x8, 0xc, 0x5}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000850000009e00000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000e40)={r5}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0xf3, 0x0, 0x0, 0x1, 0xa66a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/uts\x00') syz_clone(0x8080400, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000200)="f842c5861fc9f47e54e2d0") 0s ago: executing program 2 (id=2994): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8e, 0xe7c9, 0x1}, 0x48) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xe30a, r1}, 0x38) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000006000000040000000600000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000f44204ff0000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f00000002c0), 0x20000000}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) syz_clone(0x410e6080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)="2fd0ff0006094f492faff2f173e1ac871d48eef87bb90a19da77ed4bb5ae2e86f7b0cf112203043f022f05c93af58dc47d13e4ed9d9426f7db4e53422cbc58b6b2e48d2a7570b19a5bdcded6dfa976c4bce46e30294d29a8f2bbfa35a756c52f5861fc73de3cd1c8f287a49685e7518b86f45801c10da574d850fd5c2ad8f247931b3c139b7fa61e4af791a289") kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.86' (ED25519) to the list of known hosts. [ 23.722285][ T30] audit: type=1400 audit(1756977707.329:64): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 23.723881][ T273] cgroup: Unknown subsys name 'net' [ 23.745073][ T30] audit: type=1400 audit(1756977707.329:65): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.772749][ T30] audit: type=1400 audit(1756977707.359:66): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.772942][ T273] cgroup: Unknown subsys name 'devices' [ 23.945086][ T273] cgroup: Unknown subsys name 'hugetlb' [ 23.950755][ T273] cgroup: Unknown subsys name 'rlimit' [ 24.211163][ T30] audit: type=1400 audit(1756977707.819:67): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 24.234388][ T30] audit: type=1400 audit(1756977707.819:68): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 24.259281][ T30] audit: type=1400 audit(1756977707.819:69): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 24.287437][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 24.296377][ T30] audit: type=1400 audit(1756977707.909:70): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.322170][ T30] audit: type=1400 audit(1756977707.909:71): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.389981][ T30] audit: type=1400 audit(1756977707.999:72): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.390571][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 24.415634][ T30] audit: type=1400 audit(1756977707.999:73): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.987598][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.994845][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.002623][ T281] device bridge_slave_0 entered promiscuous mode [ 25.024512][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.031599][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.039102][ T281] device bridge_slave_1 entered promiscuous mode [ 25.065647][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.072891][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.080416][ T284] device bridge_slave_0 entered promiscuous mode [ 25.095046][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.102202][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.109904][ T283] device bridge_slave_0 entered promiscuous mode [ 25.116861][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.124046][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.131488][ T284] device bridge_slave_1 entered promiscuous mode [ 25.144828][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.152064][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.159602][ T283] device bridge_slave_1 entered promiscuous mode [ 25.216022][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.223183][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.230524][ T282] device bridge_slave_0 entered promiscuous mode [ 25.247218][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.254420][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.261895][ T282] device bridge_slave_1 entered promiscuous mode [ 25.293926][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.301085][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.308630][ T285] device bridge_slave_0 entered promiscuous mode [ 25.329783][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.337141][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.344709][ T285] device bridge_slave_1 entered promiscuous mode [ 25.478828][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.486071][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.493531][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.500837][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.530190][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.537400][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.544727][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.551884][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.580434][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.587519][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.594828][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.601877][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.621285][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.628370][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.646135][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.653254][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.660759][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.667837][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.677945][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.685723][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.694022][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.701471][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.709030][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.716323][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.723675][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.731127][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.738678][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.745936][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.768241][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.776600][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.783751][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.791138][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.799568][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.806767][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.814643][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.843714][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.852294][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.861087][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.868279][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.876187][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.884624][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.891663][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.899097][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.907640][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.915791][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.923376][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.930777][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 25.939188][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.947389][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.954638][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.987088][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.995504][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.002566][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.010171][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.019526][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.026596][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.034238][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.042593][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.050813][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.059193][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.067392][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.075825][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.084288][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.092392][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.100452][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.108907][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.117350][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.124503][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.131868][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.139939][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.149282][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.156922][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.166075][ T283] device veth0_vlan entered promiscuous mode [ 26.173628][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.181293][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.202484][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.211059][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.221942][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.230490][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.242235][ T283] device veth1_macvtap entered promiscuous mode [ 26.257670][ T284] device veth0_vlan entered promiscuous mode [ 26.264081][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.272263][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.280547][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.288673][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.297185][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.306043][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 26.314693][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.323075][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.330129][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.337701][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.345640][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.353786][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.361837][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.370061][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.378011][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.386314][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.394103][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.401699][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.409251][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.418212][ T282] device veth0_vlan entered promiscuous mode [ 26.431582][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.440144][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.448501][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.455562][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.463269][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.471729][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.480357][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.488760][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.505708][ T282] device veth1_macvtap entered promiscuous mode [ 26.513179][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.529665][ T284] device veth1_macvtap entered promiscuous mode [ 26.539044][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.547732][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.556513][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.564813][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.573243][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.581662][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.598062][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.614060][ T282] request_module fs-gadgetfs succeeded, but still no fs? [ 26.619487][ T281] device veth0_vlan entered promiscuous mode [ 26.637540][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.653479][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.661939][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.671138][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.679729][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.689109][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.697584][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.725562][ T285] device veth0_vlan entered promiscuous mode [ 26.732109][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.744451][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.754070][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.762596][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.772597][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.781819][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.790184][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.798931][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.807933][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.816531][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.825354][ T281] device veth1_macvtap entered promiscuous mode [ 26.855924][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.874961][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.897742][ T285] device veth1_macvtap entered promiscuous mode [ 26.917999][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.933162][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.935040][ C1] hrtimer: interrupt took 25027 ns [ 26.950895][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.963224][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.001071][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.026519][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.052008][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.077564][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.220885][ T381] syz.4.14[381] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.220979][ T381] syz.4.14[381] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.476964][ T378] device syzkaller0 entered promiscuous mode [ 28.537296][ T390] ªªªªªª: renamed from vlan0 [ 28.823673][ T30] kauditd_printk_skb: 35 callbacks suppressed [ 28.823689][ T30] audit: type=1400 audit(1756977712.439:109): avc: denied { setopt } for pid=405 comm="syz.1.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 29.037641][ T418] syz.3.26[418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.037720][ T418] syz.3.26[418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.124974][ T421] FAULT_INJECTION: forcing a failure. [ 29.124974][ T421] name failslab, interval 1, probability 0, space 0, times 1 [ 29.176579][ T30] audit: type=1400 audit(1756977712.789:110): avc: denied { ioctl } for pid=417 comm="syz.3.26" path="pid:[4026532450]" dev="nsfs" ino=4026532450 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 29.193070][ T411] device syzkaller0 entered promiscuous mode [ 29.212753][ T421] CPU: 1 PID: 421 Comm: syz.1.27 Not tainted syzkaller #0 [ 29.220019][ T421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 29.230114][ T421] Call Trace: [ 29.233416][ T421] [ 29.236378][ T421] __dump_stack+0x21/0x30 [ 29.241137][ T421] dump_stack_lvl+0xee/0x150 [ 29.245778][ T421] ? show_regs_print_info+0x20/0x20 [ 29.251140][ T421] ? proc_pid_make_inode+0x27/0x1d0 [ 29.256640][ T421] ? proc_pident_lookup+0x1c0/0x270 [ 29.262192][ T421] ? proc_tid_base_lookup+0x2b/0x30 [ 29.267573][ T421] ? path_openat+0xfcf/0x2f10 [ 29.272369][ T421] ? do_sys_openat2+0x14c/0x7b0 [ 29.277250][ T421] ? __x64_sys_openat+0x136/0x160 [ 29.282432][ T421] ? x64_sys_call+0x219/0x9a0 [ 29.287160][ T421] dump_stack+0x15/0x20 [ 29.291478][ T421] should_fail+0x3c1/0x510 [ 29.295924][ T421] __should_failslab+0xa4/0xe0 [ 29.300813][ T421] should_failslab+0x9/0x20 [ 29.305360][ T421] slab_pre_alloc_hook+0x3b/0xe0 [ 29.310335][ T421] ? __d_alloc+0x2d/0x6a0 [ 29.314706][ T421] kmem_cache_alloc+0x44/0x260 [ 29.319689][ T421] __d_alloc+0x2d/0x6a0 [ 29.323870][ T421] d_alloc_parallel+0xd6/0x1320 [ 29.328751][ T421] ? selinux_inode_permission+0x426/0x5e0 [ 29.334597][ T421] ? selinux_inode_follow_link+0x360/0x360 [ 29.340555][ T421] ? unwind_get_return_address+0x4d/0x90 [ 29.346356][ T421] ? d_hash_and_lookup+0x1f0/0x1f0 [ 29.351502][ T421] ? __kasan_check_write+0x14/0x20 [ 29.356741][ T421] ? rwsem_read_trylock+0x29a/0x620 [ 29.362016][ T421] ? lockref_get_not_dead+0xe6/0x1c0 [ 29.367542][ T421] ? downgrade_write+0x410/0x410 [ 29.372693][ T421] __lookup_slow+0x13e/0x3e0 [ 29.377399][ T421] ? lookup_one_len+0x2c0/0x2c0 [ 29.382462][ T421] ? down_read+0xa5/0xf0 [ 29.386742][ T421] ? handle_dots+0xe10/0xe10 [ 29.391373][ T421] lookup_slow+0x57/0x70 [ 29.395645][ T421] walk_component+0x325/0x460 [ 29.400356][ T421] path_lookupat+0x180/0x490 [ 29.404976][ T421] filename_lookup+0x1e2/0x4f0 [ 29.409868][ T421] ? hashlen_string+0x120/0x120 [ 29.414756][ T421] user_path_at_empty+0x47/0x1c0 [ 29.419729][ T421] bpf_obj_get_user+0xb6/0x480 [ 29.424623][ T421] ? bpf_obj_pin_user+0x2c0/0x2c0 [ 29.429685][ T421] bpf_obj_get+0xd3/0x120 [ 29.434033][ T421] __sys_bpf+0x447/0x730 [ 29.438369][ T421] ? bpf_link_show_fdinfo+0x310/0x310 [ 29.443747][ T421] ? debug_smp_processor_id+0x17/0x20 [ 29.449128][ T421] __x64_sys_bpf+0x7c/0x90 [ 29.453544][ T421] x64_sys_call+0x4b9/0x9a0 [ 29.458076][ T421] do_syscall_64+0x4c/0xa0 [ 29.462497][ T421] ? clear_bhb_loop+0x50/0xa0 [ 29.467291][ T421] ? clear_bhb_loop+0x50/0xa0 [ 29.471988][ T421] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 29.477895][ T421] RIP: 0033:0x7f36891d5be9 [ 29.482323][ T421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 29.502017][ T421] RSP: 002b:00007f3687c1d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 29.510445][ T421] RAX: ffffffffffffffda RBX: 00007f368940d090 RCX: 00007f36891d5be9 [ 29.518439][ T421] RDX: 0000000000000018 RSI: 00002000000022c0 RDI: 0000000000000007 [ 29.526500][ T421] RBP: 00007f3687c1d090 R08: 0000000000000000 R09: 0000000000000000 [ 29.534485][ T421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 29.542564][ T421] R13: 00007f368940d128 R14: 00007f368940d090 R15: 00007ffed595c7c8 [ 29.550556][ T421] [ 29.733701][ T427] device syzkaller0 entered promiscuous mode [ 29.745000][ T429] tap0: tun_chr_ioctl cmd 1074025677 [ 29.750408][ T429] tap0: linktype set to 774 [ 30.057830][ T30] audit: type=1400 audit(1756977713.669:111): avc: denied { create } for pid=437 comm="syz.3.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 30.061016][ T444] FAULT_INJECTION: forcing a failure. [ 30.061016][ T444] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 30.127513][ T30] audit: type=1400 audit(1756977713.739:112): avc: denied { write } for pid=448 comm="syz.1.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 30.192881][ T30] audit: type=1400 audit(1756977713.799:113): avc: denied { create } for pid=448 comm="syz.1.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 30.249446][ T30] audit: type=1400 audit(1756977713.809:114): avc: denied { read } for pid=448 comm="syz.1.36" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 30.272453][ T444] CPU: 0 PID: 444 Comm: syz.4.34 Not tainted syzkaller #0 [ 30.279750][ T444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 30.290165][ T444] Call Trace: [ 30.293476][ T444] [ 30.296433][ T444] __dump_stack+0x21/0x30 [ 30.300911][ T444] dump_stack_lvl+0xee/0x150 [ 30.305619][ T444] ? show_regs_print_info+0x20/0x20 [ 30.310850][ T444] dump_stack+0x15/0x20 [ 30.315035][ T444] should_fail+0x3c1/0x510 [ 30.319489][ T444] should_fail_usercopy+0x1a/0x20 [ 30.324540][ T444] _copy_from_user+0x20/0xd0 [ 30.329164][ T444] generic_map_update_batch+0x44f/0x740 [ 30.334749][ T444] ? generic_map_delete_batch+0x510/0x510 [ 30.340690][ T444] ? __fdget+0x1a1/0x230 [ 30.344966][ T444] ? generic_map_delete_batch+0x510/0x510 [ 30.350809][ T444] bpf_map_do_batch+0x463/0x5f0 [ 30.355730][ T444] __sys_bpf+0x5e3/0x730 [ 30.360005][ T444] ? bpf_link_show_fdinfo+0x310/0x310 [ 30.365454][ T444] ? debug_smp_processor_id+0x17/0x20 [ 30.370856][ T444] __x64_sys_bpf+0x7c/0x90 [ 30.375315][ T444] x64_sys_call+0x4b9/0x9a0 [ 30.379846][ T444] do_syscall_64+0x4c/0xa0 [ 30.384303][ T444] ? clear_bhb_loop+0x50/0xa0 [ 30.389017][ T444] ? clear_bhb_loop+0x50/0xa0 [ 30.393806][ T444] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 30.399832][ T444] RIP: 0033:0x7f25e7332be9 [ 30.404276][ T444] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 30.424090][ T444] RSP: 002b:00007f25e5d9b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 30.432628][ T444] RAX: ffffffffffffffda RBX: 00007f25e7569fa0 RCX: 00007f25e7332be9 [ 30.441009][ T444] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 30.449168][ T444] RBP: 00007f25e5d9b090 R08: 0000000000000000 R09: 0000000000000000 [ 30.457446][ T444] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 30.465447][ T444] R13: 00007f25e756a038 R14: 00007f25e7569fa0 R15: 00007ffcf6c4f218 [ 30.473540][ T444] [ 30.544968][ T455] syz.0.37[455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.545044][ T455] syz.0.37[455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.571659][ T30] audit: type=1400 audit(1756977713.809:115): avc: denied { open } for pid=448 comm="syz.1.36" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 30.835406][ T468] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 30.944382][ T30] audit: type=1400 audit(1756977714.559:116): avc: denied { relabelfrom } for pid=470 comm="syz.0.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 30.978530][ T30] audit: type=1400 audit(1756977714.559:117): avc: denied { relabelto } for pid=470 comm="syz.0.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 31.185924][ T478] device veth0_vlan left promiscuous mode [ 31.220655][ T478] device veth0_vlan entered promiscuous mode [ 31.737987][ T489] device syzkaller0 entered promiscuous mode [ 31.960646][ T501] FAULT_INJECTION: forcing a failure. [ 31.960646][ T501] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 31.974120][ T501] CPU: 0 PID: 501 Comm: syz.2.54 Not tainted syzkaller #0 [ 31.981439][ T501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 31.991700][ T501] Call Trace: [ 31.995032][ T501] [ 31.997982][ T501] __dump_stack+0x21/0x30 [ 32.002444][ T501] dump_stack_lvl+0xee/0x150 [ 32.007056][ T501] ? show_regs_print_info+0x20/0x20 [ 32.012552][ T501] ? __activate_page+0xd40/0xd40 [ 32.017622][ T501] dump_stack+0x15/0x20 [ 32.021825][ T501] should_fail+0x3c1/0x510 [ 32.026266][ T501] should_fail_usercopy+0x1a/0x20 [ 32.031340][ T501] copy_page_from_iter_atomic+0x3fb/0x1350 [ 32.037278][ T501] ? pipe_zero+0x370/0x370 [ 32.041732][ T501] generic_perform_write+0x307/0x670 [ 32.047161][ T501] ? grab_cache_page_write_begin+0xb0/0xb0 [ 32.052988][ T501] ? file_remove_privs+0x590/0x590 [ 32.058126][ T501] ? rwsem_write_trylock+0x130/0x300 [ 32.063440][ T501] ? clear_nonspinnable+0x60/0x60 [ 32.068483][ T501] ? avc_policy_seqno+0x1b/0x70 [ 32.073440][ T501] __generic_file_write_iter+0x268/0x480 [ 32.079093][ T501] generic_file_write_iter+0xa9/0x1d0 [ 32.084771][ T501] vfs_write+0x802/0xf70 [ 32.089041][ T501] ? file_end_write+0x1b0/0x1b0 [ 32.093914][ T501] ? wait_for_completion_killable_timeout+0x10/0x10 [ 32.100633][ T501] ? __fget_files+0x2c4/0x320 [ 32.105346][ T501] ? __fdget_pos+0x2d2/0x380 [ 32.110149][ T501] ? ksys_write+0x71/0x240 [ 32.114589][ T501] ksys_write+0x140/0x240 [ 32.118944][ T501] ? __ia32_sys_read+0x90/0x90 [ 32.123729][ T501] ? debug_smp_processor_id+0x17/0x20 [ 32.129126][ T501] __x64_sys_write+0x7b/0x90 [ 32.133907][ T501] x64_sys_call+0x8ef/0x9a0 [ 32.138446][ T501] do_syscall_64+0x4c/0xa0 [ 32.142894][ T501] ? clear_bhb_loop+0x50/0xa0 [ 32.147596][ T501] ? clear_bhb_loop+0x50/0xa0 [ 32.152344][ T501] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 32.158294][ T501] RIP: 0033:0x7f11fbb79be9 [ 32.162741][ T501] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 32.182658][ T501] RSP: 002b:00007f11fa5e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 32.191161][ T501] RAX: ffffffffffffffda RBX: 00007f11fbdb0fa0 RCX: 00007f11fbb79be9 [ 32.199343][ T501] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 32.207347][ T501] RBP: 00007f11fa5e2090 R08: 0000000000000000 R09: 0000000000000000 [ 32.215350][ T501] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 32.223352][ T501] R13: 00007f11fbdb1038 R14: 00007f11fbdb0fa0 R15: 00007fff7e6de5c8 [ 32.231542][ T501] [ 33.009170][ T540] GPL: port 1(erspan0) entered blocking state [ 33.015644][ T540] GPL: port 1(erspan0) entered disabled state [ 33.022449][ T540] device erspan0 entered promiscuous mode [ 33.033524][ T535] GPL: port 1(erspan0) entered blocking state [ 33.039974][ T535] GPL: port 1(erspan0) entered forwarding state [ 33.322651][ T558] device veth1_macvtap left promiscuous mode [ 33.354360][ T30] audit: type=1400 audit(1756977716.969:118): avc: denied { create } for pid=553 comm="syz.1.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 33.361065][ T558] device macsec0 entered promiscuous mode [ 33.805731][ T568] syz.0.76[568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.805833][ T568] syz.0.76[568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.900679][ T570] syz.2.77[570] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.933024][ T570] syz.2.77[570] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.015096][ T30] audit: type=1400 audit(1756977717.629:119): avc: denied { ioctl } for pid=574 comm="syz.0.79" path="/dev/ppp" dev="devtmpfs" ino=154 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 34.257018][ T582] GPL: port 1(erspan0) entered blocking state [ 34.263755][ T582] GPL: port 1(erspan0) entered disabled state [ 34.301518][ T582] device erspan0 entered promiscuous mode [ 34.365447][ T585] GPL: port 1(erspan0) entered blocking state [ 34.371674][ T585] GPL: port 1(erspan0) entered forwarding state [ 34.685045][ T604] syz.3.89[604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.685141][ T604] syz.3.89[604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.913363][ T600] device syzkaller0 entered promiscuous mode [ 35.081356][ T612] syz.2.92[612] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.081436][ T612] syz.2.92[612] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.536344][ T634] syz.0.100[634] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.556089][ T634] syz.0.100[634] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.185045][ T691] device syzkaller0 entered promiscuous mode [ 37.826850][ T710] device syzkaller0 entered promiscuous mode [ 37.869062][ T714] device wg2 entered promiscuous mode [ 38.254728][ T720] GPL: port 1(erspan0) entered blocking state [ 38.261095][ T720] GPL: port 1(erspan0) entered disabled state [ 38.290511][ T720] device erspan0 entered promiscuous mode [ 38.330814][ T720] GPL: port 1(erspan0) entered blocking state [ 38.337292][ T720] GPL: port 1(erspan0) entered forwarding state [ 38.523152][ T730] GPL: port 1(erspan0) entered disabled state [ 38.817019][ T734] device syzkaller0 entered promiscuous mode [ 38.969947][ T30] audit: type=1400 audit(1756977722.579:120): avc: denied { create } for pid=742 comm="syz.4.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 39.670553][ T774] bpf_get_probe_write_proto: 10 callbacks suppressed [ 39.670572][ T774] syz.3.151[774] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.687884][ T774] syz.3.151[774] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.232706][ T781] device syzkaller0 entered promiscuous mode [ 40.357808][ T791] syz.3.158[791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.357888][ T791] syz.3.158[791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.679984][ T803] syz.4.162[803] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.739795][ T806] FAULT_INJECTION: forcing a failure. [ 40.739795][ T806] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 40.754374][ T803] syz.4.162[803] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.764999][ T806] CPU: 0 PID: 806 Comm: syz.3.163 Not tainted syzkaller #0 [ 40.783474][ T806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 40.793560][ T806] Call Trace: [ 40.796861][ T806] [ 40.799906][ T806] __dump_stack+0x21/0x30 [ 40.804276][ T806] dump_stack_lvl+0xee/0x150 [ 40.808903][ T806] ? show_regs_print_info+0x20/0x20 [ 40.814394][ T806] ? 0xffffffffa0018a94 [ 40.818595][ T806] dump_stack+0x15/0x20 [ 40.822865][ T806] should_fail+0x3c1/0x510 [ 40.827405][ T806] should_fail_alloc_page+0x55/0x80 [ 40.832634][ T806] prepare_alloc_pages+0x156/0x600 [ 40.837775][ T806] ? __alloc_pages_bulk+0xab0/0xab0 [ 40.843001][ T806] ? _find_next_bit+0x1fa/0x200 [ 40.847886][ T806] __alloc_pages+0x10a/0x440 [ 40.852519][ T806] ? prep_new_page+0x110/0x110 [ 40.857309][ T806] pcpu_populate_chunk+0x184/0xcb0 [ 40.862520][ T806] ? _find_next_bit+0x106/0x200 [ 40.867500][ T806] pcpu_alloc+0xc4d/0x1660 [ 40.872037][ T806] __alloc_percpu_gfp+0x25/0x30 [ 40.876916][ T806] bpf_map_alloc_percpu+0xc5/0x150 [ 40.882144][ T806] array_map_alloc+0x39a/0x6d0 [ 40.887038][ T806] map_create+0x455/0x21b0 [ 40.891483][ T806] __sys_bpf+0x2cf/0x730 [ 40.895755][ T806] ? bpf_link_show_fdinfo+0x310/0x310 [ 40.901326][ T806] ? debug_smp_processor_id+0x17/0x20 [ 40.906914][ T806] __x64_sys_bpf+0x7c/0x90 [ 40.911354][ T806] x64_sys_call+0x4b9/0x9a0 [ 40.915888][ T806] do_syscall_64+0x4c/0xa0 [ 40.920422][ T806] ? clear_bhb_loop+0x50/0xa0 [ 40.925146][ T806] ? clear_bhb_loop+0x50/0xa0 [ 40.929943][ T806] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 40.935963][ T806] RIP: 0033:0x7f43be641be9 [ 40.940420][ T806] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 40.960252][ T806] RSP: 002b:00007f43bd0aa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 40.968786][ T806] RAX: ffffffffffffffda RBX: 00007f43be878fa0 RCX: 00007f43be641be9 [ 40.976963][ T806] RDX: 0000000000000048 RSI: 0000200000000b00 RDI: 2000000000000000 [ 40.984978][ T806] RBP: 00007f43bd0aa090 R08: 0000000000000000 R09: 0000000000000000 [ 40.992979][ T806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 41.000982][ T806] R13: 00007f43be879038 R14: 00007f43be878fa0 R15: 00007ffc7a21ff08 [ 41.008989][ T806] [ 41.354031][ T818] FAULT_INJECTION: forcing a failure. [ 41.354031][ T818] name failslab, interval 1, probability 0, space 0, times 0 [ 41.392498][ T818] CPU: 0 PID: 818 Comm: syz.0.168 Not tainted syzkaller #0 [ 41.399755][ T818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 41.409845][ T818] Call Trace: [ 41.413229][ T818] [ 41.416307][ T818] __dump_stack+0x21/0x30 [ 41.420680][ T818] dump_stack_lvl+0xee/0x150 [ 41.425300][ T818] ? show_regs_print_info+0x20/0x20 [ 41.430634][ T818] dump_stack+0x15/0x20 [ 41.434991][ T818] should_fail+0x3c1/0x510 [ 41.439424][ T818] ? skb_ensure_writable+0x2e7/0x460 [ 41.444736][ T818] __should_failslab+0xa4/0xe0 [ 41.449522][ T818] should_failslab+0x9/0x20 [ 41.454039][ T818] slab_pre_alloc_hook+0x3b/0xe0 [ 41.458985][ T818] ? skb_ensure_writable+0x2e7/0x460 [ 41.464273][ T818] ? skb_ensure_writable+0x2e7/0x460 [ 41.469565][ T818] __kmalloc_track_caller+0x6c/0x2c0 [ 41.474862][ T818] ? skb_ensure_writable+0x2e7/0x460 [ 41.480153][ T818] ? skb_ensure_writable+0x2e7/0x460 [ 41.485528][ T818] pskb_expand_head+0x11b/0x11d0 [ 41.490484][ T818] ? __copy_skb_header+0x437/0x600 [ 41.495598][ T818] ? __kasan_check_write+0x14/0x20 [ 41.500891][ T818] ? __skb_clone+0x47a/0x790 [ 41.505486][ T818] skb_ensure_writable+0x2e7/0x460 [ 41.510600][ T818] bpf_clone_redirect+0x10b/0x380 [ 41.515630][ T818] bpf_prog_6893982b85ceadf7+0x56/0xfdc [ 41.521269][ T818] ? __kasan_slab_alloc+0xcf/0xf0 [ 41.526409][ T818] ? __kasan_slab_alloc+0xbd/0xf0 [ 41.531462][ T818] ? slab_post_alloc_hook+0x4f/0x2b0 [ 41.536759][ T818] ? kmem_cache_alloc+0xf7/0x260 [ 41.541706][ T818] ? __build_skb+0x2d/0x310 [ 41.546306][ T818] ? build_skb+0x24/0x200 [ 41.550642][ T818] ? bpf_prog_test_run_skb+0x279/0x1150 [ 41.556192][ T818] ? bpf_prog_test_run+0x3d5/0x620 [ 41.561308][ T818] ? __sys_bpf+0x52c/0x730 [ 41.565729][ T818] ? __x64_sys_bpf+0x7c/0x90 [ 41.570332][ T818] ? x64_sys_call+0x4b9/0x9a0 [ 41.575102][ T818] ? do_syscall_64+0x4c/0xa0 [ 41.579697][ T818] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 41.585785][ T818] ? __kasan_check_read+0x11/0x20 [ 41.590914][ T818] ? bpf_test_timer_continue+0x146/0x4a0 [ 41.596552][ T818] bpf_test_run+0x33d/0x8d0 [ 41.601059][ T818] ? convert___skb_to_skb+0x4f0/0x4f0 [ 41.606432][ T818] ? eth_get_headlen+0x1f0/0x1f0 [ 41.611374][ T818] ? convert___skb_to_skb+0x41/0x4f0 [ 41.616660][ T818] bpf_prog_test_run_skb+0x9ec/0x1150 [ 41.622047][ T818] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 41.628028][ T818] bpf_prog_test_run+0x3d5/0x620 [ 41.632970][ T818] ? bpf_prog_query+0x230/0x230 [ 41.637823][ T818] ? selinux_bpf+0xce/0xf0 [ 41.642252][ T818] ? security_bpf+0x82/0xa0 [ 41.646760][ T818] __sys_bpf+0x52c/0x730 [ 41.651017][ T818] ? bpf_link_show_fdinfo+0x310/0x310 [ 41.656418][ T818] ? debug_smp_processor_id+0x17/0x20 [ 41.661893][ T818] __x64_sys_bpf+0x7c/0x90 [ 41.666405][ T818] x64_sys_call+0x4b9/0x9a0 [ 41.670998][ T818] do_syscall_64+0x4c/0xa0 [ 41.675422][ T818] ? clear_bhb_loop+0x50/0xa0 [ 41.680192][ T818] ? clear_bhb_loop+0x50/0xa0 [ 41.684964][ T818] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 41.690951][ T818] RIP: 0033:0x7f5e2d792be9 [ 41.695490][ T818] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 41.715386][ T818] RSP: 002b:00007f5e2c1fb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 41.723925][ T818] RAX: ffffffffffffffda RBX: 00007f5e2d9c9fa0 RCX: 00007f5e2d792be9 [ 41.731989][ T818] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 41.740049][ T818] RBP: 00007f5e2c1fb090 R08: 0000000000000000 R09: 0000000000000000 [ 41.748026][ T818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 41.756099][ T818] R13: 00007f5e2d9ca038 R14: 00007f5e2d9c9fa0 R15: 00007fff52aad1d8 [ 41.764099][ T818] [ 42.036812][ T30] audit: type=1400 audit(1756977725.639:121): avc: denied { create } for pid=834 comm="syz.0.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 42.370919][ T842] syz.0.176[842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.371001][ T842] syz.0.176[842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.439415][ T845] syz.4.177[845] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.486522][ T845] syz.4.177[845] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.755174][ T30] audit: type=1400 audit(1756977726.369:122): avc: denied { create } for pid=855 comm="syz.0.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 42.966054][ T863] GPL: port 1(erspan0) entered blocking state [ 42.972393][ T863] GPL: port 1(erspan0) entered forwarding state [ 43.822967][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 44.319150][ T900] device syzkaller0 entered promiscuous mode [ 44.472191][ T923] GPL: port 1(erspan0) entered blocking state [ 44.502748][ T923] GPL: port 1(erspan0) entered disabled state [ 44.565056][ T923] device erspan0 entered promiscuous mode [ 44.758425][ T925] GPL: port 1(erspan0) entered blocking state [ 44.764604][ T925] GPL: port 1(erspan0) entered forwarding state [ 45.093707][ T943] device wg2 entered promiscuous mode [ 45.287082][ T942] device syzkaller0 entered promiscuous mode [ 46.042486][ T967] GPL: port 1(erspan0) entered blocking state [ 46.049707][ T967] GPL: port 1(erspan0) entered disabled state [ 46.089112][ T967] device erspan0 entered promiscuous mode [ 46.131223][ T971] GPL: port 1(erspan0) entered blocking state [ 46.137391][ T971] GPL: port 1(erspan0) entered forwarding state [ 46.378290][ T30] audit: type=1400 audit(1756977729.989:123): avc: denied { create } for pid=968 comm="syz.3.222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 46.570253][ T979] FAULT_INJECTION: forcing a failure. [ 46.570253][ T979] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 46.632267][ T979] CPU: 0 PID: 979 Comm: syz.2.225 Not tainted syzkaller #0 [ 46.639535][ T979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 46.649623][ T979] Call Trace: [ 46.652925][ T979] [ 46.655880][ T979] __dump_stack+0x21/0x30 [ 46.660240][ T979] dump_stack_lvl+0xee/0x150 [ 46.664893][ T979] ? show_regs_print_info+0x20/0x20 [ 46.670127][ T979] dump_stack+0x15/0x20 [ 46.674311][ T979] should_fail+0x3c1/0x510 [ 46.678755][ T979] should_fail_usercopy+0x1a/0x20 [ 46.683800][ T979] _copy_to_user+0x20/0x90 [ 46.688253][ T979] generic_map_lookup_batch+0x707/0xa70 [ 46.693830][ T979] ? security_file_permission+0x79/0xa0 [ 46.699507][ T979] ? bpf_map_update_value+0x3e0/0x3e0 [ 46.704914][ T979] ? __fdget+0x1a1/0x230 [ 46.709217][ T979] ? bpf_map_update_value+0x3e0/0x3e0 [ 46.714624][ T979] bpf_map_do_batch+0x2d4/0x5f0 [ 46.719624][ T979] ? security_bpf+0x82/0xa0 [ 46.724148][ T979] __sys_bpf+0x5e3/0x730 [ 46.728426][ T979] ? bpf_link_show_fdinfo+0x310/0x310 [ 46.733825][ T979] ? debug_smp_processor_id+0x17/0x20 [ 46.739232][ T979] __x64_sys_bpf+0x7c/0x90 [ 46.743675][ T979] x64_sys_call+0x4b9/0x9a0 [ 46.748216][ T979] do_syscall_64+0x4c/0xa0 [ 46.752785][ T979] ? clear_bhb_loop+0x50/0xa0 [ 46.757595][ T979] ? clear_bhb_loop+0x50/0xa0 [ 46.762305][ T979] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 46.768237][ T979] RIP: 0033:0x7f11fbb79be9 [ 46.772678][ T979] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 46.792346][ T979] RSP: 002b:00007f11fa5e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 46.800800][ T979] RAX: ffffffffffffffda RBX: 00007f11fbdb0fa0 RCX: 00007f11fbb79be9 [ 46.808802][ T979] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 46.816805][ T979] RBP: 00007f11fa5e2090 R08: 0000000000000000 R09: 0000000000000000 [ 46.824812][ T979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 46.832807][ T979] R13: 00007f11fbdb1038 R14: 00007f11fbdb0fa0 R15: 00007fff7e6de5c8 [ 46.840818][ T979] [ 48.285181][ T1018] device syzkaller0 entered promiscuous mode [ 49.230982][ T1033] device syzkaller0 entered promiscuous mode [ 49.268490][ T1028] device sit0 entered promiscuous mode [ 49.341825][ T1040] device wg2 left promiscuous mode [ 49.352309][ T1042] device wg2 entered promiscuous mode [ 49.370166][ T30] audit: type=1400 audit(1756977732.979:124): avc: denied { write } for pid=1039 comm="syz.4.247" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 49.701276][ T1068] FAULT_INJECTION: forcing a failure. [ 49.701276][ T1068] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 49.762889][ T1068] CPU: 0 PID: 1068 Comm: syz.2.255 Not tainted syzkaller #0 [ 49.770235][ T1068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 49.780315][ T1068] Call Trace: [ 49.783620][ T1068] [ 49.786575][ T1068] __dump_stack+0x21/0x30 [ 49.791025][ T1068] dump_stack_lvl+0xee/0x150 [ 49.795647][ T1068] ? show_regs_print_info+0x20/0x20 [ 49.800878][ T1068] ? get_page_from_freelist+0x2cc5/0x2d50 [ 49.806728][ T1068] dump_stack+0x15/0x20 [ 49.810916][ T1068] should_fail+0x3c1/0x510 [ 49.815357][ T1068] should_fail_alloc_page+0x55/0x80 [ 49.820583][ T1068] prepare_alloc_pages+0x156/0x600 [ 49.825898][ T1068] ? __alloc_pages_bulk+0xab0/0xab0 [ 49.831169][ T1068] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 49.836866][ T1068] __alloc_pages+0x10a/0x440 [ 49.841482][ T1068] ? prep_new_page+0x110/0x110 [ 49.846269][ T1068] pcpu_populate_chunk+0x184/0xcb0 [ 49.851423][ T1068] ? _find_next_bit+0x1b5/0x200 [ 49.856344][ T1068] pcpu_alloc+0xc4d/0x1660 [ 49.860795][ T1068] __alloc_percpu_gfp+0x25/0x30 [ 49.865699][ T1068] bpf_map_alloc_percpu+0xc5/0x150 [ 49.870827][ T1068] htab_map_alloc+0xc1b/0x14f0 [ 49.875600][ T1068] map_create+0x455/0x21b0 [ 49.880129][ T1068] __sys_bpf+0x2cf/0x730 [ 49.884436][ T1068] ? bpf_link_show_fdinfo+0x310/0x310 [ 49.889836][ T1068] ? debug_smp_processor_id+0x17/0x20 [ 49.895319][ T1068] __x64_sys_bpf+0x7c/0x90 [ 49.899744][ T1068] x64_sys_call+0x4b9/0x9a0 [ 49.904258][ T1068] do_syscall_64+0x4c/0xa0 [ 49.908677][ T1068] ? clear_bhb_loop+0x50/0xa0 [ 49.913756][ T1068] ? clear_bhb_loop+0x50/0xa0 [ 49.918525][ T1068] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 49.924519][ T1068] RIP: 0033:0x7f11fbb79be9 [ 49.928948][ T1068] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 49.948584][ T1068] RSP: 002b:00007f11fa5e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 49.957018][ T1068] RAX: ffffffffffffffda RBX: 00007f11fbdb0fa0 RCX: 00007f11fbb79be9 [ 49.965020][ T1068] RDX: 0000000000000050 RSI: 0000200000000380 RDI: 0000000000000000 [ 49.972998][ T1068] RBP: 00007f11fa5e2090 R08: 0000000000000000 R09: 0000000000000000 [ 49.981092][ T1068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 49.989069][ T1068] R13: 00007f11fbdb1038 R14: 00007f11fbdb0fa0 R15: 00007fff7e6de5c8 [ 49.997053][ T1068] [ 50.065176][ T1079] bpf_get_probe_write_proto: 6 callbacks suppressed [ 50.065195][ T1079] syz.1.259[1079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.071993][ T1079] syz.1.259[1079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.383908][ T1093] syz.4.264[1093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.458280][ T1093] syz.4.264[1093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.986354][ T1115] FAULT_INJECTION: forcing a failure. [ 50.986354][ T1115] name failslab, interval 1, probability 0, space 0, times 0 [ 51.014447][ T1115] CPU: 0 PID: 1115 Comm: syz.2.271 Not tainted syzkaller #0 [ 51.021884][ T1115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 51.032057][ T1115] Call Trace: [ 51.035357][ T1115] [ 51.038324][ T1115] __dump_stack+0x21/0x30 [ 51.042721][ T1115] dump_stack_lvl+0xee/0x150 [ 51.047352][ T1115] ? show_regs_print_info+0x20/0x20 [ 51.052587][ T1115] dump_stack+0x15/0x20 [ 51.056800][ T1115] should_fail+0x3c1/0x510 [ 51.061287][ T1115] ? skb_ensure_writable+0x2e7/0x460 [ 51.066822][ T1115] __should_failslab+0xa4/0xe0 [ 51.071634][ T1115] should_failslab+0x9/0x20 [ 51.076166][ T1115] slab_pre_alloc_hook+0x3b/0xe0 [ 51.081155][ T1115] ? skb_ensure_writable+0x2e7/0x460 [ 51.086555][ T1115] ? skb_ensure_writable+0x2e7/0x460 [ 51.091870][ T1115] __kmalloc_track_caller+0x6c/0x2c0 [ 51.097161][ T1115] ? skb_ensure_writable+0x2e7/0x460 [ 51.102451][ T1115] ? skb_ensure_writable+0x2e7/0x460 [ 51.107840][ T1115] pskb_expand_head+0x11b/0x11d0 [ 51.112887][ T1115] ? __copy_skb_header+0x437/0x600 [ 51.118109][ T1115] ? __kasan_check_write+0x14/0x20 [ 51.123233][ T1115] ? __skb_clone+0x47a/0x790 [ 51.127833][ T1115] skb_ensure_writable+0x2e7/0x460 [ 51.132949][ T1115] bpf_clone_redirect+0x10b/0x380 [ 51.138112][ T1115] bpf_prog_5af0f20e2961581c+0x56/0xba4 [ 51.143777][ T1115] ? __kasan_slab_alloc+0xcf/0xf0 [ 51.148806][ T1115] ? __kasan_slab_alloc+0xbd/0xf0 [ 51.153847][ T1115] ? slab_post_alloc_hook+0x4f/0x2b0 [ 51.159164][ T1115] ? kmem_cache_alloc+0xf7/0x260 [ 51.164106][ T1115] ? __build_skb+0x2d/0x310 [ 51.168767][ T1115] ? build_skb+0x24/0x200 [ 51.173214][ T1115] ? bpf_prog_test_run_skb+0x279/0x1150 [ 51.178766][ T1115] ? bpf_prog_test_run+0x3d5/0x620 [ 51.183914][ T1115] ? __sys_bpf+0x52c/0x730 [ 51.188461][ T1115] ? __x64_sys_bpf+0x7c/0x90 [ 51.193162][ T1115] ? x64_sys_call+0x4b9/0x9a0 [ 51.197849][ T1115] ? do_syscall_64+0x4c/0xa0 [ 51.202451][ T1115] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 51.208538][ T1115] ? __kasan_check_read+0x11/0x20 [ 51.213568][ T1115] ? bpf_test_timer_continue+0x146/0x4a0 [ 51.219230][ T1115] bpf_test_run+0x33d/0x8d0 [ 51.223751][ T1115] ? convert___skb_to_skb+0x4f0/0x4f0 [ 51.229220][ T1115] ? eth_get_headlen+0x1f0/0x1f0 [ 51.234162][ T1115] ? convert___skb_to_skb+0x41/0x4f0 [ 51.239459][ T1115] bpf_prog_test_run_skb+0x9ec/0x1150 [ 51.244853][ T1115] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 51.250748][ T1115] bpf_prog_test_run+0x3d5/0x620 [ 51.255715][ T1115] ? bpf_prog_query+0x230/0x230 [ 51.260738][ T1115] ? selinux_bpf+0xce/0xf0 [ 51.265159][ T1115] ? security_bpf+0x82/0xa0 [ 51.269666][ T1115] __sys_bpf+0x52c/0x730 [ 51.273921][ T1115] ? bpf_link_show_fdinfo+0x310/0x310 [ 51.279392][ T1115] ? debug_smp_processor_id+0x17/0x20 [ 51.284778][ T1115] __x64_sys_bpf+0x7c/0x90 [ 51.289197][ T1115] x64_sys_call+0x4b9/0x9a0 [ 51.293787][ T1115] do_syscall_64+0x4c/0xa0 [ 51.298292][ T1115] ? clear_bhb_loop+0x50/0xa0 [ 51.303062][ T1115] ? clear_bhb_loop+0x50/0xa0 [ 51.307831][ T1115] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 51.313767][ T1115] RIP: 0033:0x7f11fbb79be9 [ 51.318186][ T1115] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 51.337879][ T1115] RSP: 002b:00007f11fa5e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 51.346383][ T1115] RAX: ffffffffffffffda RBX: 00007f11fbdb0fa0 RCX: 00007f11fbb79be9 [ 51.354358][ T1115] RDX: 0000000000000050 RSI: 0000200000000380 RDI: 000000000000000a [ 51.362334][ T1115] RBP: 00007f11fa5e2090 R08: 0000000000000000 R09: 0000000000000000 [ 51.370407][ T1115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 51.378402][ T1115] R13: 00007f11fbdb1038 R14: 00007f11fbdb0fa0 R15: 00007fff7e6de5c8 [ 51.386385][ T1115] [ 51.913288][ T1120] FAULT_INJECTION: forcing a failure. [ 51.913288][ T1120] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 51.952343][ T1120] CPU: 0 PID: 1120 Comm: syz.0.273 Not tainted syzkaller #0 [ 51.959789][ T1120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 51.969942][ T1120] Call Trace: [ 51.973247][ T1120] [ 51.976195][ T1120] __dump_stack+0x21/0x30 [ 51.980548][ T1120] dump_stack_lvl+0xee/0x150 [ 51.985178][ T1120] ? show_regs_print_info+0x20/0x20 [ 51.990416][ T1120] dump_stack+0x15/0x20 [ 51.994597][ T1120] should_fail+0x3c1/0x510 [ 51.999146][ T1120] should_fail_alloc_page+0x55/0x80 [ 52.004370][ T1120] prepare_alloc_pages+0x156/0x600 [ 52.009517][ T1120] ? __alloc_pages_bulk+0xab0/0xab0 [ 52.014749][ T1120] __alloc_pages+0x10a/0x440 [ 52.019367][ T1120] ? local_bh_enable+0x1f/0x30 [ 52.024155][ T1120] ? prep_new_page+0x110/0x110 [ 52.029007][ T1120] new_slab+0xa1/0x4d0 [ 52.033218][ T1120] ___slab_alloc+0x381/0x810 [ 52.037858][ T1120] ? skb_clone+0x1cf/0x360 [ 52.042318][ T1120] ? skb_clone+0x1cf/0x360 [ 52.047104][ T1120] __slab_alloc+0x49/0x90 [ 52.051583][ T1120] ? skb_clone+0x1cf/0x360 [ 52.056051][ T1120] kmem_cache_alloc+0x138/0x260 [ 52.060949][ T1120] skb_clone+0x1cf/0x360 [ 52.065234][ T1120] bpf_clone_redirect+0xa7/0x380 [ 52.070195][ T1120] bpf_prog_b36a1f39e2fdd4f4+0x56/0x77c [ 52.075757][ T1120] ? __kasan_slab_alloc+0xcf/0xf0 [ 52.080802][ T1120] ? __kasan_slab_alloc+0xbd/0xf0 [ 52.085845][ T1120] ? slab_post_alloc_hook+0x4f/0x2b0 [ 52.091339][ T1120] ? kmem_cache_alloc+0xf7/0x260 [ 52.096310][ T1120] ? __build_skb+0x2d/0x310 [ 52.100829][ T1120] ? build_skb+0x24/0x200 [ 52.105177][ T1120] ? bpf_prog_test_run_skb+0x279/0x1150 [ 52.110741][ T1120] ? bpf_prog_test_run+0x3d5/0x620 [ 52.115956][ T1120] ? __sys_bpf+0x52c/0x730 [ 52.120385][ T1120] ? __x64_sys_bpf+0x7c/0x90 [ 52.124990][ T1120] ? x64_sys_call+0x4b9/0x9a0 [ 52.129693][ T1120] ? do_syscall_64+0x4c/0xa0 [ 52.134294][ T1120] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 52.140390][ T1120] ? __kasan_check_read+0x11/0x20 [ 52.145439][ T1120] ? bpf_test_timer_continue+0x146/0x4a0 [ 52.151097][ T1120] bpf_test_run+0x33d/0x8d0 [ 52.155749][ T1120] ? convert___skb_to_skb+0x4f0/0x4f0 [ 52.161218][ T1120] ? eth_get_headlen+0x1f0/0x1f0 [ 52.166170][ T1120] ? convert___skb_to_skb+0x41/0x4f0 [ 52.171588][ T1120] bpf_prog_test_run_skb+0x9ec/0x1150 [ 52.177062][ T1120] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 52.183077][ T1120] bpf_prog_test_run+0x3d5/0x620 [ 52.188016][ T1120] ? bpf_prog_query+0x230/0x230 [ 52.192875][ T1120] ? selinux_bpf+0xce/0xf0 [ 52.197308][ T1120] ? security_bpf+0x82/0xa0 [ 52.201818][ T1120] __sys_bpf+0x52c/0x730 [ 52.206066][ T1120] ? bpf_link_show_fdinfo+0x310/0x310 [ 52.211441][ T1120] ? debug_smp_processor_id+0x17/0x20 [ 52.216819][ T1120] __x64_sys_bpf+0x7c/0x90 [ 52.221238][ T1120] x64_sys_call+0x4b9/0x9a0 [ 52.225832][ T1120] do_syscall_64+0x4c/0xa0 [ 52.230263][ T1120] ? clear_bhb_loop+0x50/0xa0 [ 52.235207][ T1120] ? clear_bhb_loop+0x50/0xa0 [ 52.239895][ T1120] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 52.245803][ T1120] RIP: 0033:0x7f5e2d792be9 [ 52.250223][ T1120] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 52.269839][ T1120] RSP: 002b:00007f5e2c1fb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 52.278304][ T1120] RAX: ffffffffffffffda RBX: 00007f5e2d9c9fa0 RCX: 00007f5e2d792be9 [ 52.286282][ T1120] RDX: 0000000000000048 RSI: 0000200000000040 RDI: 000000000000000a [ 52.294266][ T1120] RBP: 00007f5e2c1fb090 R08: 0000000000000000 R09: 0000000000000000 [ 52.302341][ T1120] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 52.310427][ T1120] R13: 00007f5e2d9ca038 R14: 00007f5e2d9c9fa0 R15: 00007fff52aad1d8 [ 52.318417][ T1120] [ 52.610482][ T1131] device syzkaller0 entered promiscuous mode [ 53.087724][ T1139] syz.0.279[1139] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.087803][ T1139] syz.0.279[1139] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.198177][ T1147] device syzkaller0 entered promiscuous mode [ 54.860503][ T30] audit: type=1400 audit(1756977738.469:125): avc: denied { create } for pid=1177 comm="syz.0.295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 55.013435][ T1187] device pim6reg1 entered promiscuous mode [ 55.204786][ T1196] syz.2.302[1196] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.204861][ T1196] syz.2.302[1196] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.975648][ T1236] syz.4.316[1236] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.037577][ T1236] syz.4.316[1236] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.351042][ T30] audit: type=1400 audit(1756977739.959:126): avc: denied { create } for pid=1255 comm="syz.0.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 56.685371][ T1273] FAULT_INJECTION: forcing a failure. [ 56.685371][ T1273] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 56.700275][ T1276] syz.4.333[1276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.700352][ T1276] syz.4.333[1276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.811829][ T1273] CPU: 0 PID: 1273 Comm: syz.0.332 Not tainted syzkaller #0 [ 56.830905][ T1273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 56.840985][ T1273] Call Trace: [ 56.844361][ T1273] [ 56.847301][ T1273] __dump_stack+0x21/0x30 [ 56.851675][ T1273] dump_stack_lvl+0xee/0x150 [ 56.856408][ T1273] ? show_regs_print_info+0x20/0x20 [ 56.861650][ T1273] ? dump_stack+0x9/0x20 [ 56.865900][ T1273] dump_stack+0x15/0x20 [ 56.870065][ T1273] should_fail+0x3c1/0x510 [ 56.874486][ T1273] should_fail_usercopy+0x1a/0x20 [ 56.879603][ T1273] _copy_from_user+0x20/0xd0 [ 56.884201][ T1273] generic_map_update_batch+0x4a3/0x740 [ 56.889760][ T1273] ? generic_map_delete_batch+0x510/0x510 [ 56.895923][ T1273] ? __fdget+0x1a1/0x230 [ 56.900183][ T1273] ? generic_map_delete_batch+0x510/0x510 [ 56.905909][ T1273] bpf_map_do_batch+0x463/0x5f0 [ 56.910765][ T1273] __sys_bpf+0x5e3/0x730 [ 56.915020][ T1273] ? bpf_link_show_fdinfo+0x310/0x310 [ 56.920410][ T1273] __x64_sys_bpf+0x7c/0x90 [ 56.925140][ T1273] x64_sys_call+0x4b9/0x9a0 [ 56.929800][ T1273] do_syscall_64+0x4c/0xa0 [ 56.934396][ T1273] ? clear_bhb_loop+0x50/0xa0 [ 56.939195][ T1273] ? clear_bhb_loop+0x50/0xa0 [ 56.944017][ T1273] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 56.949944][ T1273] RIP: 0033:0x7f5e2d792be9 [ 56.954466][ T1273] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 56.974730][ T1273] RSP: 002b:00007f5e2c1fb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 56.983156][ T1273] RAX: ffffffffffffffda RBX: 00007f5e2d9c9fa0 RCX: 00007f5e2d792be9 [ 56.991474][ T1273] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 56.999551][ T1273] RBP: 00007f5e2c1fb090 R08: 0000000000000000 R09: 0000000000000000 [ 57.007536][ T1273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 57.015611][ T1273] R13: 00007f5e2d9ca038 R14: 00007f5e2d9c9fa0 R15: 00007fff52aad1d8 [ 57.023705][ T1273] [ 57.236227][ T1298] syz.4.341[1298] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.236333][ T1298] syz.4.341[1298] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.305206][ T1301] syz.4.341[1301] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.351170][ T1301] syz.4.341[1301] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.510426][ T30] audit: type=1400 audit(1756977742.119:127): avc: denied { create } for pid=1323 comm="syz.3.352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 58.977351][ T1356] device pim6reg1 entered promiscuous mode [ 59.756500][ T30] audit: type=1400 audit(1756977743.369:128): avc: denied { append } for pid=1383 comm="syz.1.370" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 60.927229][ T1419] bpf_get_probe_write_proto: 6 callbacks suppressed [ 60.927249][ T1419] syz.4.385[1419] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.972970][ T1419] syz.4.385[1419] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.012983][ T1470] syz.2.404[1470] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.040290][ T1470] syz.2.404[1470] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.356370][ T1479] syz.3.407[1479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.383040][ T1479] syz.3.407[1479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.034217][ T1491] device syzkaller0 entered promiscuous mode [ 63.324345][ T1490] device syzkaller0 entered promiscuous mode [ 63.947351][ T1513] syz.4.418[1513] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.947427][ T1513] syz.4.418[1513] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.277804][ T1539] device veth1_macvtap left promiscuous mode [ 64.466642][ T1534] device veth1_macvtap entered promiscuous mode [ 64.542948][ T1534] device macsec0 entered promiscuous mode [ 64.795151][ T1548] syz.1.432[1548] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.795226][ T1548] syz.1.432[1548] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.711415][ T1583] device syzkaller0 entered promiscuous mode [ 66.103597][ T1600] FAULT_INJECTION: forcing a failure. [ 66.103597][ T1600] name failslab, interval 1, probability 0, space 0, times 0 [ 66.141086][ T1600] CPU: 1 PID: 1600 Comm: syz.4.450 Not tainted syzkaller #0 [ 66.148632][ T1600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 66.158960][ T1600] Call Trace: [ 66.162270][ T1600] [ 66.165439][ T1600] __dump_stack+0x21/0x30 [ 66.169812][ T1600] dump_stack_lvl+0xee/0x150 [ 66.174417][ T1600] ? show_regs_print_info+0x20/0x20 [ 66.179633][ T1600] dump_stack+0x15/0x20 [ 66.183808][ T1600] should_fail+0x3c1/0x510 [ 66.188252][ T1600] __should_failslab+0xa4/0xe0 [ 66.193161][ T1600] should_failslab+0x9/0x20 [ 66.197678][ T1600] slab_pre_alloc_hook+0x3b/0xe0 [ 66.202647][ T1600] ? __alloc_file+0x28/0x2a0 [ 66.207273][ T1600] kmem_cache_alloc+0x44/0x260 [ 66.212157][ T1600] __alloc_file+0x28/0x2a0 [ 66.216596][ T1600] alloc_empty_file+0x97/0x180 [ 66.221389][ T1600] alloc_file+0x59/0x540 [ 66.225815][ T1600] alloc_file_pseudo+0x17a/0x1f0 [ 66.230852][ T1600] ? alloc_empty_file_noaccount+0x80/0x80 [ 66.236870][ T1600] __anon_inode_getfd+0x248/0x3b0 [ 66.241975][ T1600] ? idr_alloc+0x2a0/0x2a0 [ 66.246411][ T1600] ? anon_inode_getfd+0x40/0x40 [ 66.251269][ T1600] ? _raw_spin_lock_bh+0x8e/0xe0 [ 66.256457][ T1600] anon_inode_getfd+0x31/0x40 [ 66.261402][ T1600] btf_new_fd+0x783/0x920 [ 66.266105][ T1600] bpf_btf_load+0x6f/0x90 [ 66.270568][ T1600] __sys_bpf+0x515/0x730 [ 66.274814][ T1600] ? bpf_link_show_fdinfo+0x310/0x310 [ 66.280359][ T1600] ? debug_smp_processor_id+0x17/0x20 [ 66.285960][ T1600] __x64_sys_bpf+0x7c/0x90 [ 66.290405][ T1600] x64_sys_call+0x4b9/0x9a0 [ 66.294998][ T1600] do_syscall_64+0x4c/0xa0 [ 66.299431][ T1600] ? clear_bhb_loop+0x50/0xa0 [ 66.304135][ T1600] ? clear_bhb_loop+0x50/0xa0 [ 66.308847][ T1600] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 66.314763][ T1600] RIP: 0033:0x7f25e7332be9 [ 66.319194][ T1600] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 66.339102][ T1600] RSP: 002b:00007f25e5d9b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 66.347548][ T1600] RAX: ffffffffffffffda RBX: 00007f25e7569fa0 RCX: 00007f25e7332be9 [ 66.355618][ T1600] RDX: 0000000000000028 RSI: 00002000000003c0 RDI: 0000000000000012 [ 66.363792][ T1600] RBP: 00007f25e5d9b090 R08: 0000000000000000 R09: 0000000000000000 [ 66.371771][ T1600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 66.379785][ T1600] R13: 00007f25e756a038 R14: 00007f25e7569fa0 R15: 00007ffcf6c4f218 [ 66.388001][ T1600] [ 66.861770][ T1620] device syzkaller0 entered promiscuous mode [ 67.872429][ T1662] device syzkaller0 entered promiscuous mode [ 70.421981][ T1707] syz.0.490[1707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.422060][ T1707] syz.0.490[1707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.626168][ T1768] device syzkaller0 entered promiscuous mode [ 74.435125][ T1797] device syzkaller0 entered promiscuous mode [ 74.483288][ T1805] device pim6reg1 entered promiscuous mode [ 76.077055][ T1843] FAULT_INJECTION: forcing a failure. [ 76.077055][ T1843] name failslab, interval 1, probability 0, space 0, times 0 [ 76.113963][ T1843] CPU: 1 PID: 1843 Comm: syz.2.539 Not tainted syzkaller #0 [ 76.121308][ T1843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 76.131477][ T1843] Call Trace: [ 76.134777][ T1843] [ 76.137729][ T1843] __dump_stack+0x21/0x30 [ 76.142093][ T1843] dump_stack_lvl+0xee/0x150 [ 76.146710][ T1843] ? show_regs_print_info+0x20/0x20 [ 76.152033][ T1843] dump_stack+0x15/0x20 [ 76.156224][ T1843] should_fail+0x3c1/0x510 [ 76.160775][ T1843] __should_failslab+0xa4/0xe0 [ 76.165580][ T1843] should_failslab+0x9/0x20 [ 76.170212][ T1843] slab_pre_alloc_hook+0x3b/0xe0 [ 76.175191][ T1843] kmem_cache_alloc_trace+0x48/0x270 [ 76.180650][ T1843] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 76.186488][ T1843] selinux_sk_alloc_security+0x7e/0x1a0 [ 76.192062][ T1843] security_sk_alloc+0x72/0xa0 [ 76.196897][ T1843] sk_prot_alloc+0x108/0x320 [ 76.201522][ T1843] sk_alloc+0x38/0x430 [ 76.205711][ T1843] tipc_sk_create+0xe6/0x1df0 [ 76.210593][ T1843] ? __kasan_check_write+0x14/0x20 [ 76.215831][ T1843] ? _raw_spin_lock+0x8e/0xe0 [ 76.220540][ T1843] ? _raw_spin_trylock_bh+0x130/0x130 [ 76.225943][ T1843] ? security_inode_alloc+0xc0/0x110 [ 76.231363][ T1843] ? inode_init_always+0x729/0x990 [ 76.236498][ T1843] __sock_create+0x38d/0x7a0 [ 76.241144][ T1843] __sys_socketpair+0x218/0x590 [ 76.246030][ T1843] __x64_sys_socketpair+0x9b/0xb0 [ 76.251144][ T1843] x64_sys_call+0x36/0x9a0 [ 76.255687][ T1843] do_syscall_64+0x4c/0xa0 [ 76.260213][ T1843] ? clear_bhb_loop+0x50/0xa0 [ 76.264925][ T1843] ? clear_bhb_loop+0x50/0xa0 [ 76.269635][ T1843] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 76.275819][ T1843] RIP: 0033:0x7f11fbb79be9 [ 76.280266][ T1843] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 76.300157][ T1843] RSP: 002b:00007f11fa5e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 76.308614][ T1843] RAX: ffffffffffffffda RBX: 00007f11fbdb0fa0 RCX: 00007f11fbb79be9 [ 76.316591][ T1843] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 76.324581][ T1843] RBP: 00007f11fa5e2090 R08: 0000000000000000 R09: 0000000000000000 [ 76.332661][ T1843] R10: 0000200000000940 R11: 0000000000000246 R12: 0000000000000001 [ 76.340660][ T1843] R13: 00007f11fbdb1038 R14: 00007f11fbdb0fa0 R15: 00007fff7e6de5c8 [ 76.348765][ T1843] [ 76.416303][ T1849] device syzkaller0 entered promiscuous mode [ 78.313700][ T1888] FAULT_INJECTION: forcing a failure. [ 78.313700][ T1888] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 78.358966][ T1888] CPU: 0 PID: 1888 Comm: syz.0.556 Not tainted syzkaller #0 [ 78.366331][ T1888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 78.376503][ T1888] Call Trace: [ 78.379898][ T1888] [ 78.382856][ T1888] __dump_stack+0x21/0x30 [ 78.387211][ T1888] dump_stack_lvl+0xee/0x150 [ 78.391827][ T1888] ? show_regs_print_info+0x20/0x20 [ 78.397056][ T1888] ? get_page_from_freelist+0x2cc5/0x2d50 [ 78.402807][ T1888] dump_stack+0x15/0x20 [ 78.407081][ T1888] should_fail+0x3c1/0x510 [ 78.411518][ T1888] should_fail_alloc_page+0x55/0x80 [ 78.416750][ T1888] prepare_alloc_pages+0x156/0x600 [ 78.421909][ T1888] ? __alloc_pages_bulk+0xab0/0xab0 [ 78.427140][ T1888] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 78.432799][ T1888] __alloc_pages+0x10a/0x440 [ 78.437424][ T1888] ? prep_new_page+0x110/0x110 [ 78.442382][ T1888] pcpu_populate_chunk+0x184/0xcb0 [ 78.447638][ T1888] ? _find_next_bit+0x1b5/0x200 [ 78.452514][ T1888] pcpu_alloc+0xc4d/0x1660 [ 78.456961][ T1888] __alloc_percpu_gfp+0x25/0x30 [ 78.461840][ T1888] bpf_map_alloc_percpu+0xc5/0x150 [ 78.467011][ T1888] htab_map_alloc+0xc1b/0x14f0 [ 78.471843][ T1888] map_create+0x455/0x21b0 [ 78.476271][ T1888] __sys_bpf+0x2cf/0x730 [ 78.480524][ T1888] ? bpf_link_show_fdinfo+0x310/0x310 [ 78.486110][ T1888] ? debug_smp_processor_id+0x17/0x20 [ 78.491534][ T1888] __x64_sys_bpf+0x7c/0x90 [ 78.495971][ T1888] x64_sys_call+0x4b9/0x9a0 [ 78.500517][ T1888] do_syscall_64+0x4c/0xa0 [ 78.505050][ T1888] ? clear_bhb_loop+0x50/0xa0 [ 78.509733][ T1888] ? clear_bhb_loop+0x50/0xa0 [ 78.514531][ T1888] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 78.520435][ T1888] RIP: 0033:0x7f5e2d792be9 [ 78.524866][ T1888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 78.544808][ T1888] RSP: 002b:00007f5e2c1fb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 78.553325][ T1888] RAX: ffffffffffffffda RBX: 00007f5e2d9c9fa0 RCX: 00007f5e2d792be9 [ 78.561332][ T1888] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 78.569491][ T1888] RBP: 00007f5e2c1fb090 R08: 0000000000000000 R09: 0000000000000000 [ 78.577559][ T1888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 78.585632][ T1888] R13: 00007f5e2d9ca038 R14: 00007f5e2d9c9fa0 R15: 00007fff52aad1d8 [ 78.593702][ T1888] [ 80.082758][ T1929] device syzkaller0 entered promiscuous mode [ 80.274414][ T30] audit: type=1400 audit(1756977763.889:129): avc: denied { create } for pid=1948 comm="syz.3.579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 80.614239][ T1950] device veth0_vlan left promiscuous mode [ 80.675909][ T1950] device veth0_vlan entered promiscuous mode [ 81.485126][ T1975] device syzkaller0 entered promiscuous mode [ 83.113342][ T2013] FAULT_INJECTION: forcing a failure. [ 83.113342][ T2013] name failslab, interval 1, probability 0, space 0, times 0 [ 83.126174][ T2013] CPU: 0 PID: 2013 Comm: syz.4.604 Not tainted syzkaller #0 [ 83.133488][ T2013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 83.143579][ T2013] Call Trace: [ 83.146966][ T2013] [ 83.149915][ T2013] __dump_stack+0x21/0x30 [ 83.154271][ T2013] dump_stack_lvl+0xee/0x150 [ 83.158900][ T2013] ? show_regs_print_info+0x20/0x20 [ 83.164260][ T2013] ? debug_smp_processor_id+0x17/0x20 [ 83.169673][ T2013] dump_stack+0x15/0x20 [ 83.173861][ T2013] should_fail+0x3c1/0x510 [ 83.178306][ T2013] __should_failslab+0xa4/0xe0 [ 83.183167][ T2013] should_failslab+0x9/0x20 [ 83.187695][ T2013] slab_pre_alloc_hook+0x3b/0xe0 [ 83.192667][ T2013] __kmalloc+0x6d/0x2c0 [ 83.197131][ T2013] ? qdisc_alloc+0x78/0x770 [ 83.201666][ T2013] qdisc_alloc+0x78/0x770 [ 83.206131][ T2013] qdisc_create_dflt+0x6b/0x3a0 [ 83.211084][ T2013] dev_activate+0x2a0/0x1060 [ 83.215684][ T2013] __dev_open+0x3aa/0x4c0 [ 83.220026][ T2013] ? dev_open+0x230/0x230 [ 83.224368][ T2013] ? _raw_spin_unlock_bh+0x51/0x60 [ 83.229489][ T2013] ? dev_set_rx_mode+0x212/0x2c0 [ 83.234466][ T2013] ? __kasan_check_read+0x11/0x20 [ 83.239504][ T2013] __dev_change_flags+0x20a/0x6a0 [ 83.244547][ T2013] ? dev_get_flags+0x1e0/0x1e0 [ 83.249364][ T2013] ? __kasan_slab_free+0x11/0x20 [ 83.254339][ T2013] dev_change_flags+0x88/0x1a0 [ 83.259130][ T2013] dev_ifsioc+0x147/0xe70 [ 83.263471][ T2013] ? dev_ioctl+0xd10/0xd10 [ 83.267898][ T2013] ? __kasan_check_write+0x14/0x20 [ 83.273018][ T2013] ? mutex_lock+0x95/0x1a0 [ 83.277436][ T2013] ? wait_for_completion_killable_timeout+0x10/0x10 [ 83.284201][ T2013] ? dev_get_by_name_rcu+0xc8/0xf0 [ 83.289321][ T2013] dev_ioctl+0x560/0xd10 [ 83.293570][ T2013] sock_do_ioctl+0x22e/0x300 [ 83.298180][ T2013] ? sock_show_fdinfo+0xa0/0xa0 [ 83.303035][ T2013] ? selinux_file_ioctl+0x377/0x480 [ 83.308350][ T2013] sock_ioctl+0x4bc/0x6b0 [ 83.312686][ T2013] ? sock_poll+0x3d0/0x3d0 [ 83.317105][ T2013] ? __fget_files+0x2c4/0x320 [ 83.321787][ T2013] ? security_file_ioctl+0x84/0xa0 [ 83.327000][ T2013] ? sock_poll+0x3d0/0x3d0 [ 83.331423][ T2013] __se_sys_ioctl+0x121/0x1a0 [ 83.336105][ T2013] __x64_sys_ioctl+0x7b/0x90 [ 83.340788][ T2013] x64_sys_call+0x2f/0x9a0 [ 83.345206][ T2013] do_syscall_64+0x4c/0xa0 [ 83.349884][ T2013] ? clear_bhb_loop+0x50/0xa0 [ 83.354680][ T2013] ? clear_bhb_loop+0x50/0xa0 [ 83.359363][ T2013] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 83.365267][ T2013] RIP: 0033:0x7f25e7332be9 [ 83.369687][ T2013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 83.389475][ T2013] RSP: 002b:00007f25e5d9b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 83.397926][ T2013] RAX: ffffffffffffffda RBX: 00007f25e7569fa0 RCX: 00007f25e7332be9 [ 83.405913][ T2013] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 0000000000000004 [ 83.413989][ T2013] RBP: 00007f25e5d9b090 R08: 0000000000000000 R09: 0000000000000000 [ 83.422054][ T2013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 83.430027][ T2013] R13: 00007f25e756a038 R14: 00007f25e7569fa0 R15: 00007ffcf6c4f218 [ 83.438214][ T2013] [ 83.442031][ T2013] device team_slave_1 entered promiscuous mode [ 83.497104][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 83.556030][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 83.624488][ T2030] cgroup: fork rejected by pids controller in /syz4 [ 83.796145][ T282] syz-executor (282) used greatest stack depth: 21792 bytes left [ 84.022416][ T2037] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 84.039268][ T2035] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.046648][ T2035] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.054468][ T2035] device bridge_slave_0 entered promiscuous mode [ 84.077247][ T2035] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.101622][ T2035] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.109278][ T2035] device bridge_slave_1 entered promiscuous mode [ 84.334698][ T2044] device syzkaller0 entered promiscuous mode [ 84.522752][ T2050] device syzkaller0 entered promiscuous mode [ 84.542462][ T10] GPL: port 1(erspan0) entered disabled state [ 84.550135][ T10] device erspan0 left promiscuous mode [ 84.555708][ T10] GPL: port 1(erspan0) entered disabled state [ 84.653851][ T30] audit: type=1400 audit(1756977768.269:130): avc: denied { create } for pid=2035 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 84.674885][ T30] audit: type=1400 audit(1756977768.269:131): avc: denied { write } for pid=2035 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 84.696152][ T30] audit: type=1400 audit(1756977768.269:132): avc: denied { read } for pid=2035 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 84.731463][ T2035] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.738589][ T2035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 84.745944][ T2035] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.753008][ T2035] bridge0: port 1(bridge_slave_0) entered forwarding state [ 84.885005][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.915450][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.945648][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 84.953604][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 84.961241][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 84.969830][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 84.978451][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.985699][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 84.993375][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 85.002203][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 85.011035][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.018250][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 85.026194][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 85.034581][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 85.043745][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 85.052079][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 85.073849][ T10] device bridge_slave_1 left promiscuous mode [ 85.080082][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.089164][ T10] device bridge_slave_0 left promiscuous mode [ 85.096053][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.105299][ T10] device veth1_macvtap left promiscuous mode [ 85.477545][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 85.486317][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 85.516140][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 85.525195][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 85.534524][ T2035] device veth0_vlan entered promiscuous mode [ 85.595006][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 85.603078][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 85.617896][ T2035] device veth1_macvtap entered promiscuous mode [ 85.720552][ T2078] device syzkaller0 entered promiscuous mode [ 85.748080][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 85.763073][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 85.787573][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 85.930069][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 85.938774][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 85.947846][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 85.956413][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 86.413700][ T2096] device syzkaller0 entered promiscuous mode [ 87.977691][ T2122] device syzkaller0 entered promiscuous mode [ 88.220722][ T2136] device syzkaller0 entered promiscuous mode [ 88.732605][ T2156] device macsec0 left promiscuous mode [ 88.775320][ T2156] device veth1_macvtap entered promiscuous mode [ 88.782959][ T2156] device macsec0 entered promiscuous mode [ 88.842801][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 89.818046][ T2176] device syzkaller0 entered promiscuous mode [ 91.789475][ T2217] device syzkaller0 entered promiscuous mode [ 92.477391][ T2242] FAULT_INJECTION: forcing a failure. [ 92.477391][ T2242] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 92.622682][ T2242] CPU: 0 PID: 2242 Comm: syz.4.681 Not tainted syzkaller #0 [ 92.630030][ T2242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 92.640105][ T2242] Call Trace: [ 92.643417][ T2242] [ 92.646364][ T2242] __dump_stack+0x21/0x30 [ 92.650803][ T2242] dump_stack_lvl+0xee/0x150 [ 92.655539][ T2242] ? show_regs_print_info+0x20/0x20 [ 92.660764][ T2242] dump_stack+0x15/0x20 [ 92.664951][ T2242] should_fail+0x3c1/0x510 [ 92.669389][ T2242] should_fail_usercopy+0x1a/0x20 [ 92.674440][ T2242] _copy_to_user+0x20/0x90 [ 92.678964][ T2242] simple_read_from_buffer+0xe9/0x160 [ 92.684355][ T2242] proc_fail_nth_read+0x19a/0x210 [ 92.689483][ T2242] ? proc_fault_inject_write+0x2f0/0x2f0 [ 92.695224][ T2242] ? security_file_permission+0x83/0xa0 [ 92.700805][ T2242] ? proc_fault_inject_write+0x2f0/0x2f0 [ 92.706544][ T2242] vfs_read+0x282/0xbe0 [ 92.710719][ T2242] ? kernel_read+0x1f0/0x1f0 [ 92.715322][ T2242] ? __kasan_check_write+0x14/0x20 [ 92.720535][ T2242] ? mutex_lock+0x95/0x1a0 [ 92.724974][ T2242] ? wait_for_completion_killable_timeout+0x10/0x10 [ 92.731590][ T2242] ? __fget_files+0x2c4/0x320 [ 92.736306][ T2242] ? __fdget_pos+0x2d2/0x380 [ 92.740910][ T2242] ? ksys_read+0x71/0x240 [ 92.745256][ T2242] ksys_read+0x140/0x240 [ 92.749624][ T2242] ? vfs_write+0xf70/0xf70 [ 92.754052][ T2242] ? __kasan_check_write+0x14/0x20 [ 92.759205][ T2242] ? switch_fpu_return+0x15d/0x2c0 [ 92.764330][ T2242] __x64_sys_read+0x7b/0x90 [ 92.768943][ T2242] x64_sys_call+0x96d/0x9a0 [ 92.773460][ T2242] do_syscall_64+0x4c/0xa0 [ 92.777889][ T2242] ? clear_bhb_loop+0x50/0xa0 [ 92.782580][ T2242] ? clear_bhb_loop+0x50/0xa0 [ 92.787281][ T2242] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 92.793194][ T2242] RIP: 0033:0x7f9c384095fc [ 92.797647][ T2242] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 92.817279][ T2242] RSP: 002b:00007f9c36e73030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 92.825736][ T2242] RAX: ffffffffffffffda RBX: 00007f9c38641fa0 RCX: 00007f9c384095fc [ 92.833769][ T2242] RDX: 000000000000000f RSI: 00007f9c36e730a0 RDI: 0000000000000009 [ 92.841766][ T2242] RBP: 00007f9c36e73090 R08: 0000000000000000 R09: 0000000000000000 [ 92.849757][ T2242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 92.857884][ T2242] R13: 00007f9c38642038 R14: 00007f9c38641fa0 R15: 00007ffc48a91758 [ 92.866334][ T2242] [ 93.368582][ T2264] device syzkaller0 entered promiscuous mode [ 93.682137][ T2267] tap0: tun_chr_ioctl cmd 1074812118 [ 94.598435][ T2295] device syzkaller0 entered promiscuous mode [ 95.384720][ T30] audit: type=1400 audit(1756977778.999:133): avc: denied { create } for pid=2315 comm="syz.1.707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 97.445984][ T2360] FAULT_INJECTION: forcing a failure. [ 97.445984][ T2360] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 97.516655][ T2360] CPU: 0 PID: 2360 Comm: syz.3.722 Not tainted syzkaller #0 [ 97.524134][ T2360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 97.534303][ T2360] Call Trace: [ 97.537707][ T2360] [ 97.540672][ T2360] __dump_stack+0x21/0x30 [ 97.545068][ T2360] dump_stack_lvl+0xee/0x150 [ 97.549686][ T2360] ? show_regs_print_info+0x20/0x20 [ 97.554915][ T2360] ? __kasan_check_write+0x14/0x20 [ 97.560193][ T2360] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 97.565873][ T2360] ? _raw_spin_lock+0xe0/0xe0 [ 97.570611][ T2360] dump_stack+0x15/0x20 [ 97.574823][ T2360] should_fail+0x3c1/0x510 [ 97.579260][ T2360] should_fail_alloc_page+0x55/0x80 [ 97.584485][ T2360] prepare_alloc_pages+0x156/0x600 [ 97.589835][ T2360] ? __alloc_pages_bulk+0xab0/0xab0 [ 97.595197][ T2360] ? slab_post_alloc_hook+0x4f/0x2b0 [ 97.600521][ T2360] ? kmem_cache_alloc+0xf7/0x260 [ 97.605505][ T2360] ? alloc_vmap_area+0x17a/0x1990 [ 97.610544][ T2360] ? __get_vm_area_node+0x14e/0x350 [ 97.615749][ T2360] ? __vmalloc_node_range+0xdf/0xaf0 [ 97.621043][ T2360] ? htab_map_alloc+0x3c0/0x14f0 [ 97.626002][ T2360] __alloc_pages+0x10a/0x440 [ 97.630687][ T2360] ? prep_new_page+0x110/0x110 [ 97.635458][ T2360] __get_free_pages+0x10/0x30 [ 97.640143][ T2360] kasan_populate_vmalloc_pte+0x29/0x120 [ 97.645783][ T2360] __apply_to_page_range+0x8b0/0xbf0 [ 97.651081][ T2360] ? kasan_populate_vmalloc+0x70/0x70 [ 97.656462][ T2360] ? kasan_populate_vmalloc+0x70/0x70 [ 97.661989][ T2360] apply_to_page_range+0x3b/0x50 [ 97.666971][ T2360] kasan_populate_vmalloc+0x60/0x70 [ 97.672190][ T2360] alloc_vmap_area+0x185c/0x1990 [ 97.677158][ T2360] ? vm_map_ram+0xa60/0xa60 [ 97.681681][ T2360] ? __get_vm_area_node+0x11d/0x350 [ 97.686889][ T2360] __get_vm_area_node+0x14e/0x350 [ 97.691958][ T2360] __vmalloc_node_range+0xdf/0xaf0 [ 97.697079][ T2360] ? htab_map_alloc+0x3c0/0x14f0 [ 97.702026][ T2360] bpf_map_area_alloc+0xd5/0xe0 [ 97.706888][ T2360] ? htab_map_alloc+0x3c0/0x14f0 [ 97.711834][ T2360] htab_map_alloc+0x3c0/0x14f0 [ 97.716606][ T2360] map_create+0x455/0x21b0 [ 97.721029][ T2360] __sys_bpf+0x2cf/0x730 [ 97.725275][ T2360] ? bpf_link_show_fdinfo+0x310/0x310 [ 97.730652][ T2360] ? debug_smp_processor_id+0x17/0x20 [ 97.736046][ T2360] __x64_sys_bpf+0x7c/0x90 [ 97.740472][ T2360] x64_sys_call+0x4b9/0x9a0 [ 97.745167][ T2360] do_syscall_64+0x4c/0xa0 [ 97.749587][ T2360] ? clear_bhb_loop+0x50/0xa0 [ 97.754389][ T2360] ? clear_bhb_loop+0x50/0xa0 [ 97.759073][ T2360] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 97.765034][ T2360] RIP: 0033:0x7f43be641be9 [ 97.769471][ T2360] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 97.789182][ T2360] RSP: 002b:00007f43bd0aa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 97.797886][ T2360] RAX: ffffffffffffffda RBX: 00007f43be878fa0 RCX: 00007f43be641be9 [ 97.805953][ T2360] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 97.813932][ T2360] RBP: 00007f43bd0aa090 R08: 0000000000000000 R09: 0000000000000000 [ 97.821930][ T2360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 97.830008][ T2360] R13: 00007f43be879038 R14: 00007f43be878fa0 R15: 00007ffc7a21ff08 [ 97.837987][ T2360] [ 99.962577][ T2432] device sit0 entered promiscuous mode [ 100.201754][ T2447] FAULT_INJECTION: forcing a failure. [ 100.201754][ T2447] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 100.256488][ T2447] CPU: 0 PID: 2447 Comm: syz.0.758 Not tainted syzkaller #0 [ 100.263839][ T2447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 100.274006][ T2447] Call Trace: [ 100.277313][ T2447] [ 100.280273][ T2447] __dump_stack+0x21/0x30 [ 100.284635][ T2447] dump_stack_lvl+0xee/0x150 [ 100.289270][ T2447] ? show_regs_print_info+0x20/0x20 [ 100.294591][ T2447] ? vfs_write+0xc17/0xf70 [ 100.299042][ T2447] dump_stack+0x15/0x20 [ 100.301279][ T2438] device syzkaller0 entered promiscuous mode [ 100.303223][ T2447] should_fail+0x3c1/0x510 [ 100.303250][ T2447] should_fail_usercopy+0x1a/0x20 [ 100.303268][ T2447] _copy_from_user+0x20/0xd0 [ 100.303293][ T2447] __sys_bpf+0x233/0x730 [ 100.303313][ T2447] ? bpf_link_show_fdinfo+0x310/0x310 [ 100.303338][ T2447] ? debug_smp_processor_id+0x17/0x20 [ 100.303365][ T2447] __x64_sys_bpf+0x7c/0x90 [ 100.303385][ T2447] x64_sys_call+0x4b9/0x9a0 [ 100.303406][ T2447] do_syscall_64+0x4c/0xa0 [ 100.303427][ T2447] ? clear_bhb_loop+0x50/0xa0 [ 100.303449][ T2447] ? clear_bhb_loop+0x50/0xa0 [ 100.303471][ T2447] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 100.303495][ T2447] RIP: 0033:0x7f5e2d792be9 [ 100.303513][ T2447] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 100.303532][ T2447] RSP: 002b:00007f5e2c1fb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 100.303556][ T2447] RAX: ffffffffffffffda RBX: 00007f5e2d9c9fa0 RCX: 00007f5e2d792be9 [ 100.303573][ T2447] RDX: 0000000000000018 RSI: 0000200000000040 RDI: 0000000000000006 [ 100.303587][ T2447] RBP: 00007f5e2c1fb090 R08: 0000000000000000 R09: 0000000000000000 [ 100.303601][ T2447] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 100.303613][ T2447] R13: 00007f5e2d9ca038 R14: 00007f5e2d9c9fa0 R15: 00007fff52aad1d8 [ 100.303635][ T2447] [ 101.804686][ T2487] device syzkaller0 entered promiscuous mode [ 101.979531][ T2499] device wg2 entered promiscuous mode [ 102.713596][ T2528] syz.3.788[2528] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.713670][ T2528] syz.3.788[2528] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.172648][ C0] sched: RT throttling activated [ 104.172648][ C1] sched: RT throttling activated [ 105.439528][ T2535] device syzkaller0 entered promiscuous mode [ 105.668663][ T2556] device team_slave_1 entered promiscuous mode [ 105.680102][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 105.720973][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 107.361788][ T2585] device syzkaller0 entered promiscuous mode [ 109.869622][ T2655] FAULT_INJECTION: forcing a failure. [ 109.869622][ T2655] name failslab, interval 1, probability 0, space 0, times 0 [ 109.897067][ T2655] CPU: 0 PID: 2655 Comm: syz.1.831 Not tainted syzkaller #0 [ 109.904429][ T2655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 109.914975][ T2655] Call Trace: [ 109.918286][ T2655] [ 109.921255][ T2655] __dump_stack+0x21/0x30 [ 109.925706][ T2655] dump_stack_lvl+0xee/0x150 [ 109.930325][ T2655] ? show_regs_print_info+0x20/0x20 [ 109.935566][ T2655] dump_stack+0x15/0x20 [ 109.939768][ T2655] should_fail+0x3c1/0x510 [ 109.944308][ T2655] ? skb_ensure_writable+0x2e7/0x460 [ 109.949630][ T2655] __should_failslab+0xa4/0xe0 [ 109.954517][ T2655] should_failslab+0x9/0x20 [ 109.959158][ T2655] slab_pre_alloc_hook+0x3b/0xe0 [ 109.964394][ T2655] ? skb_ensure_writable+0x2e7/0x460 [ 109.969750][ T2655] ? skb_ensure_writable+0x2e7/0x460 [ 109.975059][ T2655] __kmalloc_track_caller+0x6c/0x2c0 [ 109.980571][ T2655] ? skb_ensure_writable+0x2e7/0x460 [ 109.985905][ T2655] ? skb_ensure_writable+0x2e7/0x460 [ 109.991307][ T2655] pskb_expand_head+0x11b/0x11d0 [ 109.996278][ T2655] ? __copy_skb_header+0x437/0x600 [ 110.001434][ T2655] ? __kasan_check_write+0x14/0x20 [ 110.006669][ T2655] ? __skb_clone+0x47a/0x790 [ 110.011288][ T2655] skb_ensure_writable+0x2e7/0x460 [ 110.016418][ T2655] bpf_clone_redirect+0x10b/0x380 [ 110.021576][ T2655] bpf_prog_6893982b85ceadf7+0x56/0x564 [ 110.027143][ T2655] ? __kasan_slab_alloc+0xcf/0xf0 [ 110.032187][ T2655] ? __kasan_slab_alloc+0xbd/0xf0 [ 110.037246][ T2655] ? slab_post_alloc_hook+0x4f/0x2b0 [ 110.042574][ T2655] ? kmem_cache_alloc+0xf7/0x260 [ 110.047538][ T2655] ? __build_skb+0x2d/0x310 [ 110.052156][ T2655] ? build_skb+0x24/0x200 [ 110.056518][ T2655] ? bpf_prog_test_run_skb+0x279/0x1150 [ 110.062090][ T2655] ? bpf_prog_test_run+0x3d5/0x620 [ 110.067224][ T2655] ? __sys_bpf+0x52c/0x730 [ 110.071753][ T2655] ? __x64_sys_bpf+0x7c/0x90 [ 110.076362][ T2655] ? x64_sys_call+0x4b9/0x9a0 [ 110.081062][ T2655] ? do_syscall_64+0x4c/0xa0 [ 110.085670][ T2655] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 110.091768][ T2655] ? __kasan_check_read+0x11/0x20 [ 110.096811][ T2655] ? bpf_test_timer_continue+0x146/0x4a0 [ 110.102818][ T2655] bpf_test_run+0x33d/0x8d0 [ 110.107350][ T2655] ? convert___skb_to_skb+0x4f0/0x4f0 [ 110.112833][ T2655] ? eth_get_headlen+0x1f0/0x1f0 [ 110.117816][ T2655] ? convert___skb_to_skb+0x41/0x4f0 [ 110.123170][ T2655] bpf_prog_test_run_skb+0x9ec/0x1150 [ 110.128568][ T2655] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 110.134479][ T2655] bpf_prog_test_run+0x3d5/0x620 [ 110.139436][ T2655] ? bpf_prog_query+0x230/0x230 [ 110.144307][ T2655] ? selinux_bpf+0xce/0xf0 [ 110.148832][ T2655] ? security_bpf+0x82/0xa0 [ 110.153378][ T2655] __sys_bpf+0x52c/0x730 [ 110.157635][ T2655] ? bpf_link_show_fdinfo+0x310/0x310 [ 110.163143][ T2655] ? debug_smp_processor_id+0x17/0x20 [ 110.168541][ T2655] __x64_sys_bpf+0x7c/0x90 [ 110.172983][ T2655] x64_sys_call+0x4b9/0x9a0 [ 110.177591][ T2655] do_syscall_64+0x4c/0xa0 [ 110.182236][ T2655] ? clear_bhb_loop+0x50/0xa0 [ 110.186953][ T2655] ? clear_bhb_loop+0x50/0xa0 [ 110.191660][ T2655] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 110.197604][ T2655] RIP: 0033:0x7f36891d5be9 [ 110.202130][ T2655] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 110.221760][ T2655] RSP: 002b:00007f3687c3e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 110.230220][ T2655] RAX: ffffffffffffffda RBX: 00007f368940cfa0 RCX: 00007f36891d5be9 [ 110.238235][ T2655] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 110.246252][ T2655] RBP: 00007f3687c3e090 R08: 0000000000000000 R09: 0000000000000000 [ 110.254249][ T2655] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 110.262243][ T2655] R13: 00007f368940d038 R14: 00007f368940cfa0 R15: 00007ffed595c7c8 [ 110.270264][ T2655] [ 117.292135][ T2827] device sit0 left promiscuous mode [ 117.396579][ T2827] device sit0 entered promiscuous mode [ 118.287067][ T2843] device syzkaller0 entered promiscuous mode [ 121.625814][ T2926] device syzkaller0 entered promiscuous mode [ 122.965474][ T2956] device syzkaller0 entered promiscuous mode [ 123.746976][ T2971] device syzkaller0 entered promiscuous mode [ 125.199280][ T2990] device sit0 entered promiscuous mode [ 126.055881][ T3002] device syzkaller0 entered promiscuous mode [ 126.204047][ T3014] device syzkaller0 entered promiscuous mode [ 126.801931][ T3028] GPL: port 1(erspan0) entered blocking state [ 126.828251][ T3028] GPL: port 1(erspan0) entered disabled state [ 126.873491][ T3028] device erspan0 entered promiscuous mode [ 126.946231][ T3030] GPL: port 1(erspan0) entered blocking state [ 126.952395][ T3030] GPL: port 1(erspan0) entered forwarding state [ 130.179726][ T3090] FAULT_INJECTION: forcing a failure. [ 130.179726][ T3090] name failslab, interval 1, probability 0, space 0, times 0 [ 130.224256][ T3090] CPU: 1 PID: 3090 Comm: syz.3.979 Not tainted syzkaller #0 [ 130.231741][ T3090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 130.242051][ T3090] Call Trace: [ 130.245365][ T3090] [ 130.248314][ T3090] __dump_stack+0x21/0x30 [ 130.252696][ T3090] dump_stack_lvl+0xee/0x150 [ 130.257320][ T3090] ? show_regs_print_info+0x20/0x20 [ 130.262542][ T3090] ? avc_has_perm+0x158/0x240 [ 130.267249][ T3090] ? security_file_permission+0x79/0xa0 [ 130.272829][ T3090] dump_stack+0x15/0x20 [ 130.277019][ T3090] should_fail+0x3c1/0x510 [ 130.281480][ T3090] __should_failslab+0xa4/0xe0 [ 130.286279][ T3090] should_failslab+0x9/0x20 [ 130.290989][ T3090] slab_pre_alloc_hook+0x3b/0xe0 [ 130.295967][ T3090] ? sock_alloc_inode+0x1b/0xb0 [ 130.300850][ T3090] kmem_cache_alloc+0x44/0x260 [ 130.305683][ T3090] ? sockfs_init_fs_context+0xb0/0xb0 [ 130.311094][ T3090] sock_alloc_inode+0x1b/0xb0 [ 130.315796][ T3090] ? sockfs_init_fs_context+0xb0/0xb0 [ 130.321277][ T3090] new_inode_pseudo+0x62/0x210 [ 130.326072][ T3090] __sock_create+0x12c/0x7a0 [ 130.330681][ T3090] __sys_socketpair+0x1a1/0x590 [ 130.335555][ T3090] __x64_sys_socketpair+0x9b/0xb0 [ 130.340621][ T3090] x64_sys_call+0x36/0x9a0 [ 130.345063][ T3090] do_syscall_64+0x4c/0xa0 [ 130.349499][ T3090] ? clear_bhb_loop+0x50/0xa0 [ 130.354189][ T3090] ? clear_bhb_loop+0x50/0xa0 [ 130.358876][ T3090] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 130.364885][ T3090] RIP: 0033:0x7f43be641be9 [ 130.369402][ T3090] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 130.389130][ T3090] RSP: 002b:00007f43bd0aa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 130.397552][ T3090] RAX: ffffffffffffffda RBX: 00007f43be878fa0 RCX: 00007f43be641be9 [ 130.405622][ T3090] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 130.413722][ T3090] RBP: 00007f43bd0aa090 R08: 0000000000000000 R09: 0000000000000000 [ 130.421708][ T3090] R10: 0000200000000940 R11: 0000000000000246 R12: 0000000000000001 [ 130.429819][ T3090] R13: 00007f43be879038 R14: 00007f43be878fa0 R15: 00007ffc7a21ff08 [ 130.437917][ T3090] [ 130.445294][ T3090] socket: no more sockets [ 131.722592][ T3119] FAULT_INJECTION: forcing a failure. [ 131.722592][ T3119] name failslab, interval 1, probability 0, space 0, times 0 [ 131.753336][ T3119] CPU: 0 PID: 3119 Comm: syz.2.988 Not tainted syzkaller #0 [ 131.760687][ T3119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 131.770858][ T3119] Call Trace: [ 131.774255][ T3119] [ 131.777317][ T3119] __dump_stack+0x21/0x30 [ 131.781677][ T3119] dump_stack_lvl+0xee/0x150 [ 131.786295][ T3119] ? show_regs_print_info+0x20/0x20 [ 131.791507][ T3119] dump_stack+0x15/0x20 [ 131.795666][ T3119] should_fail+0x3c1/0x510 [ 131.800234][ T3119] __should_failslab+0xa4/0xe0 [ 131.805019][ T3119] should_failslab+0x9/0x20 [ 131.809588][ T3119] slab_pre_alloc_hook+0x3b/0xe0 [ 131.814563][ T3119] ? getname_flags+0xb9/0x500 [ 131.819251][ T3119] kmem_cache_alloc+0x44/0x260 [ 131.824107][ T3119] getname_flags+0xb9/0x500 [ 131.828615][ T3119] __x64_sys_mkdir+0x5f/0x80 [ 131.833213][ T3119] x64_sys_call+0x124/0x9a0 [ 131.837722][ T3119] do_syscall_64+0x4c/0xa0 [ 131.842147][ T3119] ? clear_bhb_loop+0x50/0xa0 [ 131.846827][ T3119] ? clear_bhb_loop+0x50/0xa0 [ 131.851515][ T3119] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 131.857412][ T3119] RIP: 0033:0x7f11fbb79be9 [ 131.861850][ T3119] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 131.881557][ T3119] RSP: 002b:00007f11fa5e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 131.889985][ T3119] RAX: ffffffffffffffda RBX: 00007f11fbdb0fa0 RCX: 00007f11fbb79be9 [ 131.898057][ T3119] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000000 [ 131.906047][ T3119] RBP: 00007f11fa5e2090 R08: 0000000000000000 R09: 0000000000000000 [ 131.914025][ T3119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 131.922090][ T3119] R13: 00007f11fbdb1038 R14: 00007f11fbdb0fa0 R15: 00007fff7e6de5c8 [ 131.930224][ T3119] [ 132.140849][ T30] audit: type=1400 audit(1756977815.749:134): avc: denied { create } for pid=3124 comm="syz.1.991" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 132.945061][ T3146] device syzkaller0 entered promiscuous mode [ 135.752474][ T3207] FAULT_INJECTION: forcing a failure. [ 135.752474][ T3207] name failslab, interval 1, probability 0, space 0, times 0 [ 135.765432][ T3207] CPU: 1 PID: 3207 Comm: syz.0.1021 Not tainted syzkaller #0 [ 135.773368][ T3207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 135.783467][ T3207] Call Trace: [ 135.786760][ T3207] [ 135.789693][ T3207] __dump_stack+0x21/0x30 [ 135.794052][ T3207] dump_stack_lvl+0xee/0x150 [ 135.798795][ T3207] ? show_regs_print_info+0x20/0x20 [ 135.804119][ T3207] dump_stack+0x15/0x20 [ 135.808286][ T3207] should_fail+0x3c1/0x510 [ 135.812717][ T3207] __should_failslab+0xa4/0xe0 [ 135.817541][ T3207] should_failslab+0x9/0x20 [ 135.822197][ T3207] slab_pre_alloc_hook+0x3b/0xe0 [ 135.827193][ T3207] ? __build_skb+0x2d/0x310 [ 135.831740][ T3207] kmem_cache_alloc+0x44/0x260 [ 135.836524][ T3207] __build_skb+0x2d/0x310 [ 135.840866][ T3207] ? __kasan_check_write+0x14/0x20 [ 135.846116][ T3207] build_skb+0x24/0x200 [ 135.850348][ T3207] bpf_prog_test_run_skb+0x279/0x1150 [ 135.855739][ T3207] ? __kasan_check_write+0x14/0x20 [ 135.860894][ T3207] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 135.866902][ T3207] bpf_prog_test_run+0x3d5/0x620 [ 135.871991][ T3207] ? bpf_prog_query+0x230/0x230 [ 135.876844][ T3207] ? selinux_bpf+0xce/0xf0 [ 135.881273][ T3207] ? security_bpf+0x82/0xa0 [ 135.885782][ T3207] __sys_bpf+0x52c/0x730 [ 135.890150][ T3207] ? bpf_link_show_fdinfo+0x310/0x310 [ 135.895636][ T3207] ? debug_smp_processor_id+0x17/0x20 [ 135.901038][ T3207] __x64_sys_bpf+0x7c/0x90 [ 135.905471][ T3207] x64_sys_call+0x4b9/0x9a0 [ 135.910012][ T3207] do_syscall_64+0x4c/0xa0 [ 135.914469][ T3207] ? clear_bhb_loop+0x50/0xa0 [ 135.919300][ T3207] ? clear_bhb_loop+0x50/0xa0 [ 135.924025][ T3207] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 135.929942][ T3207] RIP: 0033:0x7f5e2d792be9 [ 135.934388][ T3207] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 135.954100][ T3207] RSP: 002b:00007f5e2c1fb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 135.962532][ T3207] RAX: ffffffffffffffda RBX: 00007f5e2d9c9fa0 RCX: 00007f5e2d792be9 [ 135.970596][ T3207] RDX: 0000000000000050 RSI: 0000200000000080 RDI: 000000000000000a [ 135.978570][ T3207] RBP: 00007f5e2c1fb090 R08: 0000000000000000 R09: 0000000000000000 [ 135.986638][ T3207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 135.994616][ T3207] R13: 00007f5e2d9ca038 R14: 00007f5e2d9c9fa0 R15: 00007fff52aad1d8 [ 136.002626][ T3207] [ 137.190793][ T3248] FAULT_INJECTION: forcing a failure. [ 137.190793][ T3248] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 137.335355][ T3248] CPU: 1 PID: 3248 Comm: syz.4.1033 Not tainted syzkaller #0 [ 137.342879][ T3248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 137.353052][ T3248] Call Trace: [ 137.356369][ T3248] [ 137.359327][ T3248] __dump_stack+0x21/0x30 [ 137.363780][ T3248] dump_stack_lvl+0xee/0x150 [ 137.368397][ T3248] ? show_regs_print_info+0x20/0x20 [ 137.373631][ T3248] dump_stack+0x15/0x20 [ 137.377814][ T3248] should_fail+0x3c1/0x510 [ 137.382360][ T3248] should_fail_alloc_page+0x55/0x80 [ 137.387684][ T3248] prepare_alloc_pages+0x156/0x600 [ 137.392827][ T3248] ? __alloc_pages_bulk+0xab0/0xab0 [ 137.398063][ T3248] ? do_sys_openat2+0x6a7/0x7b0 [ 137.402944][ T3248] ? __x64_sys_openat+0x136/0x160 [ 137.408002][ T3248] ? x64_sys_call+0x219/0x9a0 [ 137.412812][ T3248] __alloc_pages+0x10a/0x440 [ 137.417470][ T3248] ? prep_new_page+0x110/0x110 [ 137.422270][ T3248] __get_free_pages+0x10/0x30 [ 137.426972][ T3248] mem_rw+0x8a/0x600 [ 137.430896][ T3248] ? security_file_permission+0x79/0xa0 [ 137.436559][ T3248] mem_write+0x33/0x40 [ 137.440759][ T3248] ? mem_read+0x40/0x40 [ 137.445050][ T3248] vfs_write+0x3ee/0xf70 [ 137.449434][ T3248] ? file_end_write+0x1b0/0x1b0 [ 137.454490][ T3248] ? __kasan_check_write+0x14/0x20 [ 137.459644][ T3248] ? mutex_lock+0x95/0x1a0 [ 137.464267][ T3248] ? wait_for_completion_killable_timeout+0x10/0x10 [ 137.470885][ T3248] ? __fget_files+0x2c4/0x320 [ 137.475736][ T3248] ? __fdget_pos+0x2d2/0x380 [ 137.480443][ T3248] ? ksys_write+0x71/0x240 [ 137.484986][ T3248] ksys_write+0x140/0x240 [ 137.489428][ T3248] ? __ia32_sys_read+0x90/0x90 [ 137.494287][ T3248] ? debug_smp_processor_id+0x17/0x20 [ 137.499687][ T3248] __x64_sys_write+0x7b/0x90 [ 137.504305][ T3248] x64_sys_call+0x8ef/0x9a0 [ 137.508833][ T3248] do_syscall_64+0x4c/0xa0 [ 137.513280][ T3248] ? clear_bhb_loop+0x50/0xa0 [ 137.517980][ T3248] ? clear_bhb_loop+0x50/0xa0 [ 137.522767][ T3248] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 137.528684][ T3248] RIP: 0033:0x7f9c3840abe9 [ 137.533118][ T3248] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 137.552752][ T3248] RSP: 002b:00007f9c36e73038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 137.561295][ T3248] RAX: ffffffffffffffda RBX: 00007f9c38641fa0 RCX: 00007f9c3840abe9 [ 137.569310][ T3248] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 [ 137.577312][ T3248] RBP: 00007f9c36e73090 R08: 0000000000000000 R09: 0000000000000000 [ 137.585320][ T3248] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 137.593411][ T3248] R13: 00007f9c38642038 R14: 00007f9c38641fa0 R15: 00007ffc48a91758 [ 137.601419][ T3248] [ 139.436935][ T3293] device syzkaller0 entered promiscuous mode [ 139.666206][ T3301] device syzkaller0 entered promiscuous mode [ 140.709738][ T3330] device syzkaller0 entered promiscuous mode [ 140.979421][ T3334] device syzkaller0 entered promiscuous mode [ 141.922452][ T3347] device syzkaller0 entered promiscuous mode [ 142.355798][ T3354] device syzkaller0 entered promiscuous mode [ 143.690157][ T3378] device syzkaller0 entered promiscuous mode [ 143.897508][ T3389] device syzkaller0 entered promiscuous mode [ 144.603590][ T3400] device syzkaller0 entered promiscuous mode [ 144.827530][ T3414] device syzkaller0 entered promiscuous mode [ 145.290914][ T3429] device syzkaller0 entered promiscuous mode [ 147.530296][ T3491] device pim6reg1 entered promiscuous mode [ 148.650082][ T3523] device veth1_to_bond entered promiscuous mode [ 149.217283][ T3542] device syzkaller0 entered promiscuous mode [ 152.857921][ T3626] tap0: tun_chr_ioctl cmd 1074812118 [ 156.633930][ T3709] device syzkaller0 entered promiscuous mode [ 156.810370][ T3715] device syzkaller0 entered promiscuous mode [ 160.320832][ T3763] device syzkaller0 entered promiscuous mode [ 160.720192][ T3788] FAULT_INJECTION: forcing a failure. [ 160.720192][ T3788] name failslab, interval 1, probability 0, space 0, times 0 [ 160.745040][ T3788] CPU: 1 PID: 3788 Comm: syz.3.1219 Not tainted syzkaller #0 [ 160.752748][ T3788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 160.762872][ T3788] Call Trace: [ 160.766155][ T3788] [ 160.769086][ T3788] __dump_stack+0x21/0x30 [ 160.773597][ T3788] dump_stack_lvl+0xee/0x150 [ 160.778277][ T3788] ? show_regs_print_info+0x20/0x20 [ 160.783483][ T3788] dump_stack+0x15/0x20 [ 160.787642][ T3788] should_fail+0x3c1/0x510 [ 160.792061][ T3788] __should_failslab+0xa4/0xe0 [ 160.796828][ T3788] should_failslab+0x9/0x20 [ 160.801341][ T3788] slab_pre_alloc_hook+0x3b/0xe0 [ 160.806283][ T3788] ? anon_vma_fork+0xf2/0x510 [ 160.811139][ T3788] kmem_cache_alloc+0x44/0x260 [ 160.815921][ T3788] anon_vma_fork+0xf2/0x510 [ 160.820432][ T3788] copy_mm+0x9d1/0x1390 [ 160.824610][ T3788] ? copy_signal+0x600/0x600 [ 160.829292][ T3788] ? __init_rwsem+0xfc/0x1d0 [ 160.833885][ T3788] ? copy_signal+0x4cb/0x600 [ 160.838482][ T3788] copy_process+0x115c/0x3210 [ 160.843401][ T3788] ? __kasan_check_write+0x14/0x20 [ 160.848547][ T3788] ? __pidfd_prepare+0x150/0x150 [ 160.853503][ T3788] ? security_file_permission+0x83/0xa0 [ 160.859066][ T3788] kernel_clone+0x23f/0x940 [ 160.863583][ T3788] ? create_io_thread+0x130/0x130 [ 160.868621][ T3788] ? __kasan_check_write+0x14/0x20 [ 160.873732][ T3788] ? mutex_unlock+0x89/0x220 [ 160.878327][ T3788] __x64_sys_clone+0x176/0x1d0 [ 160.883190][ T3788] ? __kasan_check_write+0x14/0x20 [ 160.888332][ T3788] ? __ia32_sys_vfork+0xf0/0xf0 [ 160.893210][ T3788] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 160.899301][ T3788] x64_sys_call+0x41f/0x9a0 [ 160.903831][ T3788] do_syscall_64+0x4c/0xa0 [ 160.908260][ T3788] ? clear_bhb_loop+0x50/0xa0 [ 160.912946][ T3788] ? clear_bhb_loop+0x50/0xa0 [ 160.917705][ T3788] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 160.923626][ T3788] RIP: 0033:0x7f43be641be9 [ 160.928052][ T3788] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 160.947973][ T3788] RSP: 002b:00007f43bd0a9fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 160.956402][ T3788] RAX: ffffffffffffffda RBX: 00007f43be878fa0 RCX: 00007f43be641be9 [ 160.964378][ T3788] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 160.972351][ T3788] RBP: 00007f43bd0aa090 R08: 0000000000000000 R09: 0000000000000000 [ 160.980326][ T3788] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 160.988299][ T3788] R13: 00007f43be879038 R14: 00007f43be878fa0 R15: 00007ffc7a21ff08 [ 160.996366][ T3788] [ 161.366157][ T3803] device syzkaller0 entered promiscuous mode [ 162.808467][ T3840] device syzkaller0 entered promiscuous mode [ 163.053419][ T3842] device syzkaller0 entered promiscuous mode [ 163.700212][ T30] audit: type=1400 audit(1756977847.309:135): avc: denied { create } for pid=3872 comm="syz.2.1249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 163.980790][ T3885] device syzkaller0 entered promiscuous mode [ 164.217350][ T3890] device syzkaller0 entered promiscuous mode [ 164.874039][ T3919] device syzkaller0 entered promiscuous mode [ 165.603959][ T3926] device syzkaller0 entered promiscuous mode [ 165.801707][ T3930] device syzkaller0 entered promiscuous mode [ 166.393013][ T3956] device syzkaller0 entered promiscuous mode [ 166.710200][ T3972] syz.4.1285[3972] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.710281][ T3972] syz.4.1285[3972] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.944390][ T30] audit: type=1400 audit(1756977851.559:136): avc: denied { create } for pid=4001 comm="syz.2.1296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 169.101735][ T4020] device sit0 left promiscuous mode [ 169.310900][ T4021] device sit0 entered promiscuous mode [ 170.648716][ T4039] device syzkaller0 entered promiscuous mode [ 171.644633][ T30] audit: type=1400 audit(1756977855.259:137): avc: denied { create } for pid=4060 comm="syz.2.1316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 172.150845][ T4071] device syzkaller0 entered promiscuous mode [ 172.385580][ T4079] device syzkaller0 entered promiscuous mode [ 172.638052][ T4092] device syzkaller0 entered promiscuous mode [ 173.916140][ T4123] device syzkaller0 entered promiscuous mode [ 174.761696][ T4149] device syzkaller0 entered promiscuous mode [ 175.428002][ T4170] syz.2.1355[4170] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.428079][ T4170] syz.2.1355[4170] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.558501][ T4175] syz.3.1357[4175] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.585673][ T4175] syz.3.1357[4175] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.835854][ T4189] device syzkaller0 entered promiscuous mode [ 176.845029][ T4213] device syzkaller0 entered promiscuous mode [ 177.707475][ T4234] device syzkaller0 entered promiscuous mode [ 178.030063][ T30] audit: type=1400 audit(1756977861.639:138): avc: denied { create } for pid=4249 comm="syz.0.1383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 178.217521][ T4253] device syzkaller0 entered promiscuous mode [ 178.269574][ T4257] device veth0_vlan left promiscuous mode [ 178.295055][ T4257] device veth0_vlan entered promiscuous mode [ 178.366881][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 178.383882][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 178.401743][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 179.122435][ T4283] device syzkaller0 entered promiscuous mode [ 180.021684][ T4322] device pim6reg1 entered promiscuous mode [ 180.344250][ T4324] device syzkaller0 entered promiscuous mode [ 182.047168][ T4377] FAULT_INJECTION: forcing a failure. [ 182.047168][ T4377] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 182.092718][ T4377] CPU: 0 PID: 4377 Comm: syz.0.1428 Not tainted syzkaller #0 [ 182.100149][ T4377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 182.110230][ T4377] Call Trace: [ 182.113527][ T4377] [ 182.116480][ T4377] __dump_stack+0x21/0x30 [ 182.120841][ T4377] dump_stack_lvl+0xee/0x150 [ 182.125462][ T4377] ? show_regs_print_info+0x20/0x20 [ 182.130723][ T4377] dump_stack+0x15/0x20 [ 182.134904][ T4377] should_fail+0x3c1/0x510 [ 182.139348][ T4377] should_fail_alloc_page+0x55/0x80 [ 182.144589][ T4377] prepare_alloc_pages+0x156/0x600 [ 182.149749][ T4377] ? __alloc_pages_bulk+0xab0/0xab0 [ 182.154992][ T4377] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 182.160689][ T4377] __alloc_pages+0x10a/0x440 [ 182.165317][ T4377] ? prep_new_page+0x110/0x110 [ 182.170216][ T4377] pcpu_populate_chunk+0x184/0xcb0 [ 182.175365][ T4377] ? _find_next_bit+0x1b5/0x200 [ 182.180246][ T4377] pcpu_alloc+0xc4d/0x1660 [ 182.184791][ T4377] __alloc_percpu_gfp+0x25/0x30 [ 182.189671][ T4377] bpf_map_alloc_percpu+0xc5/0x150 [ 182.194814][ T4377] array_map_alloc+0x39a/0x6d0 [ 182.199701][ T4377] map_create+0x455/0x21b0 [ 182.204145][ T4377] __sys_bpf+0x2cf/0x730 [ 182.208435][ T4377] ? bpf_link_show_fdinfo+0x310/0x310 [ 182.213839][ T4377] ? debug_smp_processor_id+0x17/0x20 [ 182.219245][ T4377] __x64_sys_bpf+0x7c/0x90 [ 182.223781][ T4377] x64_sys_call+0x4b9/0x9a0 [ 182.228314][ T4377] do_syscall_64+0x4c/0xa0 [ 182.232760][ T4377] ? clear_bhb_loop+0x50/0xa0 [ 182.237572][ T4377] ? clear_bhb_loop+0x50/0xa0 [ 182.242289][ T4377] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 182.248230][ T4377] RIP: 0033:0x7f5e2d792be9 [ 182.252772][ T4377] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 182.272495][ T4377] RSP: 002b:00007f5e2c1fb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 182.280945][ T4377] RAX: ffffffffffffffda RBX: 00007f5e2d9c9fa0 RCX: 00007f5e2d792be9 [ 182.288952][ T4377] RDX: 0000000000000048 RSI: 0000200000000b00 RDI: 2000000000000000 [ 182.296959][ T4377] RBP: 00007f5e2c1fb090 R08: 0000000000000000 R09: 0000000000000000 [ 182.305064][ T4377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 182.313159][ T4377] R13: 00007f5e2d9ca038 R14: 00007f5e2d9c9fa0 R15: 00007fff52aad1d8 [ 182.321356][ T4377] [ 182.397004][ T4364] device syzkaller0 entered promiscuous mode [ 182.924789][ T4394] device syzkaller0 entered promiscuous mode [ 183.871662][ T4425] device syzkaller0 entered promiscuous mode [ 183.886445][ T4428] bond_slave_1: mtu less than device minimum [ 185.601013][ T4498] device syzkaller0 entered promiscuous mode [ 187.032360][ T4531] FAULT_INJECTION: forcing a failure. [ 187.032360][ T4531] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 187.062741][ T4531] CPU: 1 PID: 4531 Comm: syz.2.1487 Not tainted syzkaller #0 [ 187.070263][ T4531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 187.080420][ T4531] Call Trace: [ 187.083712][ T4531] [ 187.086653][ T4531] __dump_stack+0x21/0x30 [ 187.091007][ T4531] dump_stack_lvl+0xee/0x150 [ 187.095621][ T4531] ? show_regs_print_info+0x20/0x20 [ 187.100850][ T4531] ? 0xffffffffa0018ce8 [ 187.105028][ T4531] dump_stack+0x15/0x20 [ 187.109315][ T4531] should_fail+0x3c1/0x510 [ 187.113848][ T4531] should_fail_alloc_page+0x55/0x80 [ 187.119076][ T4531] prepare_alloc_pages+0x156/0x600 [ 187.124225][ T4531] ? __alloc_pages_bulk+0xab0/0xab0 [ 187.129542][ T4531] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 187.135211][ T4531] __alloc_pages+0x10a/0x440 [ 187.139930][ T4531] ? prep_new_page+0x110/0x110 [ 187.144723][ T4531] pcpu_populate_chunk+0x184/0xcb0 [ 187.149867][ T4531] ? _find_next_bit+0x1b5/0x200 [ 187.154945][ T4531] pcpu_alloc+0xc4d/0x1660 [ 187.159398][ T4531] __alloc_percpu_gfp+0x25/0x30 [ 187.164384][ T4531] bpf_map_alloc_percpu+0xc5/0x150 [ 187.169527][ T4531] array_map_alloc+0x39a/0x6d0 [ 187.174318][ T4531] map_create+0x455/0x21b0 [ 187.178762][ T4531] __sys_bpf+0x2cf/0x730 [ 187.183029][ T4531] ? bpf_link_show_fdinfo+0x310/0x310 [ 187.188550][ T4531] ? debug_smp_processor_id+0x17/0x20 [ 187.193962][ T4531] __x64_sys_bpf+0x7c/0x90 [ 187.198410][ T4531] x64_sys_call+0x4b9/0x9a0 [ 187.203023][ T4531] do_syscall_64+0x4c/0xa0 [ 187.207466][ T4531] ? clear_bhb_loop+0x50/0xa0 [ 187.212180][ T4531] ? clear_bhb_loop+0x50/0xa0 [ 187.216886][ T4531] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 187.222808][ T4531] RIP: 0033:0x7f11fbb79be9 [ 187.227401][ T4531] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 187.247241][ T4531] RSP: 002b:00007f11fa5e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 187.255771][ T4531] RAX: ffffffffffffffda RBX: 00007f11fbdb0fa0 RCX: 00007f11fbb79be9 [ 187.263764][ T4531] RDX: 0000000000000048 RSI: 0000200000000b00 RDI: 2000000000000000 [ 187.271773][ T4531] RBP: 00007f11fa5e2090 R08: 0000000000000000 R09: 0000000000000000 [ 187.279862][ T4531] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 187.287836][ T4531] R13: 00007f11fbdb1038 R14: 00007f11fbdb0fa0 R15: 00007fff7e6de5c8 [ 187.295821][ T4531] [ 188.227510][ T4552] device syzkaller0 entered promiscuous mode [ 188.255180][ T4564] device veth1_macvtap left promiscuous mode [ 188.285559][ T4566] device veth1_macvtap entered promiscuous mode [ 188.312935][ T4566] device macsec0 entered promiscuous mode [ 188.484902][ T4575] FAULT_INJECTION: forcing a failure. [ 188.484902][ T4575] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 188.512828][ T4573] FAULT_INJECTION: forcing a failure. [ 188.512828][ T4573] name failslab, interval 1, probability 0, space 0, times 0 [ 188.517012][ T4575] CPU: 1 PID: 4575 Comm: syz.2.1502 Not tainted syzkaller #0 [ 188.532927][ T4575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 188.543095][ T4575] Call Trace: [ 188.546395][ T4575] [ 188.549348][ T4575] __dump_stack+0x21/0x30 [ 188.553793][ T4575] dump_stack_lvl+0xee/0x150 [ 188.558455][ T4575] ? show_regs_print_info+0x20/0x20 [ 188.563683][ T4575] ? get_page_from_freelist+0x2cc5/0x2d50 [ 188.569444][ T4575] dump_stack+0x15/0x20 [ 188.573632][ T4575] should_fail+0x3c1/0x510 [ 188.578110][ T4575] should_fail_alloc_page+0x55/0x80 [ 188.583378][ T4575] prepare_alloc_pages+0x156/0x600 [ 188.588690][ T4575] ? __alloc_pages_bulk+0xab0/0xab0 [ 188.593920][ T4575] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 188.599670][ T4575] __alloc_pages+0x10a/0x440 [ 188.604287][ T4575] ? prep_new_page+0x110/0x110 [ 188.609095][ T4575] pcpu_populate_chunk+0x184/0xcb0 [ 188.614367][ T4575] ? _find_next_bit+0x1b5/0x200 [ 188.619250][ T4575] pcpu_alloc+0xc4d/0x1660 [ 188.623799][ T4575] __alloc_percpu_gfp+0x25/0x30 [ 188.628765][ T4575] bpf_map_alloc_percpu+0xc5/0x150 [ 188.633911][ T4575] htab_map_alloc+0xc1b/0x14f0 [ 188.638799][ T4575] map_create+0x455/0x21b0 [ 188.643331][ T4575] __sys_bpf+0x2cf/0x730 [ 188.647724][ T4575] ? bpf_link_show_fdinfo+0x310/0x310 [ 188.653129][ T4575] ? debug_smp_processor_id+0x17/0x20 [ 188.658817][ T4575] __x64_sys_bpf+0x7c/0x90 [ 188.663353][ T4575] x64_sys_call+0x4b9/0x9a0 [ 188.667895][ T4575] do_syscall_64+0x4c/0xa0 [ 188.672345][ T4575] ? clear_bhb_loop+0x50/0xa0 [ 188.677052][ T4575] ? clear_bhb_loop+0x50/0xa0 [ 188.681860][ T4575] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 188.687798][ T4575] RIP: 0033:0x7f11fbb79be9 [ 188.692239][ T4575] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 188.711877][ T4575] RSP: 002b:00007f11fa5e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 188.720432][ T4575] RAX: ffffffffffffffda RBX: 00007f11fbdb0fa0 RCX: 00007f11fbb79be9 [ 188.728567][ T4575] RDX: 0000000000000050 RSI: 0000200000000380 RDI: 0000000000000000 [ 188.736565][ T4575] RBP: 00007f11fa5e2090 R08: 0000000000000000 R09: 0000000000000000 [ 188.744656][ T4575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 188.752847][ T4575] R13: 00007f11fbdb1038 R14: 00007f11fbdb0fa0 R15: 00007fff7e6de5c8 [ 188.761041][ T4575] [ 188.764388][ T4573] CPU: 0 PID: 4573 Comm: syz.3.1500 Not tainted syzkaller #0 [ 188.771813][ T4573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 188.782035][ T4573] Call Trace: [ 188.785376][ T4573] [ 188.788393][ T4573] __dump_stack+0x21/0x30 [ 188.792731][ T4573] dump_stack_lvl+0xee/0x150 [ 188.797325][ T4573] ? show_regs_print_info+0x20/0x20 [ 188.802618][ T4573] ? dev_queue_xmit+0x20/0x20 [ 188.807384][ T4573] dump_stack+0x15/0x20 [ 188.811543][ T4573] should_fail+0x3c1/0x510 [ 188.815998][ T4573] __should_failslab+0xa4/0xe0 [ 188.820893][ T4573] should_failslab+0x9/0x20 [ 188.825400][ T4573] slab_pre_alloc_hook+0x3b/0xe0 [ 188.830430][ T4573] ? skb_clone+0x1cf/0x360 [ 188.834985][ T4573] kmem_cache_alloc+0x44/0x260 [ 188.839954][ T4573] skb_clone+0x1cf/0x360 [ 188.844219][ T4573] bpf_clone_redirect+0xa7/0x380 [ 188.849173][ T4573] bpf_prog_6893982b85ceadf7+0x56/0xafc [ 188.854725][ T4573] ? __kasan_slab_alloc+0xcf/0xf0 [ 188.859868][ T4573] ? __kasan_slab_alloc+0xbd/0xf0 [ 188.864900][ T4573] ? slab_post_alloc_hook+0x4f/0x2b0 [ 188.870204][ T4573] ? kmem_cache_alloc+0xf7/0x260 [ 188.875141][ T4573] ? __build_skb+0x2d/0x310 [ 188.879642][ T4573] ? build_skb+0x24/0x200 [ 188.884108][ T4573] ? bpf_prog_test_run_skb+0x279/0x1150 [ 188.889676][ T4573] ? bpf_prog_test_run+0x3d5/0x620 [ 188.894804][ T4573] ? __sys_bpf+0x52c/0x730 [ 188.899235][ T4573] ? __x64_sys_bpf+0x7c/0x90 [ 188.904018][ T4573] ? x64_sys_call+0x4b9/0x9a0 [ 188.908701][ T4573] ? do_syscall_64+0x4c/0xa0 [ 188.913391][ T4573] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 188.919653][ T4573] ? __kasan_check_read+0x11/0x20 [ 188.924684][ T4573] ? bpf_test_timer_continue+0x146/0x4a0 [ 188.930323][ T4573] bpf_test_run+0x33d/0x8d0 [ 188.934837][ T4573] ? convert___skb_to_skb+0x4f0/0x4f0 [ 188.940212][ T4573] ? eth_get_headlen+0x1f0/0x1f0 [ 188.945165][ T4573] ? convert___skb_to_skb+0x41/0x4f0 [ 188.950485][ T4573] bpf_prog_test_run_skb+0x9ec/0x1150 [ 188.955885][ T4573] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 188.961982][ T4573] bpf_prog_test_run+0x3d5/0x620 [ 188.967078][ T4573] ? bpf_prog_query+0x230/0x230 [ 188.971934][ T4573] ? selinux_bpf+0xce/0xf0 [ 188.976356][ T4573] ? security_bpf+0x82/0xa0 [ 188.980869][ T4573] __sys_bpf+0x52c/0x730 [ 188.985203][ T4573] ? bpf_link_show_fdinfo+0x310/0x310 [ 188.990584][ T4573] ? debug_smp_processor_id+0x17/0x20 [ 188.995968][ T4573] __x64_sys_bpf+0x7c/0x90 [ 189.000388][ T4573] x64_sys_call+0x4b9/0x9a0 [ 189.004920][ T4573] do_syscall_64+0x4c/0xa0 [ 189.009347][ T4573] ? clear_bhb_loop+0x50/0xa0 [ 189.014100][ T4573] ? clear_bhb_loop+0x50/0xa0 [ 189.018788][ T4573] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 189.024701][ T4573] RIP: 0033:0x7f43be641be9 [ 189.029119][ T4573] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 189.048736][ T4573] RSP: 002b:00007f43bd0aa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 189.057171][ T4573] RAX: ffffffffffffffda RBX: 00007f43be878fa0 RCX: 00007f43be641be9 [ 189.065345][ T4573] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 189.073335][ T4573] RBP: 00007f43bd0aa090 R08: 0000000000000000 R09: 0000000000000000 [ 189.081312][ T4573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 189.089385][ T4573] R13: 00007f43be879038 R14: 00007f43be878fa0 R15: 00007ffc7a21ff08 [ 189.097373][ T4573] [ 193.326524][ T4718] device syzkaller0 entered promiscuous mode [ 193.426189][ T4731] device veth1_macvtap left promiscuous mode [ 193.447240][ T4731] device veth1_macvtap entered promiscuous mode [ 193.453760][ T4731] device macsec0 entered promiscuous mode [ 193.554475][ T30] audit: type=1400 audit(1756977877.169:139): avc: denied { create } for pid=4733 comm="syz.0.1557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 194.485778][ T4774] FAULT_INJECTION: forcing a failure. [ 194.485778][ T4774] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 194.535035][ T4774] CPU: 1 PID: 4774 Comm: syz.0.1573 Not tainted syzkaller #0 [ 194.542477][ T4774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 194.552716][ T4774] Call Trace: [ 194.556016][ T4774] [ 194.559064][ T4774] __dump_stack+0x21/0x30 [ 194.563515][ T4774] dump_stack_lvl+0xee/0x150 [ 194.568140][ T4774] ? show_regs_print_info+0x20/0x20 [ 194.573364][ T4774] ? migrate_enable+0x192/0x260 [ 194.578265][ T4774] ? migrate_disable+0x180/0x180 [ 194.583236][ T4774] dump_stack+0x15/0x20 [ 194.587427][ T4774] should_fail+0x3c1/0x510 [ 194.589493][ T4760] device syzkaller0 entered promiscuous mode [ 194.591979][ T4774] should_fail_usercopy+0x1a/0x20 [ 194.592005][ T4774] _copy_from_user+0x20/0xd0 [ 194.592033][ T4774] generic_map_update_batch+0x44f/0x740 [ 194.592063][ T4774] ? generic_map_delete_batch+0x510/0x510 [ 194.592090][ T4774] ? __fdget+0x1a1/0x230 [ 194.592114][ T4774] ? generic_map_delete_batch+0x510/0x510 [ 194.592138][ T4774] bpf_map_do_batch+0x463/0x5f0 [ 194.592161][ T4774] __sys_bpf+0x5e3/0x730 [ 194.592180][ T4774] ? bpf_link_show_fdinfo+0x310/0x310 [ 194.592201][ T4774] ? bpf_trace_run2+0xb5/0x1b0 [ 194.592228][ T4774] ? __bpf_trace_sys_enter+0x62/0x70 [ 194.592249][ T4774] __x64_sys_bpf+0x7c/0x90 [ 194.592270][ T4774] x64_sys_call+0x4b9/0x9a0 [ 194.592291][ T4774] do_syscall_64+0x4c/0xa0 [ 194.592313][ T4774] ? clear_bhb_loop+0x50/0xa0 [ 194.592336][ T4774] ? clear_bhb_loop+0x50/0xa0 [ 194.592359][ T4774] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 194.683457][ T4774] RIP: 0033:0x7f5e2d792be9 [ 194.687904][ T4774] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 194.707717][ T4774] RSP: 002b:00007f5e2c1fb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 194.716391][ T4774] RAX: ffffffffffffffda RBX: 00007f5e2d9c9fa0 RCX: 00007f5e2d792be9 [ 194.724481][ T4774] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 194.732479][ T4774] RBP: 00007f5e2c1fb090 R08: 0000000000000000 R09: 0000000000000000 [ 194.740475][ T4774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 194.748476][ T4774] R13: 00007f5e2d9ca038 R14: 00007f5e2d9c9fa0 R15: 00007fff52aad1d8 [ 194.756488][ T4774] [ 197.373851][ T4829] device syzkaller0 entered promiscuous mode [ 200.166376][ T4893] syz.4.1613[4893] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.166456][ T4893] syz.4.1613[4893] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.179517][ T4891] device wg2 left promiscuous mode [ 200.315001][ T4894] bridge0: port 3(veth0) entered blocking state [ 200.321959][ T4894] bridge0: port 3(veth0) entered disabled state [ 200.329253][ T4894] device veth0 entered promiscuous mode [ 201.007874][ T4910] device syzkaller0 entered promiscuous mode [ 202.355567][ T4929] device syzkaller0 entered promiscuous mode [ 203.121014][ T4950] device syzkaller0 entered promiscuous mode [ 206.205635][ T4983] FAULT_INJECTION: forcing a failure. [ 206.205635][ T4983] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 206.251631][ T4983] CPU: 1 PID: 4983 Comm: syz.3.1642 Not tainted syzkaller #0 [ 206.259154][ T4983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 206.269439][ T4983] Call Trace: [ 206.272825][ T4983] [ 206.275780][ T4983] __dump_stack+0x21/0x30 [ 206.280143][ T4983] dump_stack_lvl+0xee/0x150 [ 206.284767][ T4983] ? show_regs_print_info+0x20/0x20 [ 206.289997][ T4983] ? _raw_spin_lock+0x8e/0xe0 [ 206.294703][ T4983] ? _raw_spin_trylock_bh+0x130/0x130 [ 206.300097][ T4983] dump_stack+0x15/0x20 [ 206.304278][ T4983] should_fail+0x3c1/0x510 [ 206.308757][ T4983] should_fail_alloc_page+0x55/0x80 [ 206.313984][ T4983] prepare_alloc_pages+0x156/0x600 [ 206.319158][ T4983] ? __alloc_pages_bulk+0xab0/0xab0 [ 206.324371][ T4983] ? fault_around_bytes_set+0xc0/0xc0 [ 206.329754][ T4983] __alloc_pages+0x10a/0x440 [ 206.334353][ T4983] ? prep_new_page+0x110/0x110 [ 206.339233][ T4983] shmem_alloc_and_acct_page+0x42b/0x870 [ 206.344874][ T4983] ? shmem_swapin_page+0x14c0/0x14c0 [ 206.350169][ T4983] ? xas_load+0x2ea/0x300 [ 206.354513][ T4983] ? pagecache_get_page+0xcbd/0xda0 [ 206.359721][ T4983] ? page_cache_prev_miss+0x270/0x270 [ 206.365101][ T4983] shmem_getpage_gfp+0xfe5/0x2310 [ 206.370150][ T4983] shmem_write_begin+0xce/0x1b0 [ 206.375002][ T4983] generic_perform_write+0x2ad/0x670 [ 206.380291][ T4983] ? grab_cache_page_write_begin+0xb0/0xb0 [ 206.386208][ T4983] ? file_remove_privs+0x590/0x590 [ 206.391409][ T4983] ? rwsem_write_trylock+0x130/0x300 [ 206.396699][ T4983] ? clear_nonspinnable+0x60/0x60 [ 206.401730][ T4983] ? avc_policy_seqno+0x1b/0x70 [ 206.406615][ T4983] __generic_file_write_iter+0x268/0x480 [ 206.412276][ T4983] generic_file_write_iter+0xa9/0x1d0 [ 206.417656][ T4983] vfs_write+0x802/0xf70 [ 206.421919][ T4983] ? file_end_write+0x1b0/0x1b0 [ 206.426858][ T4983] ? wait_for_completion_killable_timeout+0x10/0x10 [ 206.433536][ T4983] ? __fget_files+0x2c4/0x320 [ 206.438226][ T4983] ? __fdget_pos+0x2d2/0x380 [ 206.442820][ T4983] ? ksys_write+0x71/0x240 [ 206.447240][ T4983] ksys_write+0x140/0x240 [ 206.451677][ T4983] ? __ia32_sys_read+0x90/0x90 [ 206.456443][ T4983] ? debug_smp_processor_id+0x17/0x20 [ 206.461855][ T4983] __x64_sys_write+0x7b/0x90 [ 206.466559][ T4983] x64_sys_call+0x8ef/0x9a0 [ 206.471149][ T4983] do_syscall_64+0x4c/0xa0 [ 206.475565][ T4983] ? clear_bhb_loop+0x50/0xa0 [ 206.480247][ T4983] ? clear_bhb_loop+0x50/0xa0 [ 206.485282][ T4983] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 206.491185][ T4983] RIP: 0033:0x7f43be641be9 [ 206.495606][ T4983] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 206.515515][ T4983] RSP: 002b:00007f43bd0aa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 206.524034][ T4983] RAX: ffffffffffffffda RBX: 00007f43be878fa0 RCX: 00007f43be641be9 [ 206.532017][ T4983] RDX: 00000000002a979d RSI: 0000200000000000 RDI: 0000000000000003 [ 206.540179][ T4983] RBP: 00007f43bd0aa090 R08: 0000000000000000 R09: 0000000000000000 [ 206.548156][ T4983] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 206.556134][ T4983] R13: 00007f43be879038 R14: 00007f43be878fa0 R15: 00007ffc7a21ff08 [ 206.564326][ T4983] [ 206.757276][ T5001] bridge0: port 3(veth0) entered blocking state [ 206.771018][ T5001] bridge0: port 3(veth0) entered disabled state [ 206.813222][ T5001] device veth0 entered promiscuous mode [ 208.600752][ T5057] device syzkaller0 entered promiscuous mode [ 208.711839][ T5057] device pim6reg1 entered promiscuous mode [ 209.760067][ T5082] device pim6reg1 entered promiscuous mode [ 209.852190][ T5103] FAULT_INJECTION: forcing a failure. [ 209.852190][ T5103] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 209.866424][ T5103] CPU: 1 PID: 5103 Comm: syz.0.1685 Not tainted syzkaller #0 [ 209.873931][ T5103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 209.884011][ T5103] Call Trace: [ 209.887306][ T5103] [ 209.890341][ T5103] __dump_stack+0x21/0x30 [ 209.894683][ T5103] dump_stack_lvl+0xee/0x150 [ 209.899281][ T5103] ? show_regs_print_info+0x20/0x20 [ 209.904569][ T5103] ? vfs_write+0xc17/0xf70 [ 209.908999][ T5103] dump_stack+0x15/0x20 [ 209.913329][ T5103] should_fail+0x3c1/0x510 [ 209.917845][ T5103] should_fail_usercopy+0x1a/0x20 [ 209.922895][ T5103] _copy_from_user+0x20/0xd0 [ 209.927502][ T5103] __sys_bpf+0x233/0x730 [ 209.931836][ T5103] ? bpf_link_show_fdinfo+0x310/0x310 [ 209.937303][ T5103] ? debug_smp_processor_id+0x17/0x20 [ 209.942857][ T5103] __x64_sys_bpf+0x7c/0x90 [ 209.947401][ T5103] x64_sys_call+0x4b9/0x9a0 [ 209.951913][ T5103] do_syscall_64+0x4c/0xa0 [ 209.956339][ T5103] ? clear_bhb_loop+0x50/0xa0 [ 209.961020][ T5103] ? clear_bhb_loop+0x50/0xa0 [ 209.965753][ T5103] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 209.971746][ T5103] RIP: 0033:0x7f5e2d792be9 [ 209.976205][ T5103] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 209.995900][ T5103] RSP: 002b:00007f5e2c1fb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 210.004438][ T5103] RAX: ffffffffffffffda RBX: 00007f5e2d9c9fa0 RCX: 00007f5e2d792be9 [ 210.012505][ T5103] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 000000000000000a [ 210.020497][ T5103] RBP: 00007f5e2c1fb090 R08: 0000000000000000 R09: 0000000000000000 [ 210.028527][ T5103] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 210.036501][ T5103] R13: 00007f5e2d9ca038 R14: 00007f5e2d9c9fa0 R15: 00007fff52aad1d8 [ 210.044591][ T5103] [ 210.209866][ T5090] device syzkaller0 entered promiscuous mode [ 210.222429][ T5111] FAULT_INJECTION: forcing a failure. [ 210.222429][ T5111] name failslab, interval 1, probability 0, space 0, times 0 [ 210.235241][ T5111] CPU: 0 PID: 5111 Comm: syz.0.1687 Not tainted syzkaller #0 [ 210.242768][ T5111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 210.252853][ T5111] Call Trace: [ 210.256169][ T5111] [ 210.259124][ T5111] __dump_stack+0x21/0x30 [ 210.263494][ T5111] dump_stack_lvl+0xee/0x150 [ 210.268121][ T5111] ? show_regs_print_info+0x20/0x20 [ 210.273360][ T5111] ? dev_queue_xmit+0x20/0x20 [ 210.278070][ T5111] dump_stack+0x15/0x20 [ 210.282260][ T5111] should_fail+0x3c1/0x510 [ 210.286712][ T5111] __should_failslab+0xa4/0xe0 [ 210.291520][ T5111] should_failslab+0x9/0x20 [ 210.296057][ T5111] slab_pre_alloc_hook+0x3b/0xe0 [ 210.301032][ T5111] ? skb_clone+0x1cf/0x360 [ 210.305576][ T5111] kmem_cache_alloc+0x44/0x260 [ 210.310375][ T5111] skb_clone+0x1cf/0x360 [ 210.314655][ T5111] bpf_clone_redirect+0xa7/0x380 [ 210.319643][ T5111] bpf_prog_5af0f20e2961581c+0x56/0x510 [ 210.325231][ T5111] ? __kasan_slab_alloc+0xcf/0xf0 [ 210.330486][ T5111] ? __kasan_slab_alloc+0xbd/0xf0 [ 210.335547][ T5111] ? slab_post_alloc_hook+0x4f/0x2b0 [ 210.340871][ T5111] ? kmem_cache_alloc+0xf7/0x260 [ 210.345845][ T5111] ? __build_skb+0x2d/0x310 [ 210.350386][ T5111] ? build_skb+0x24/0x200 [ 210.354749][ T5111] ? bpf_prog_test_run_skb+0x279/0x1150 [ 210.360603][ T5111] ? bpf_prog_test_run+0x3d5/0x620 [ 210.365764][ T5111] ? __sys_bpf+0x52c/0x730 [ 210.370348][ T5111] ? __x64_sys_bpf+0x7c/0x90 [ 210.374984][ T5111] ? x64_sys_call+0x4b9/0x9a0 [ 210.379704][ T5111] ? do_syscall_64+0x4c/0xa0 [ 210.384369][ T5111] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 210.390682][ T5111] ? __kasan_check_read+0x11/0x20 [ 210.395833][ T5111] ? bpf_test_timer_continue+0x146/0x4a0 [ 210.401506][ T5111] bpf_test_run+0x33d/0x8d0 [ 210.406048][ T5111] ? convert___skb_to_skb+0x4f0/0x4f0 [ 210.411717][ T5111] ? eth_get_headlen+0x1f0/0x1f0 [ 210.416784][ T5111] ? convert___skb_to_skb+0x41/0x4f0 [ 210.422123][ T5111] bpf_prog_test_run_skb+0x9ec/0x1150 [ 210.427546][ T5111] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 210.433485][ T5111] bpf_prog_test_run+0x3d5/0x620 [ 210.438763][ T5111] ? bpf_prog_query+0x230/0x230 [ 210.443660][ T5111] ? selinux_bpf+0xce/0xf0 [ 210.448117][ T5111] ? security_bpf+0x82/0xa0 [ 210.452781][ T5111] __sys_bpf+0x52c/0x730 [ 210.457056][ T5111] ? bpf_link_show_fdinfo+0x310/0x310 [ 210.462587][ T5111] ? debug_smp_processor_id+0x17/0x20 [ 210.468003][ T5111] __x64_sys_bpf+0x7c/0x90 [ 210.472448][ T5111] x64_sys_call+0x4b9/0x9a0 [ 210.476987][ T5111] do_syscall_64+0x4c/0xa0 [ 210.481437][ T5111] ? clear_bhb_loop+0x50/0xa0 [ 210.486140][ T5111] ? clear_bhb_loop+0x50/0xa0 [ 210.490859][ T5111] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 210.496782][ T5111] RIP: 0033:0x7f5e2d792be9 [ 210.501313][ T5111] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 210.521120][ T5111] RSP: 002b:00007f5e2c1fb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 210.529592][ T5111] RAX: ffffffffffffffda RBX: 00007f5e2d9c9fa0 RCX: 00007f5e2d792be9 [ 210.537614][ T5111] RDX: 0000000000000050 RSI: 0000200000000380 RDI: 000000000000000a [ 210.545628][ T5111] RBP: 00007f5e2c1fb090 R08: 0000000000000000 R09: 0000000000000000 [ 210.553679][ T5111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 210.561691][ T5111] R13: 00007f5e2d9ca038 R14: 00007f5e2d9c9fa0 R15: 00007fff52aad1d8 [ 210.569778][ T5111] [ 210.914041][ T5117] syz.0.1688[5117] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.914121][ T5117] syz.0.1688[5117] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.200849][ T5181] syz.2.1714[5181] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.237272][ T5181] syz.2.1714[5181] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.671126][ T5220] FAULT_INJECTION: forcing a failure. [ 213.671126][ T5220] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 213.695907][ T5220] CPU: 1 PID: 5220 Comm: syz.3.1726 Not tainted syzkaller #0 [ 213.703326][ T5220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 213.713595][ T5220] Call Trace: [ 213.716984][ T5220] [ 213.719946][ T5220] __dump_stack+0x21/0x30 [ 213.724311][ T5220] dump_stack_lvl+0xee/0x150 [ 213.729036][ T5220] ? show_regs_print_info+0x20/0x20 [ 213.734517][ T5220] ? kasan_set_free_info+0x23/0x40 [ 213.739682][ T5220] dump_stack+0x15/0x20 [ 213.743959][ T5220] should_fail+0x3c1/0x510 [ 213.748583][ T5220] should_fail_usercopy+0x1a/0x20 [ 213.753656][ T5220] strncpy_from_user+0x24/0x2e0 [ 213.758693][ T5220] strncpy_from_user_nofault+0x73/0x150 [ 213.764590][ T5220] ? kfree_skbmem+0x10c/0x180 [ 213.769323][ T5220] bpf_probe_read_user_str+0x2a/0x70 [ 213.774613][ T5220] bpf_prog_78f9c3f13797e2ae+0x35/0x21c [ 213.780174][ T5220] bpf_trace_run3+0xcc/0x1e0 [ 213.784782][ T5220] ? bpf_trace_run2+0x1b0/0x1b0 [ 213.789678][ T5220] ? kfree_skbmem+0x10c/0x180 [ 213.794376][ T5220] ? debug_smp_processor_id+0x17/0x20 [ 213.799753][ T5220] ? kasan_quarantine_put+0x34/0x190 [ 213.805045][ T5220] ? kmem_cache_free+0x100/0x320 [ 213.809989][ T5220] ? kfree_skbmem+0x10c/0x180 [ 213.814669][ T5220] ? kfree_skbmem+0x10c/0x180 [ 213.819449][ T5220] __bpf_trace_kmem_cache_free+0x99/0xc0 [ 213.825092][ T5220] ? kfree_skbmem+0x10c/0x180 [ 213.829791][ T5220] __traceiter_kmem_cache_free+0x34/0x50 [ 213.835518][ T5220] kmem_cache_free+0x2f8/0x320 [ 213.840289][ T5220] ? skb_release_data+0x814/0xa10 [ 213.845318][ T5220] kfree_skbmem+0x10c/0x180 [ 213.849829][ T5220] kfree_skb+0xc1/0x2f0 [ 213.854000][ T5220] tsk_advance_rx_queue+0x106/0x240 [ 213.859219][ T5220] tipc_recvmsg+0xb73/0x13a0 [ 213.863815][ T5220] ? tipc_send_packet+0xa0/0xa0 [ 213.868667][ T5220] ? irqentry_exit+0x37/0x40 [ 213.873282][ T5220] ? security_socket_recvmsg+0x87/0xb0 [ 213.878748][ T5220] ? tipc_send_packet+0xa0/0xa0 [ 213.883603][ T5220] ____sys_recvmsg+0x291/0x580 [ 213.888375][ T5220] ? __sys_recvmsg_sock+0x50/0x50 [ 213.893496][ T5220] ? memset+0x35/0x40 [ 213.897493][ T5220] ? import_iovec+0x7c/0xb0 [ 213.902086][ T5220] ___sys_recvmsg+0x1af/0x4f0 [ 213.906871][ T5220] ? __sys_recvmsg+0x250/0x250 [ 213.911671][ T5220] ? vfs_write+0xc17/0xf70 [ 213.916193][ T5220] ? __fdget+0x1a1/0x230 [ 213.920638][ T5220] __x64_sys_recvmsg+0x1df/0x2a0 [ 213.925583][ T5220] ? ___sys_recvmsg+0x4f0/0x4f0 [ 213.930453][ T5220] ? ksys_write+0x1eb/0x240 [ 213.934967][ T5220] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 213.941148][ T5220] x64_sys_call+0x705/0x9a0 [ 213.945919][ T5220] do_syscall_64+0x4c/0xa0 [ 213.950467][ T5220] ? clear_bhb_loop+0x50/0xa0 [ 213.955237][ T5220] ? clear_bhb_loop+0x50/0xa0 [ 213.959919][ T5220] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 213.965844][ T5220] RIP: 0033:0x7f43be641be9 [ 213.970402][ T5220] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 213.990213][ T5220] RSP: 002b:00007f43bd0aa038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 213.998729][ T5220] RAX: ffffffffffffffda RBX: 00007f43be878fa0 RCX: 00007f43be641be9 [ 214.006798][ T5220] RDX: 00000000000040fd RSI: 0000200000000200 RDI: 0000000000000005 [ 214.014778][ T5220] RBP: 00007f43bd0aa090 R08: 0000000000000000 R09: 0000000000000000 [ 214.022766][ T5220] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 214.030750][ T5220] R13: 00007f43be879038 R14: 00007f43be878fa0 R15: 00007ffc7a21ff08 [ 214.038740][ T5220] [ 216.383108][ T5271] syz.3.1746[5271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.383191][ T5271] syz.3.1746[5271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.576269][ T30] audit: type=1400 audit(1756977900.189:140): avc: denied { associate } for pid=5278 comm="syz.1.1749" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 218.899386][ T5327] device veth0_vlan left promiscuous mode [ 218.913479][ T5327] device veth0_vlan entered promiscuous mode [ 219.000825][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 219.010028][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 219.018690][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 222.651828][ T5413] ÿÿÿÿÿÿ: renamed from vlan1 [ 222.793762][ T5422] syz.2.1801[5422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.793838][ T5422] syz.2.1801[5422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.157667][ T5450] device pim6reg1 entered promiscuous mode [ 224.558398][ T5458] device sit0 entered promiscuous mode [ 224.676797][ T5460] syz.4.1815[5460] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.676877][ T5460] syz.4.1815[5460] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.069731][ T5466] device syzkaller0 entered promiscuous mode [ 225.484084][ T5478] device syzkaller0 entered promiscuous mode [ 227.456691][ T5509] device syzkaller0 entered promiscuous mode [ 227.824777][ T5524] device sit0 left promiscuous mode [ 228.388670][ T5528] device syzkaller0 entered promiscuous mode [ 231.788480][ T5646] device wg2 left promiscuous mode [ 231.916542][ T5646] device wg2 entered promiscuous mode [ 233.132954][ T5688] syz.0.1892[5688] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.133034][ T5688] syz.0.1892[5688] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.365818][ T5694] device syzkaller0 entered promiscuous mode [ 234.796930][ T5767] syz.0.1924[5767] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.797017][ T5767] syz.0.1924[5767] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.000630][ T5772] FAULT_INJECTION: forcing a failure. [ 235.000630][ T5772] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 235.142397][ T5772] CPU: 0 PID: 5772 Comm: syz.0.1925 Not tainted syzkaller #0 [ 235.149849][ T5772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 235.159925][ T5772] Call Trace: [ 235.163220][ T5772] [ 235.166208][ T5772] __dump_stack+0x21/0x30 [ 235.170561][ T5772] dump_stack_lvl+0xee/0x150 [ 235.175260][ T5772] ? show_regs_print_info+0x20/0x20 [ 235.180480][ T5772] ? get_page_from_freelist+0x2cc5/0x2d50 [ 235.186226][ T5772] dump_stack+0x15/0x20 [ 235.190404][ T5772] should_fail+0x3c1/0x510 [ 235.194841][ T5772] should_fail_alloc_page+0x55/0x80 [ 235.200325][ T5772] prepare_alloc_pages+0x156/0x600 [ 235.205461][ T5772] ? __alloc_pages_bulk+0xab0/0xab0 [ 235.210772][ T5772] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 235.216436][ T5772] __alloc_pages+0x10a/0x440 [ 235.221046][ T5772] ? prep_new_page+0x110/0x110 [ 235.225842][ T5772] pcpu_populate_chunk+0x184/0xcb0 [ 235.230977][ T5772] ? _find_next_bit+0x1b5/0x200 [ 235.236060][ T5772] pcpu_alloc+0xc4d/0x1660 [ 235.240506][ T5772] __alloc_percpu_gfp+0x25/0x30 [ 235.245378][ T5772] bpf_map_alloc_percpu+0xc5/0x150 [ 235.250613][ T5772] htab_map_alloc+0xc1b/0x14f0 [ 235.255402][ T5772] map_create+0x455/0x21b0 [ 235.259841][ T5772] __sys_bpf+0x2cf/0x730 [ 235.264099][ T5772] ? bpf_link_show_fdinfo+0x310/0x310 [ 235.269493][ T5772] ? debug_smp_processor_id+0x17/0x20 [ 235.274889][ T5772] __x64_sys_bpf+0x7c/0x90 [ 235.279323][ T5772] x64_sys_call+0x4b9/0x9a0 [ 235.283844][ T5772] do_syscall_64+0x4c/0xa0 [ 235.288631][ T5772] ? clear_bhb_loop+0x50/0xa0 [ 235.293339][ T5772] ? clear_bhb_loop+0x50/0xa0 [ 235.298040][ T5772] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 235.303958][ T5772] RIP: 0033:0x7f5e2d792be9 [ 235.308434][ T5772] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 235.328261][ T5772] RSP: 002b:00007f5e2c1fb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 235.336829][ T5772] RAX: ffffffffffffffda RBX: 00007f5e2d9c9fa0 RCX: 00007f5e2d792be9 [ 235.344835][ T5772] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 235.352858][ T5772] RBP: 00007f5e2c1fb090 R08: 0000000000000000 R09: 0000000000000000 [ 235.361043][ T5772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 235.369142][ T5772] R13: 00007f5e2d9ca038 R14: 00007f5e2d9c9fa0 R15: 00007fff52aad1d8 [ 235.377143][ T5772] [ 235.767582][ T5783] device wg2 left promiscuous mode [ 236.604533][ T5795] device veth1_macvtap left promiscuous mode [ 236.838472][ T5807] syz.4.1936[5807] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.838545][ T5807] syz.4.1936[5807] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.343589][ T5810] device syzkaller0 entered promiscuous mode [ 241.439588][ T5929] device veth1_macvtap left promiscuous mode [ 241.445968][ T5929] device macsec0 left promiscuous mode [ 241.488231][ T5933] device veth1_macvtap entered promiscuous mode [ 241.513404][ T5933] device macsec0 entered promiscuous mode [ 241.661534][ T5937] device syzkaller0 entered promiscuous mode [ 242.365686][ T5977] syz.3.1992[5977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.365762][ T5977] syz.3.1992[5977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.845618][ T5996] device sit0 left promiscuous mode [ 242.912194][ T5996] device sit0 entered promiscuous mode [ 247.100066][ T6075] syz.0.2024[6075] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.100144][ T6075] syz.0.2024[6075] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.664553][ T6116] syz.1.2037[6116] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.747404][ T6116] syz.1.2037[6116] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.068675][ T6132] device syzkaller0 entered promiscuous mode [ 254.227647][ T6231] device syzkaller0 entered promiscuous mode [ 254.462999][ T6242] device syzkaller0 entered promiscuous mode [ 260.300453][ T6366] device syzkaller0 entered promiscuous mode [ 262.576552][ T6374] device sit0 entered promiscuous mode [ 262.993621][ T6397] syz.0.2126[6397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.993703][ T6397] syz.0.2126[6397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.868738][ T6412] syz.0.2132[6412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.952005][ T6412] syz.0.2132[6412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.970839][ T6403] device syzkaller0 entered promiscuous mode [ 268.449541][ T6524] device syzkaller0 entered promiscuous mode [ 270.358193][ T6559] syz.1.2182[6559] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.358277][ T6559] syz.1.2182[6559] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.046533][ T30] audit: type=1400 audit(1756977954.659:141): avc: denied { create } for pid=6573 comm="syz.2.2189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 272.189127][ T6583] device syzkaller0 entered promiscuous mode [ 272.376421][ T6597] syz.1.2196[6597] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.376501][ T6597] syz.1.2196[6597] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.527518][ T30] audit: type=1400 audit(1756977959.139:142): avc: denied { create } for pid=6665 comm="syz.1.2217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 278.633018][ T6754] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 278.638900][ T6754] pim6reg0: linktype set to 6 [ 278.673404][ T30] audit: type=1400 audit(1756977962.289:143): avc: denied { create } for pid=6753 comm="syz.1.2245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 280.820170][ T6791] FAULT_INJECTION: forcing a failure. [ 280.820170][ T6791] name failslab, interval 1, probability 0, space 0, times 0 [ 280.932675][ T6791] CPU: 0 PID: 6791 Comm: syz.2.2258 Not tainted syzkaller #0 [ 280.940111][ T6791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 280.950400][ T6791] Call Trace: [ 280.954077][ T6791] [ 280.957040][ T6791] __dump_stack+0x21/0x30 [ 280.961404][ T6791] dump_stack_lvl+0xee/0x150 [ 280.966019][ T6791] ? show_regs_print_info+0x20/0x20 [ 280.971248][ T6791] ? kasan_set_track+0x5b/0x70 [ 280.976286][ T6791] ? kasan_set_free_info+0x23/0x40 [ 280.981430][ T6791] ? ____kasan_slab_free+0x125/0x160 [ 280.986963][ T6791] ? __kasan_slab_free+0x11/0x20 [ 280.991959][ T6791] ? slab_free_freelist_hook+0xc2/0x190 [ 280.997554][ T6791] dump_stack+0x15/0x20 [ 281.001744][ T6791] should_fail+0x3c1/0x510 [ 281.006226][ T6791] __should_failslab+0xa4/0xe0 [ 281.011035][ T6791] should_failslab+0x9/0x20 [ 281.015573][ T6791] slab_pre_alloc_hook+0x3b/0xe0 [ 281.020642][ T6791] __kmalloc+0x6d/0x2c0 [ 281.025150][ T6791] ? bpf_test_init+0x100/0x1c0 [ 281.029946][ T6791] bpf_test_init+0x100/0x1c0 [ 281.034574][ T6791] bpf_prog_test_run_skb+0x193/0x1150 [ 281.040068][ T6791] ? __kasan_check_write+0x14/0x20 [ 281.045210][ T6791] ? fput_many+0x15a/0x1a0 [ 281.049664][ T6791] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 281.055607][ T6791] bpf_prog_test_run+0x3d5/0x620 [ 281.060603][ T6791] ? bpf_prog_query+0x230/0x230 [ 281.065580][ T6791] ? selinux_bpf+0xce/0xf0 [ 281.070066][ T6791] ? security_bpf+0x82/0xa0 [ 281.074589][ T6791] __sys_bpf+0x52c/0x730 [ 281.078958][ T6791] ? bpf_link_show_fdinfo+0x310/0x310 [ 281.084365][ T6791] ? debug_smp_processor_id+0x17/0x20 [ 281.089774][ T6791] __x64_sys_bpf+0x7c/0x90 [ 281.094212][ T6791] x64_sys_call+0x4b9/0x9a0 [ 281.098735][ T6791] do_syscall_64+0x4c/0xa0 [ 281.103197][ T6791] ? clear_bhb_loop+0x50/0xa0 [ 281.107902][ T6791] ? clear_bhb_loop+0x50/0xa0 [ 281.112605][ T6791] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 281.118518][ T6791] RIP: 0033:0x7f11fbb79be9 [ 281.122954][ T6791] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 281.142615][ T6791] RSP: 002b:00007f11fa5e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 281.151063][ T6791] RAX: ffffffffffffffda RBX: 00007f11fbdb0fa0 RCX: 00007f11fbb79be9 [ 281.159144][ T6791] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 281.167136][ T6791] RBP: 00007f11fa5e2090 R08: 0000000000000000 R09: 0000000000000000 [ 281.175213][ T6791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 281.183201][ T6791] R13: 00007f11fbdb1038 R14: 00007f11fbdb0fa0 R15: 00007fff7e6de5c8 [ 281.191547][ T6791] [ 281.321306][ T6794] syz.2.2259[6794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.321411][ T6794] syz.2.2259[6794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.066034][ T6807] device wg2 entered promiscuous mode [ 284.267061][ T6862] syz.4.2279[6862] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.267172][ T6862] syz.4.2279[6862] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.957773][ T6872] device syzkaller0 entered promiscuous mode [ 285.755039][ T6890] device wg2 entered promiscuous mode [ 285.916551][ T6896] syz.4.2291[6896] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 285.916627][ T6896] syz.4.2291[6896] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.828119][ T6956] device syzkaller0 entered promiscuous mode [ 289.429717][ T6979] FAULT_INJECTION: forcing a failure. [ 289.429717][ T6979] name failslab, interval 1, probability 0, space 0, times 0 [ 289.458386][ T6979] CPU: 0 PID: 6979 Comm: syz.3.2317 Not tainted syzkaller #0 [ 289.465823][ T6979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 289.475902][ T6979] Call Trace: [ 289.479250][ T6979] [ 289.482196][ T6979] __dump_stack+0x21/0x30 [ 289.486560][ T6979] dump_stack_lvl+0xee/0x150 [ 289.491176][ T6979] ? show_regs_print_info+0x20/0x20 [ 289.496398][ T6979] ? security_inode_alloc+0x33/0x110 [ 289.501712][ T6979] ? new_inode_pseudo+0x91/0x210 [ 289.506679][ T6979] ? new_inode+0x28/0x1e0 [ 289.511035][ T6979] ? proc_pid_make_inode+0x27/0x1d0 [ 289.516251][ T6979] ? proc_pident_lookup+0x1c0/0x270 [ 289.521517][ T6979] dump_stack+0x15/0x20 [ 289.525733][ T6979] should_fail+0x3c1/0x510 [ 289.530266][ T6979] __should_failslab+0xa4/0xe0 [ 289.535060][ T6979] should_failslab+0x9/0x20 [ 289.539682][ T6979] slab_pre_alloc_hook+0x3b/0xe0 [ 289.544667][ T6979] ? __alloc_skb+0xe0/0x740 [ 289.549208][ T6979] kmem_cache_alloc+0x44/0x260 [ 289.554101][ T6979] __alloc_skb+0xe0/0x740 [ 289.558464][ T6979] tipc_msg_build+0xd1/0xfb0 [ 289.563076][ T6979] ? avc_has_perm_noaudit+0x2f4/0x460 [ 289.568579][ T6979] ? avc_denied+0x1b0/0x1b0 [ 289.573106][ T6979] __tipc_sendstream+0x8b3/0x11a0 [ 289.578141][ T6979] ? tsk_advance_rx_queue+0x240/0x240 [ 289.583522][ T6979] ? stack_trace_save+0x98/0xe0 [ 289.588396][ T6979] ? wait_woken+0x170/0x170 [ 289.592997][ T6979] tipc_send_packet+0x7c/0xa0 [ 289.597694][ T6979] ? tipc_sk_send_ack+0x630/0x630 [ 289.602723][ T6979] ____sys_sendmsg+0x5a2/0x8c0 [ 289.607684][ T6979] ? __sys_sendmsg_sock+0x40/0x40 [ 289.612718][ T6979] ? kstrtouint_from_user+0x1a0/0x200 [ 289.618108][ T6979] ? import_iovec+0x7c/0xb0 [ 289.622791][ T6979] ___sys_sendmsg+0x1f0/0x260 [ 289.627663][ T6979] ? __sys_sendmsg+0x250/0x250 [ 289.632538][ T6979] ? __fdget+0x1a1/0x230 [ 289.636961][ T6979] __x64_sys_sendmsg+0x1e2/0x2a0 [ 289.641909][ T6979] ? ___sys_sendmsg+0x260/0x260 [ 289.647046][ T6979] ? ksys_write+0x1eb/0x240 [ 289.651844][ T6979] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 289.658010][ T6979] x64_sys_call+0x4b/0x9a0 [ 289.662460][ T6979] do_syscall_64+0x4c/0xa0 [ 289.666969][ T6979] ? clear_bhb_loop+0x50/0xa0 [ 289.671660][ T6979] ? clear_bhb_loop+0x50/0xa0 [ 289.676351][ T6979] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 289.682261][ T6979] RIP: 0033:0x7f43be641be9 [ 289.686676][ T6979] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 289.706294][ T6979] RSP: 002b:00007f43bd0aa038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 289.714748][ T6979] RAX: ffffffffffffffda RBX: 00007f43be878fa0 RCX: 00007f43be641be9 [ 289.722729][ T6979] RDX: 0000000000000000 RSI: 00002000000003c0 RDI: 0000000000000005 [ 289.730743][ T6979] RBP: 00007f43bd0aa090 R08: 0000000000000000 R09: 0000000000000000 [ 289.738721][ T6979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 289.746695][ T6979] R13: 00007f43be879038 R14: 00007f43be878fa0 R15: 00007ffc7a21ff08 [ 289.754944][ T6979] [ 291.355411][ T7018] FAULT_INJECTION: forcing a failure. [ 291.355411][ T7018] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 291.492257][ T7018] CPU: 1 PID: 7018 Comm: syz.1.2329 Not tainted syzkaller #0 [ 291.499705][ T7018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 291.509960][ T7018] Call Trace: [ 291.513260][ T7018] [ 291.516221][ T7018] __dump_stack+0x21/0x30 [ 291.520583][ T7018] dump_stack_lvl+0xee/0x150 [ 291.525194][ T7018] ? show_regs_print_info+0x20/0x20 [ 291.530421][ T7018] ? __alloc_pages+0x27d/0x440 [ 291.535211][ T7018] dump_stack+0x15/0x20 [ 291.539401][ T7018] should_fail+0x3c1/0x510 [ 291.543861][ T7018] should_fail_usercopy+0x1a/0x20 [ 291.549005][ T7018] _copy_from_user+0x20/0xd0 [ 291.553639][ T7018] mem_rw+0x3c6/0x600 [ 291.557659][ T7018] mem_write+0x33/0x40 [ 291.561810][ T7018] ? mem_read+0x40/0x40 [ 291.566086][ T7018] vfs_write+0x3ee/0xf70 [ 291.570376][ T7018] ? file_end_write+0x1b0/0x1b0 [ 291.575254][ T7018] ? __kasan_check_write+0x14/0x20 [ 291.580408][ T7018] ? mutex_lock+0x95/0x1a0 [ 291.584856][ T7018] ? wait_for_completion_killable_timeout+0x10/0x10 [ 291.591479][ T7018] ? __fget_files+0x2c4/0x320 [ 291.596194][ T7018] ? __fdget_pos+0x2d2/0x380 [ 291.600907][ T7018] ? ksys_write+0x71/0x240 [ 291.605439][ T7018] ksys_write+0x140/0x240 [ 291.609791][ T7018] ? __ia32_sys_read+0x90/0x90 [ 291.614578][ T7018] ? debug_smp_processor_id+0x17/0x20 [ 291.619981][ T7018] __x64_sys_write+0x7b/0x90 [ 291.624595][ T7018] x64_sys_call+0x8ef/0x9a0 [ 291.629121][ T7018] do_syscall_64+0x4c/0xa0 [ 291.633569][ T7018] ? clear_bhb_loop+0x50/0xa0 [ 291.638360][ T7018] ? clear_bhb_loop+0x50/0xa0 [ 291.643065][ T7018] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 291.648988][ T7018] RIP: 0033:0x7f36891d5be9 [ 291.653624][ T7018] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 291.673344][ T7018] RSP: 002b:00007f3687c3e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 291.682155][ T7018] RAX: ffffffffffffffda RBX: 00007f368940cfa0 RCX: 00007f36891d5be9 [ 291.690254][ T7018] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 [ 291.698260][ T7018] RBP: 00007f3687c3e090 R08: 0000000000000000 R09: 0000000000000000 [ 291.706285][ T7018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 291.714479][ T7018] R13: 00007f368940d038 R14: 00007f368940cfa0 R15: 00007ffed595c7c8 [ 291.722485][ T7018] [ 292.156137][ T7027] syz.1.2332[7027] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.156213][ T7027] syz.1.2332[7027] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.421300][ T7078] device veth0_vlan left promiscuous mode [ 293.553119][ T7078] device veth0_vlan entered promiscuous mode [ 293.667620][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 293.686258][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 293.723988][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 295.875825][ T7117] ªªªªªª: renamed from vlan0 [ 296.163093][ T7130] device sit0 entered promiscuous mode [ 300.294218][ T7165] device sit0 left promiscuous mode [ 301.298341][ T7185] device wg2 entered promiscuous mode [ 305.978857][ T7212] device veth0_vlan left promiscuous mode [ 306.021776][ T7212] device veth0_vlan entered promiscuous mode [ 306.075560][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 306.086121][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 306.094051][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 311.544056][ T7292] syz.4.2411[7292] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 311.544137][ T7292] syz.4.2411[7292] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 311.989086][ T7298] device syzkaller0 entered promiscuous mode [ 313.759947][ T7354] syz.3.2430[7354] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.760029][ T7354] syz.3.2430[7354] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.283871][ T7369] FAULT_INJECTION: forcing a failure. [ 314.283871][ T7369] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 314.314081][ T7369] CPU: 0 PID: 7369 Comm: syz.4.2436 Not tainted syzkaller #0 [ 314.321512][ T7369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 314.331669][ T7369] Call Trace: [ 314.334990][ T7369] [ 314.337949][ T7369] __dump_stack+0x21/0x30 [ 314.342397][ T7369] dump_stack_lvl+0xee/0x150 [ 314.347021][ T7369] ? show_regs_print_info+0x20/0x20 [ 314.352377][ T7369] dump_stack+0x15/0x20 [ 314.356552][ T7369] should_fail+0x3c1/0x510 [ 314.360988][ T7369] should_fail_alloc_page+0x55/0x80 [ 314.366209][ T7369] prepare_alloc_pages+0x156/0x600 [ 314.371517][ T7369] ? __alloc_pages_bulk+0xab0/0xab0 [ 314.376743][ T7369] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 314.382857][ T7369] __alloc_pages+0x10a/0x440 [ 314.387476][ T7369] ? prep_new_page+0x110/0x110 [ 314.392285][ T7369] pcpu_populate_chunk+0x184/0xcb0 [ 314.397428][ T7369] ? _find_next_bit+0x1b5/0x200 [ 314.402319][ T7369] pcpu_alloc+0xc4d/0x1660 [ 314.406769][ T7369] __alloc_percpu_gfp+0x25/0x30 [ 314.411639][ T7369] bpf_map_alloc_percpu+0xc5/0x150 [ 314.416782][ T7369] array_map_alloc+0x39a/0x6d0 [ 314.421576][ T7369] map_create+0x455/0x21b0 [ 314.426105][ T7369] __sys_bpf+0x2cf/0x730 [ 314.430368][ T7369] ? bpf_link_show_fdinfo+0x310/0x310 [ 314.435775][ T7369] ? debug_smp_processor_id+0x17/0x20 [ 314.441167][ T7369] __x64_sys_bpf+0x7c/0x90 [ 314.445597][ T7369] x64_sys_call+0x4b9/0x9a0 [ 314.450125][ T7369] do_syscall_64+0x4c/0xa0 [ 314.454558][ T7369] ? clear_bhb_loop+0x50/0xa0 [ 314.459259][ T7369] ? clear_bhb_loop+0x50/0xa0 [ 314.463949][ T7369] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 314.469951][ T7369] RIP: 0033:0x7f9c3840abe9 [ 314.474380][ T7369] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 314.494200][ T7369] RSP: 002b:00007f9c36e73038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 314.502646][ T7369] RAX: ffffffffffffffda RBX: 00007f9c38641fa0 RCX: 00007f9c3840abe9 [ 314.511170][ T7369] RDX: 0000000000000048 RSI: 0000200000000b00 RDI: 2000000000000000 [ 314.519251][ T7369] RBP: 00007f9c36e73090 R08: 0000000000000000 R09: 0000000000000000 [ 314.527231][ T7369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 314.535245][ T7369] R13: 00007f9c38642038 R14: 00007f9c38641fa0 R15: 00007ffc48a91758 [ 314.543231][ T7369] [ 315.698497][ T30] audit: type=1400 audit(1756977999.309:144): avc: denied { create } for pid=7400 comm="syz.2.2446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 317.113983][ T7434] device syzkaller0 entered promiscuous mode [ 317.237060][ T7440] device syzkaller0 entered promiscuous mode [ 319.376360][ T7485] device syzkaller0 entered promiscuous mode [ 320.243963][ T7536] syz.4.2488[7536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.244098][ T7536] syz.4.2488[7536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.430232][ T7547] FAULT_INJECTION: forcing a failure. [ 320.430232][ T7547] name failslab, interval 1, probability 0, space 0, times 0 [ 320.460486][ T7549] FAULT_INJECTION: forcing a failure. [ 320.460486][ T7549] name failslab, interval 1, probability 0, space 0, times 0 [ 320.511065][ T7549] CPU: 1 PID: 7549 Comm: syz.0.2492 Not tainted syzkaller #0 [ 320.518504][ T7549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 320.528757][ T7549] Call Trace: [ 320.532055][ T7549] [ 320.535008][ T7549] __dump_stack+0x21/0x30 [ 320.539345][ T7549] dump_stack_lvl+0xee/0x150 [ 320.543946][ T7549] ? show_regs_print_info+0x20/0x20 [ 320.549149][ T7549] ? dev_queue_xmit+0x20/0x20 [ 320.553827][ T7549] dump_stack+0x15/0x20 [ 320.558100][ T7549] should_fail+0x3c1/0x510 [ 320.562532][ T7549] __should_failslab+0xa4/0xe0 [ 320.567398][ T7549] should_failslab+0x9/0x20 [ 320.571911][ T7549] slab_pre_alloc_hook+0x3b/0xe0 [ 320.576856][ T7549] ? skb_clone+0x1cf/0x360 [ 320.581369][ T7549] kmem_cache_alloc+0x44/0x260 [ 320.586243][ T7549] skb_clone+0x1cf/0x360 [ 320.590494][ T7549] bpf_clone_redirect+0xa7/0x380 [ 320.595442][ T7549] bpf_prog_5af0f20e2961581c+0x56/0xbf0 [ 320.601052][ T7549] ? __kasan_slab_alloc+0xcf/0xf0 [ 320.606168][ T7549] ? __kasan_slab_alloc+0xbd/0xf0 [ 320.611308][ T7549] ? slab_post_alloc_hook+0x4f/0x2b0 [ 320.616940][ T7549] ? kmem_cache_alloc+0xf7/0x260 [ 320.621889][ T7549] ? __build_skb+0x2d/0x310 [ 320.626571][ T7549] ? build_skb+0x24/0x200 [ 320.630898][ T7549] ? bpf_prog_test_run_skb+0x279/0x1150 [ 320.636489][ T7549] ? bpf_prog_test_run+0x3d5/0x620 [ 320.641603][ T7549] ? __sys_bpf+0x52c/0x730 [ 320.646304][ T7549] ? __x64_sys_bpf+0x7c/0x90 [ 320.650908][ T7549] ? x64_sys_call+0x4b9/0x9a0 [ 320.655592][ T7549] ? do_syscall_64+0x4c/0xa0 [ 320.660184][ T7549] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 320.666265][ T7549] ? __kasan_check_read+0x11/0x20 [ 320.671506][ T7549] ? bpf_test_timer_continue+0x146/0x4a0 [ 320.677230][ T7549] bpf_test_run+0x33d/0x8d0 [ 320.681745][ T7549] ? convert___skb_to_skb+0x4f0/0x4f0 [ 320.687142][ T7549] ? eth_get_headlen+0x1f0/0x1f0 [ 320.692086][ T7549] ? convert___skb_to_skb+0x41/0x4f0 [ 320.697373][ T7549] bpf_prog_test_run_skb+0x9ec/0x1150 [ 320.702759][ T7549] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 320.708828][ T7549] bpf_prog_test_run+0x3d5/0x620 [ 320.713769][ T7549] ? bpf_prog_query+0x230/0x230 [ 320.718621][ T7549] ? selinux_bpf+0xce/0xf0 [ 320.723042][ T7549] ? security_bpf+0x82/0xa0 [ 320.727574][ T7549] __sys_bpf+0x52c/0x730 [ 320.731829][ T7549] ? bpf_link_show_fdinfo+0x310/0x310 [ 320.737211][ T7549] ? debug_smp_processor_id+0x17/0x20 [ 320.742591][ T7549] __x64_sys_bpf+0x7c/0x90 [ 320.747017][ T7549] x64_sys_call+0x4b9/0x9a0 [ 320.751522][ T7549] do_syscall_64+0x4c/0xa0 [ 320.755948][ T7549] ? clear_bhb_loop+0x50/0xa0 [ 320.760643][ T7549] ? clear_bhb_loop+0x50/0xa0 [ 320.765348][ T7549] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 320.771337][ T7549] RIP: 0033:0x7f5e2d792be9 [ 320.775761][ T7549] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 320.795754][ T7549] RSP: 002b:00007f5e2c1fb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 320.804179][ T7549] RAX: ffffffffffffffda RBX: 00007f5e2d9c9fa0 RCX: 00007f5e2d792be9 [ 320.812170][ T7549] RDX: 0000000000000050 RSI: 0000200000000380 RDI: 000000000000000a [ 320.820269][ T7549] RBP: 00007f5e2c1fb090 R08: 0000000000000000 R09: 0000000000000000 [ 320.828438][ T7549] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 320.836448][ T7549] R13: 00007f5e2d9ca038 R14: 00007f5e2d9c9fa0 R15: 00007fff52aad1d8 [ 320.844446][ T7549] [ 320.909839][ T7547] CPU: 1 PID: 7547 Comm: syz.4.2491 Not tainted syzkaller #0 [ 320.917465][ T7547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 320.927755][ T7547] Call Trace: [ 320.931066][ T7547] [ 320.934037][ T7547] __dump_stack+0x21/0x30 [ 320.938438][ T7547] dump_stack_lvl+0xee/0x150 [ 320.943069][ T7547] ? show_regs_print_info+0x20/0x20 [ 320.948313][ T7547] ? dev_queue_xmit+0x20/0x20 [ 320.953040][ T7547] dump_stack+0x15/0x20 [ 320.957246][ T7547] should_fail+0x3c1/0x510 [ 320.961715][ T7547] __should_failslab+0xa4/0xe0 [ 320.966528][ T7547] should_failslab+0x9/0x20 [ 320.971075][ T7547] slab_pre_alloc_hook+0x3b/0xe0 [ 320.976136][ T7547] ? skb_clone+0x1cf/0x360 [ 320.980687][ T7547] kmem_cache_alloc+0x44/0x260 [ 320.985581][ T7547] skb_clone+0x1cf/0x360 [ 320.989867][ T7547] bpf_clone_redirect+0xa7/0x380 [ 320.994926][ T7547] bpf_prog_b36a1f39e2fdd4f4+0x56/0xa20 [ 321.000499][ T7547] ? __kasan_slab_alloc+0xcf/0xf0 [ 321.005598][ T7547] ? __kasan_slab_alloc+0xbd/0xf0 [ 321.010744][ T7547] ? slab_post_alloc_hook+0x4f/0x2b0 [ 321.016071][ T7547] ? kmem_cache_alloc+0xf7/0x260 [ 321.021129][ T7547] ? __build_skb+0x2d/0x310 [ 321.025658][ T7547] ? build_skb+0x24/0x200 [ 321.030018][ T7547] ? bpf_prog_test_run_skb+0x279/0x1150 [ 321.035597][ T7547] ? bpf_prog_test_run+0x3d5/0x620 [ 321.040744][ T7547] ? __sys_bpf+0x52c/0x730 [ 321.045198][ T7547] ? __x64_sys_bpf+0x7c/0x90 [ 321.050030][ T7547] ? x64_sys_call+0x4b9/0x9a0 [ 321.054715][ T7547] ? do_syscall_64+0x4c/0xa0 [ 321.059306][ T7547] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 321.065484][ T7547] ? __kasan_check_read+0x11/0x20 [ 321.070728][ T7547] ? bpf_test_timer_continue+0x146/0x4a0 [ 321.076473][ T7547] bpf_test_run+0x33d/0x8d0 [ 321.081102][ T7547] ? convert___skb_to_skb+0x4f0/0x4f0 [ 321.086486][ T7547] ? eth_get_headlen+0x1f0/0x1f0 [ 321.091433][ T7547] ? convert___skb_to_skb+0x41/0x4f0 [ 321.096744][ T7547] bpf_prog_test_run_skb+0x9ec/0x1150 [ 321.102121][ T7547] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 321.108019][ T7547] bpf_prog_test_run+0x3d5/0x620 [ 321.113085][ T7547] ? bpf_prog_query+0x230/0x230 [ 321.117948][ T7547] ? selinux_bpf+0xce/0xf0 [ 321.122379][ T7547] ? security_bpf+0x82/0xa0 [ 321.126913][ T7547] __sys_bpf+0x52c/0x730 [ 321.131163][ T7547] ? bpf_link_show_fdinfo+0x310/0x310 [ 321.136551][ T7547] ? debug_smp_processor_id+0x17/0x20 [ 321.141946][ T7547] __x64_sys_bpf+0x7c/0x90 [ 321.146387][ T7547] x64_sys_call+0x4b9/0x9a0 [ 321.150919][ T7547] do_syscall_64+0x4c/0xa0 [ 321.155475][ T7547] ? clear_bhb_loop+0x50/0xa0 [ 321.160162][ T7547] ? clear_bhb_loop+0x50/0xa0 [ 321.164862][ T7547] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 321.170767][ T7547] RIP: 0033:0x7f9c3840abe9 [ 321.175190][ T7547] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 321.194823][ T7547] RSP: 002b:00007f9c36e73038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 321.203249][ T7547] RAX: ffffffffffffffda RBX: 00007f9c38641fa0 RCX: 00007f9c3840abe9 [ 321.211242][ T7547] RDX: 0000000000000048 RSI: 0000200000000040 RDI: 000000000000000a [ 321.219217][ T7547] RBP: 00007f9c36e73090 R08: 0000000000000000 R09: 0000000000000000 [ 321.227194][ T7547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 321.235296][ T7547] R13: 00007f9c38642038 R14: 00007f9c38641fa0 R15: 00007ffc48a91758 [ 321.243666][ T7547] [ 321.609292][ T7563] device pim6reg1 entered promiscuous mode [ 323.320899][ T7619] FAULT_INJECTION: forcing a failure. [ 323.320899][ T7619] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 323.413152][ T7619] CPU: 0 PID: 7619 Comm: syz.2.2513 Not tainted syzkaller #0 [ 323.420589][ T7619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 323.430758][ T7619] Call Trace: [ 323.434311][ T7619] [ 323.437268][ T7619] __dump_stack+0x21/0x30 [ 323.441712][ T7619] dump_stack_lvl+0xee/0x150 [ 323.446330][ T7619] ? show_regs_print_info+0x20/0x20 [ 323.451555][ T7619] dump_stack+0x15/0x20 [ 323.455738][ T7619] should_fail+0x3c1/0x510 [ 323.460186][ T7619] should_fail_usercopy+0x1a/0x20 [ 323.465341][ T7619] _copy_from_user+0x20/0xd0 [ 323.469970][ T7619] generic_map_update_batch+0x4a3/0x740 [ 323.475548][ T7619] ? __fget_files+0x2c/0x320 [ 323.480304][ T7619] ? generic_map_delete_batch+0x510/0x510 [ 323.486062][ T7619] ? __fdget+0x1a1/0x230 [ 323.490338][ T7619] ? generic_map_delete_batch+0x510/0x510 [ 323.496180][ T7619] bpf_map_do_batch+0x463/0x5f0 [ 323.501065][ T7619] __sys_bpf+0x5e3/0x730 [ 323.505341][ T7619] ? bpf_link_show_fdinfo+0x310/0x310 [ 323.510745][ T7619] __x64_sys_bpf+0x7c/0x90 [ 323.515189][ T7619] x64_sys_call+0x4b9/0x9a0 [ 323.519807][ T7619] do_syscall_64+0x4c/0xa0 [ 323.524254][ T7619] ? clear_bhb_loop+0x50/0xa0 [ 323.528959][ T7619] ? clear_bhb_loop+0x50/0xa0 [ 323.533663][ T7619] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 323.539578][ T7619] RIP: 0033:0x7f11fbb79be9 [ 323.544114][ T7619] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 323.563993][ T7619] RSP: 002b:00007f11fa5e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 323.572470][ T7619] RAX: ffffffffffffffda RBX: 00007f11fbdb0fa0 RCX: 00007f11fbb79be9 [ 323.580483][ T7619] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 323.588546][ T7619] RBP: 00007f11fa5e2090 R08: 0000000000000000 R09: 0000000000000000 [ 323.596545][ T7619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 323.604745][ T7619] R13: 00007f11fbdb1038 R14: 00007f11fbdb0fa0 R15: 00007fff7e6de5c8 [ 323.612763][ T7619] [ 323.972729][ T7635] device syzkaller0 entered promiscuous mode [ 324.515649][ T7655] device syzkaller0 entered promiscuous mode [ 324.550973][ T7658] syzkaller0: create flow: hash 2569824461 index 0 [ 324.551058][ T289] syzkaller0: tun_net_xmit 48 [ 326.462610][ T7661] syzkaller0 (unregistered): delete flow: hash 2569824461 index 0 [ 327.937581][ T7735] syz.1.2550[7735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.937664][ T7735] syz.1.2550[7735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.448894][ T7748] device sit0 entered promiscuous mode [ 329.455326][ T7773] syz.2.2563[7773] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.455404][ T7773] syz.2.2563[7773] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.475059][ T7804] syz.0.2575[7804] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.584264][ T7804] syz.0.2575[7804] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.720177][ T7840] syz.1.2587[7840] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.815427][ T7840] syz.1.2587[7840] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.002914][ T7851] ÿÿÿÿÿÿ: renamed from vlan1 [ 332.342134][ T7862] FAULT_INJECTION: forcing a failure. [ 332.342134][ T7862] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 332.358011][ T7862] CPU: 0 PID: 7862 Comm: syz.2.2595 Not tainted syzkaller #0 [ 332.365520][ T7862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 332.375598][ T7862] Call Trace: [ 332.378904][ T7862] [ 332.381855][ T7862] __dump_stack+0x21/0x30 [ 332.386211][ T7862] dump_stack_lvl+0xee/0x150 [ 332.390826][ T7862] ? show_regs_print_info+0x20/0x20 [ 332.396173][ T7862] dump_stack+0x15/0x20 [ 332.400341][ T7862] should_fail+0x3c1/0x510 [ 332.404877][ T7862] should_fail_usercopy+0x1a/0x20 [ 332.409938][ T7862] _copy_to_user+0x20/0x90 [ 332.414389][ T7862] simple_read_from_buffer+0xe9/0x160 [ 332.419788][ T7862] proc_fail_nth_read+0x19a/0x210 [ 332.424833][ T7862] ? proc_fault_inject_write+0x2f0/0x2f0 [ 332.430493][ T7862] ? security_file_permission+0x83/0xa0 [ 332.436075][ T7862] ? proc_fault_inject_write+0x2f0/0x2f0 [ 332.441734][ T7862] vfs_read+0x282/0xbe0 [ 332.446008][ T7862] ? kernel_read+0x1f0/0x1f0 [ 332.450638][ T7862] ? _raw_spin_lock+0x8e/0xe0 [ 332.455332][ T7862] ? __kasan_check_write+0x14/0x20 [ 332.460461][ T7862] ? mutex_lock+0x95/0x1a0 [ 332.464896][ T7862] ? wait_for_completion_killable_timeout+0x10/0x10 [ 332.471504][ T7862] ? __fget_files+0x2c4/0x320 [ 332.476296][ T7862] ? __fdget_pos+0x2d2/0x380 [ 332.481355][ T7862] ? ksys_read+0x71/0x240 [ 332.485713][ T7862] ksys_read+0x140/0x240 [ 332.489970][ T7862] ? vfs_write+0xf70/0xf70 [ 332.494403][ T7862] ? debug_smp_processor_id+0x17/0x20 [ 332.499794][ T7862] __x64_sys_read+0x7b/0x90 [ 332.504311][ T7862] x64_sys_call+0x96d/0x9a0 [ 332.508836][ T7862] do_syscall_64+0x4c/0xa0 [ 332.513281][ T7862] ? clear_bhb_loop+0x50/0xa0 [ 332.517974][ T7862] ? clear_bhb_loop+0x50/0xa0 [ 332.522666][ T7862] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 332.528669][ T7862] RIP: 0033:0x7f11fbb785fc [ 332.533099][ T7862] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 332.553065][ T7862] RSP: 002b:00007f11fa5e2030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 332.561517][ T7862] RAX: ffffffffffffffda RBX: 00007f11fbdb0fa0 RCX: 00007f11fbb785fc [ 332.569512][ T7862] RDX: 000000000000000f RSI: 00007f11fa5e20a0 RDI: 000000000000000b [ 332.577517][ T7862] RBP: 00007f11fa5e2090 R08: 0000000000000000 R09: 0000000000000000 [ 332.585614][ T7862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 332.593603][ T7862] R13: 00007f11fbdb1038 R14: 00007f11fbdb0fa0 R15: 00007fff7e6de5c8 [ 332.601775][ T7862] [ 332.796538][ T7878] syz.4.2600[7878] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.796626][ T7878] syz.4.2600[7878] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.149463][ T7896] device sit0 left promiscuous mode [ 333.300925][ T7903] FAULT_INJECTION: forcing a failure. [ 333.300925][ T7903] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 333.322990][ T7903] CPU: 1 PID: 7903 Comm: syz.1.2610 Not tainted syzkaller #0 [ 333.330418][ T7903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 333.340589][ T7903] Call Trace: [ 333.343900][ T7903] [ 333.346853][ T7903] __dump_stack+0x21/0x30 [ 333.351315][ T7903] dump_stack_lvl+0xee/0x150 [ 333.355939][ T7903] ? show_regs_print_info+0x20/0x20 [ 333.361259][ T7903] dump_stack+0x15/0x20 [ 333.365438][ T7903] should_fail+0x3c1/0x510 [ 333.369985][ T7903] should_fail_usercopy+0x1a/0x20 [ 333.375218][ T7903] _copy_from_user+0x20/0xd0 [ 333.379836][ T7903] vlan_ioctl_handler+0x9d/0x620 [ 333.384803][ T7903] ? vlan_exit_net+0x20/0x20 [ 333.389427][ T7903] ? selinux_file_ioctl+0x377/0x480 [ 333.394663][ T7903] ? vlan_exit_net+0x20/0x20 [ 333.399279][ T7903] sock_ioctl+0x28c/0x6b0 [ 333.403638][ T7903] ? sock_poll+0x3d0/0x3d0 [ 333.408089][ T7903] ? __fget_files+0x2c4/0x320 [ 333.412795][ T7903] ? security_file_ioctl+0x84/0xa0 [ 333.418038][ T7903] ? sock_poll+0x3d0/0x3d0 [ 333.422479][ T7903] __se_sys_ioctl+0x121/0x1a0 [ 333.427289][ T7903] __x64_sys_ioctl+0x7b/0x90 [ 333.431919][ T7903] x64_sys_call+0x2f/0x9a0 [ 333.436369][ T7903] do_syscall_64+0x4c/0xa0 [ 333.440816][ T7903] ? clear_bhb_loop+0x50/0xa0 [ 333.445535][ T7903] ? clear_bhb_loop+0x50/0xa0 [ 333.450251][ T7903] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 333.456269][ T7903] RIP: 0033:0x7f36891d5be9 [ 333.460713][ T7903] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 333.472208][ T7896] device sit0 entered promiscuous mode [ 333.480346][ T7903] RSP: 002b:00007f3687c3e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 333.480375][ T7903] RAX: ffffffffffffffda RBX: 00007f368940cfa0 RCX: 00007f36891d5be9 [ 333.480390][ T7903] RDX: 0000200000000080 RSI: 0000000000008983 RDI: 000000000000000c [ 333.480415][ T7903] RBP: 00007f3687c3e090 R08: 0000000000000000 R09: 0000000000000000 [ 333.480427][ T7903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 333.480440][ T7903] R13: 00007f368940d038 R14: 00007f368940cfa0 R15: 00007ffed595c7c8 [ 333.534261][ T7903] [ 333.596662][ T7911] syz.1.2612[7911] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.596739][ T7911] syz.1.2612[7911] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.737699][ T7914] device veth0_vlan left promiscuous mode [ 333.764414][ T7914] device veth0_vlan entered promiscuous mode [ 333.807362][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 333.816174][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 333.828210][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 334.003094][ T7941] Â: renamed from pim6reg1 [ 334.203529][ T7944] syz.4.2624[7944] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.203622][ T7944] syz.4.2624[7944] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.152353][ T7979] syz.0.2636[7979] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.181465][ T7979] syz.0.2636[7979] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.511757][ T7994] syz.2.2643 (7994) used obsolete PPPIOCDETACH ioctl [ 335.682230][ T8006] FAULT_INJECTION: forcing a failure. [ 335.682230][ T8006] name failslab, interval 1, probability 0, space 0, times 0 [ 335.743252][ T8006] CPU: 1 PID: 8006 Comm: syz.4.2646 Not tainted syzkaller #0 [ 335.750796][ T8006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 335.760880][ T8006] Call Trace: [ 335.764279][ T8006] [ 335.767315][ T8006] __dump_stack+0x21/0x30 [ 335.771708][ T8006] dump_stack_lvl+0xee/0x150 [ 335.776362][ T8006] ? show_regs_print_info+0x20/0x20 [ 335.781703][ T8006] dump_stack+0x15/0x20 [ 335.785927][ T8006] should_fail+0x3c1/0x510 [ 335.790377][ T8006] __should_failslab+0xa4/0xe0 [ 335.795180][ T8006] should_failslab+0x9/0x20 [ 335.799812][ T8006] slab_pre_alloc_hook+0x3b/0xe0 [ 335.804795][ T8006] ? __alloc_file+0x28/0x2a0 [ 335.809853][ T8006] kmem_cache_alloc+0x44/0x260 [ 335.814757][ T8006] __alloc_file+0x28/0x2a0 [ 335.819387][ T8006] alloc_empty_file+0x97/0x180 [ 335.824182][ T8006] alloc_file+0x59/0x540 [ 335.828460][ T8006] alloc_file_pseudo+0x17a/0x1f0 [ 335.833433][ T8006] ? alloc_empty_file_noaccount+0x80/0x80 [ 335.839207][ T8006] sock_alloc_file+0xba/0x260 [ 335.844016][ T8006] __sys_socketpair+0x2c3/0x590 [ 335.848903][ T8006] __x64_sys_socketpair+0x9b/0xb0 [ 335.853971][ T8006] x64_sys_call+0x36/0x9a0 [ 335.858517][ T8006] do_syscall_64+0x4c/0xa0 [ 335.862966][ T8006] ? clear_bhb_loop+0x50/0xa0 [ 335.867674][ T8006] ? clear_bhb_loop+0x50/0xa0 [ 335.872383][ T8006] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 335.878392][ T8006] RIP: 0033:0x7f9c3840abe9 [ 335.882834][ T8006] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 335.902588][ T8006] RSP: 002b:00007f9c36e73038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 335.911334][ T8006] RAX: ffffffffffffffda RBX: 00007f9c38641fa0 RCX: 00007f9c3840abe9 [ 335.919507][ T8006] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 335.927668][ T8006] RBP: 00007f9c36e73090 R08: 0000000000000000 R09: 0000000000000000 [ 335.935679][ T8006] R10: 0000200000000940 R11: 0000000000000246 R12: 0000000000000002 [ 335.943680][ T8006] R13: 00007f9c38642038 R14: 00007f9c38641fa0 R15: 00007ffc48a91758 [ 335.951809][ T8006] [ 338.503582][ T8095] syz.3.2678[8095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.503662][ T8095] syz.3.2678[8095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.531241][ T8166] FAULT_INJECTION: forcing a failure. [ 343.531241][ T8166] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 343.738164][ T8166] CPU: 1 PID: 8166 Comm: syz.0.2703 Not tainted syzkaller #0 [ 343.745605][ T8166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 343.755923][ T8166] Call Trace: [ 343.759240][ T8166] [ 343.762197][ T8166] __dump_stack+0x21/0x30 [ 343.766571][ T8166] dump_stack_lvl+0xee/0x150 [ 343.771196][ T8166] ? show_regs_print_info+0x20/0x20 [ 343.776437][ T8166] dump_stack+0x15/0x20 [ 343.780615][ T8166] should_fail+0x3c1/0x510 [ 343.785095][ T8166] should_fail_alloc_page+0x55/0x80 [ 343.790334][ T8166] prepare_alloc_pages+0x156/0x600 [ 343.795481][ T8166] ? __alloc_pages_bulk+0xab0/0xab0 [ 343.800704][ T8166] ? slab_post_alloc_hook+0x4f/0x2b0 [ 343.806098][ T8166] ? alloc_vmap_area+0x17a/0x1990 [ 343.811149][ T8166] ? __get_vm_area_node+0x14e/0x350 [ 343.816375][ T8166] ? __vmalloc_node_range+0xdf/0xaf0 [ 343.822010][ T8166] ? htab_map_alloc+0x3c0/0x14f0 [ 343.827077][ T8166] __alloc_pages+0x10a/0x440 [ 343.831704][ T8166] ? prep_new_page+0x110/0x110 [ 343.836495][ T8166] ? __kasan_check_write+0x14/0x20 [ 343.841638][ T8166] __get_free_pages+0x10/0x30 [ 343.846347][ T8166] kasan_populate_vmalloc_pte+0x29/0x120 [ 343.852015][ T8166] __apply_to_page_range+0x8b0/0xbf0 [ 343.857342][ T8166] ? kasan_populate_vmalloc+0x70/0x70 [ 343.862735][ T8166] ? kasan_populate_vmalloc+0x70/0x70 [ 343.868135][ T8166] apply_to_page_range+0x3b/0x50 [ 343.873102][ T8166] kasan_populate_vmalloc+0x60/0x70 [ 343.878320][ T8166] alloc_vmap_area+0x185c/0x1990 [ 343.883279][ T8166] ? vm_map_ram+0xa60/0xa60 [ 343.887884][ T8166] ? __get_vm_area_node+0x11d/0x350 [ 343.893096][ T8166] __get_vm_area_node+0x14e/0x350 [ 343.898146][ T8166] __vmalloc_node_range+0xdf/0xaf0 [ 343.903269][ T8166] ? htab_map_alloc+0x3c0/0x14f0 [ 343.908217][ T8166] bpf_map_area_alloc+0xd5/0xe0 [ 343.913077][ T8166] ? htab_map_alloc+0x3c0/0x14f0 [ 343.918032][ T8166] htab_map_alloc+0x3c0/0x14f0 [ 343.922814][ T8166] map_create+0x455/0x21b0 [ 343.927238][ T8166] __sys_bpf+0x2cf/0x730 [ 343.931483][ T8166] ? bpf_link_show_fdinfo+0x310/0x310 [ 343.936857][ T8166] ? debug_smp_processor_id+0x17/0x20 [ 343.942234][ T8166] __x64_sys_bpf+0x7c/0x90 [ 343.946793][ T8166] x64_sys_call+0x4b9/0x9a0 [ 343.951313][ T8166] do_syscall_64+0x4c/0xa0 [ 343.955751][ T8166] ? clear_bhb_loop+0x50/0xa0 [ 343.960444][ T8166] ? clear_bhb_loop+0x50/0xa0 [ 343.965130][ T8166] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 343.971163][ T8166] RIP: 0033:0x7f5e2d792be9 [ 343.975696][ T8166] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 343.995392][ T8166] RSP: 002b:00007f5e2c1fb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 344.003810][ T8166] RAX: ffffffffffffffda RBX: 00007f5e2d9c9fa0 RCX: 00007f5e2d792be9 [ 344.011899][ T8166] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 344.019901][ T8166] RBP: 00007f5e2c1fb090 R08: 0000000000000000 R09: 0000000000000000 [ 344.027975][ T8166] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 344.035958][ T8166] R13: 00007f5e2d9ca038 R14: 00007f5e2d9c9fa0 R15: 00007fff52aad1d8 [ 344.043951][ T8166] [ 344.575507][ T8187] FAULT_INJECTION: forcing a failure. [ 344.575507][ T8187] name failslab, interval 1, probability 0, space 0, times 0 [ 344.588475][ T8187] CPU: 1 PID: 8187 Comm: syz.3.2711 Not tainted syzkaller #0 [ 344.595985][ T8187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 344.606079][ T8187] Call Trace: [ 344.609363][ T8187] [ 344.612302][ T8187] __dump_stack+0x21/0x30 [ 344.616642][ T8187] dump_stack_lvl+0xee/0x150 [ 344.621240][ T8187] ? show_regs_print_info+0x20/0x20 [ 344.626446][ T8187] ? kasan_set_track+0x5b/0x70 [ 344.631210][ T8187] ? kasan_set_free_info+0x23/0x40 [ 344.636323][ T8187] ? ____kasan_slab_free+0x125/0x160 [ 344.641608][ T8187] ? __kasan_slab_free+0x11/0x20 [ 344.646578][ T8187] ? slab_free_freelist_hook+0xc2/0x190 [ 344.652246][ T8187] dump_stack+0x15/0x20 [ 344.656420][ T8187] should_fail+0x3c1/0x510 [ 344.660849][ T8187] __should_failslab+0xa4/0xe0 [ 344.665627][ T8187] should_failslab+0x9/0x20 [ 344.670248][ T8187] slab_pre_alloc_hook+0x3b/0xe0 [ 344.675193][ T8187] __kmalloc+0x6d/0x2c0 [ 344.679460][ T8187] ? bpf_test_init+0x100/0x1c0 [ 344.684351][ T8187] bpf_test_init+0x100/0x1c0 [ 344.688943][ T8187] bpf_prog_test_run_skb+0x193/0x1150 [ 344.694496][ T8187] ? __kasan_check_write+0x14/0x20 [ 344.699610][ T8187] ? fput_many+0x15a/0x1a0 [ 344.704030][ T8187] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 344.709936][ T8187] bpf_prog_test_run+0x3d5/0x620 [ 344.715008][ T8187] ? bpf_prog_query+0x230/0x230 [ 344.720075][ T8187] ? selinux_bpf+0xce/0xf0 [ 344.724544][ T8187] ? security_bpf+0x82/0xa0 [ 344.729058][ T8187] __sys_bpf+0x52c/0x730 [ 344.733316][ T8187] ? bpf_link_show_fdinfo+0x310/0x310 [ 344.738782][ T8187] ? debug_smp_processor_id+0x17/0x20 [ 344.744163][ T8187] __x64_sys_bpf+0x7c/0x90 [ 344.748606][ T8187] x64_sys_call+0x4b9/0x9a0 [ 344.753115][ T8187] do_syscall_64+0x4c/0xa0 [ 344.757628][ T8187] ? clear_bhb_loop+0x50/0xa0 [ 344.762399][ T8187] ? clear_bhb_loop+0x50/0xa0 [ 344.767083][ T8187] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 344.772978][ T8187] RIP: 0033:0x7f43be641be9 [ 344.777404][ T8187] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 344.797184][ T8187] RSP: 002b:00007f43bd0aa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 344.805618][ T8187] RAX: ffffffffffffffda RBX: 00007f43be878fa0 RCX: 00007f43be641be9 [ 344.813606][ T8187] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 344.821579][ T8187] RBP: 00007f43bd0aa090 R08: 0000000000000000 R09: 0000000000000000 [ 344.829550][ T8187] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 344.837694][ T8187] R13: 00007f43be879038 R14: 00007f43be878fa0 R15: 00007ffc7a21ff08 [ 344.845775][ T8187] [ 348.763931][ T8280] FAULT_INJECTION: forcing a failure. [ 348.763931][ T8280] name failslab, interval 1, probability 0, space 0, times 0 [ 348.790474][ T8280] CPU: 1 PID: 8280 Comm: syz.0.2737 Not tainted syzkaller #0 [ 348.798090][ T8280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 348.808158][ T8280] Call Trace: [ 348.811451][ T8280] [ 348.814398][ T8280] __dump_stack+0x21/0x30 [ 348.818757][ T8280] dump_stack_lvl+0xee/0x150 [ 348.823354][ T8280] ? show_regs_print_info+0x20/0x20 [ 348.828661][ T8280] ? __fput+0x20b/0x8b0 [ 348.832826][ T8280] ? task_work_run+0x127/0x190 [ 348.837614][ T8280] ? exit_to_user_mode_loop+0xd0/0xe0 [ 348.843003][ T8280] ? exit_to_user_mode_prepare+0x5a/0xa0 [ 348.848645][ T8280] ? do_syscall_64+0x58/0xa0 [ 348.853240][ T8280] dump_stack+0x15/0x20 [ 348.857398][ T8280] should_fail+0x3c1/0x510 [ 348.861850][ T8280] __should_failslab+0xa4/0xe0 [ 348.866641][ T8280] should_failslab+0x9/0x20 [ 348.871162][ T8280] slab_pre_alloc_hook+0x3b/0xe0 [ 348.876238][ T8280] ? __alloc_skb+0xe0/0x740 [ 348.880775][ T8280] kmem_cache_alloc+0x44/0x260 [ 348.885587][ T8280] __alloc_skb+0xe0/0x740 [ 348.889996][ T8280] tipc_msg_create+0x4b/0x4e0 [ 348.894675][ T8280] tipc_group_proto_xmit+0x155/0x840 [ 348.899983][ T8280] tipc_group_delete+0x13b/0x460 [ 348.904937][ T8280] ? tipc_group_update_member+0x390/0x390 [ 348.910662][ T8280] ? __tipc_shutdown+0x111a/0x1520 [ 348.915777][ T8280] ? tipc_group_self+0x25/0x1c0 [ 348.920669][ T8280] tipc_sk_leave+0x130/0x4b0 [ 348.925277][ T8280] ? __kasan_record_aux_stack+0xd2/0x100 [ 348.930927][ T8280] ? __tipc_shutdown+0x1520/0x1520 [ 348.936037][ T8280] ? __x64_sys_close+0x39/0x80 [ 348.940819][ T8280] ? locks_remove_posix+0x520/0x520 [ 348.946171][ T8280] tipc_release+0x100/0x1630 [ 348.950860][ T8280] ? rwsem_write_trylock+0x130/0x300 [ 348.956156][ T8280] ? tipc_sock_destruct+0x180/0x180 [ 348.961363][ T8280] sock_close+0xe0/0x270 [ 348.965617][ T8280] ? sock_mmap+0xa0/0xa0 [ 348.969885][ T8280] __fput+0x20b/0x8b0 [ 348.973878][ T8280] ____fput+0x15/0x20 [ 348.977862][ T8280] task_work_run+0x127/0x190 [ 348.982477][ T8280] exit_to_user_mode_loop+0xd0/0xe0 [ 348.987677][ T8280] exit_to_user_mode_prepare+0x5a/0xa0 [ 348.993156][ T8280] syscall_exit_to_user_mode+0x1a/0x30 [ 348.998627][ T8280] do_syscall_64+0x58/0xa0 [ 349.003046][ T8280] ? clear_bhb_loop+0x50/0xa0 [ 349.007812][ T8280] ? clear_bhb_loop+0x50/0xa0 [ 349.012495][ T8280] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 349.018414][ T8280] RIP: 0033:0x7f5e2d792be9 [ 349.022919][ T8280] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 349.042910][ T8280] RSP: 002b:00007f5e2c1fb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 349.051529][ T8280] RAX: 0000000000000000 RBX: 00007f5e2d9c9fa0 RCX: 00007f5e2d792be9 [ 349.059505][ T8280] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 349.067476][ T8280] RBP: 00007f5e2c1fb090 R08: 0000000000000000 R09: 0000000000000000 [ 349.075457][ T8280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 349.083428][ T8280] R13: 00007f5e2d9ca038 R14: 00007f5e2d9c9fa0 R15: 00007fff52aad1d8 [ 349.091404][ T8280] [ 350.327013][ T8316] FAULT_INJECTION: forcing a failure. [ 350.327013][ T8316] name failslab, interval 1, probability 0, space 0, times 0 [ 350.376808][ T8316] CPU: 1 PID: 8316 Comm: syz.3.2750 Not tainted syzkaller #0 [ 350.384247][ T8316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 350.394333][ T8316] Call Trace: [ 350.397633][ T8316] [ 350.400583][ T8316] __dump_stack+0x21/0x30 [ 350.404961][ T8316] dump_stack_lvl+0xee/0x150 [ 350.409593][ T8316] ? show_regs_print_info+0x20/0x20 [ 350.415254][ T8316] ? dev_queue_xmit+0x20/0x20 [ 350.420054][ T8316] dump_stack+0x15/0x20 [ 350.424378][ T8316] should_fail+0x3c1/0x510 [ 350.428812][ T8316] __should_failslab+0xa4/0xe0 [ 350.433580][ T8316] should_failslab+0x9/0x20 [ 350.438084][ T8316] slab_pre_alloc_hook+0x3b/0xe0 [ 350.443028][ T8316] ? skb_clone+0x1cf/0x360 [ 350.447451][ T8316] kmem_cache_alloc+0x44/0x260 [ 350.452321][ T8316] skb_clone+0x1cf/0x360 [ 350.456566][ T8316] bpf_clone_redirect+0xa7/0x380 [ 350.461543][ T8316] bpf_prog_6893982b85ceadf7+0x56/0x1e8 [ 350.467114][ T8316] ? __kasan_slab_alloc+0xcf/0xf0 [ 350.472140][ T8316] ? __kasan_slab_alloc+0xbd/0xf0 [ 350.477261][ T8316] ? slab_post_alloc_hook+0x4f/0x2b0 [ 350.482553][ T8316] ? kmem_cache_alloc+0xf7/0x260 [ 350.487492][ T8316] ? __build_skb+0x2d/0x310 [ 350.492004][ T8316] ? build_skb+0x24/0x200 [ 350.496343][ T8316] ? bpf_prog_test_run_skb+0x279/0x1150 [ 350.501890][ T8316] ? bpf_prog_test_run+0x3d5/0x620 [ 350.507092][ T8316] ? __sys_bpf+0x52c/0x730 [ 350.511521][ T8316] ? __x64_sys_bpf+0x7c/0x90 [ 350.516215][ T8316] ? x64_sys_call+0x4b9/0x9a0 [ 350.520893][ T8316] ? do_syscall_64+0x4c/0xa0 [ 350.525570][ T8316] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 350.531647][ T8316] ? __kasan_check_read+0x11/0x20 [ 350.536672][ T8316] ? bpf_test_timer_continue+0x146/0x4a0 [ 350.542394][ T8316] bpf_test_run+0x33d/0x8d0 [ 350.546906][ T8316] ? convert___skb_to_skb+0x4f0/0x4f0 [ 350.552286][ T8316] ? eth_get_headlen+0x1f0/0x1f0 [ 350.557243][ T8316] ? convert___skb_to_skb+0x41/0x4f0 [ 350.562532][ T8316] bpf_prog_test_run_skb+0x9ec/0x1150 [ 350.567918][ T8316] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 350.573815][ T8316] bpf_prog_test_run+0x3d5/0x620 [ 350.578765][ T8316] ? bpf_prog_query+0x230/0x230 [ 350.583630][ T8316] ? selinux_bpf+0xce/0xf0 [ 350.588054][ T8316] ? security_bpf+0x82/0xa0 [ 350.592557][ T8316] __sys_bpf+0x52c/0x730 [ 350.596798][ T8316] ? bpf_link_show_fdinfo+0x310/0x310 [ 350.602182][ T8316] ? debug_smp_processor_id+0x17/0x20 [ 350.607562][ T8316] __x64_sys_bpf+0x7c/0x90 [ 350.611980][ T8316] x64_sys_call+0x4b9/0x9a0 [ 350.616659][ T8316] do_syscall_64+0x4c/0xa0 [ 350.621256][ T8316] ? clear_bhb_loop+0x50/0xa0 [ 350.625939][ T8316] ? clear_bhb_loop+0x50/0xa0 [ 350.630617][ T8316] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 350.636517][ T8316] RIP: 0033:0x7f43be641be9 [ 350.640934][ T8316] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 350.660552][ T8316] RSP: 002b:00007f43bd0aa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 350.668969][ T8316] RAX: ffffffffffffffda RBX: 00007f43be878fa0 RCX: 00007f43be641be9 [ 350.677043][ T8316] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 350.685018][ T8316] RBP: 00007f43bd0aa090 R08: 0000000000000000 R09: 0000000000000000 [ 350.692992][ T8316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 350.701060][ T8316] R13: 00007f43be879038 R14: 00007f43be878fa0 R15: 00007ffc7a21ff08 [ 350.709238][ T8316] [ 352.423340][ T8371] device sit0 left promiscuous mode [ 352.500528][ T8372] device sit0 entered promiscuous mode [ 353.278356][ T8386] device syzkaller0 entered promiscuous mode [ 353.330297][ T8389] device sit0 left promiscuous mode [ 353.427945][ T8390] device sit0 entered promiscuous mode [ 354.566328][ T8421] device wg2 left promiscuous mode [ 354.797668][ T8421] device wg2 entered promiscuous mode [ 354.901880][ T8422] device sit0 left promiscuous mode [ 354.997042][ T8425] device sit0 entered promiscuous mode [ 355.211140][ T8433] device syzkaller0 entered promiscuous mode [ 355.969334][ T30] audit: type=1400 audit(1756978039.579:145): avc: denied { ioctl } for pid=8460 comm="syz.4.2797" path="socket:[47673]" dev="sockfs" ino=47673 ioctlcmd=0x89e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 356.445415][ T8473] device syzkaller0 entered promiscuous mode [ 356.477885][ T8471] device veth1_to_bond entered promiscuous mode [ 357.005959][ T30] audit: type=1400 audit(1756978040.619:146): avc: denied { write } for pid=8485 comm="syz.2.2806" name="cgroup.subtree_control" dev="cgroup2" ino=226 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 357.165499][ T30] audit: type=1400 audit(1756978040.619:147): avc: denied { open } for pid=8485 comm="syz.2.2806" path="" dev="cgroup2" ino=226 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 357.336596][ T30] audit: type=1400 audit(1756978040.619:148): avc: denied { ioctl } for pid=8485 comm="syz.2.2806" path="" dev="cgroup2" ino=226 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 357.528499][ T8513] device sit0 left promiscuous mode [ 357.733847][ T8515] device sit0 entered promiscuous mode [ 358.613626][ T8532] device wg2 left promiscuous mode [ 359.429343][ T30] audit: type=1400 audit(1756978043.039:149): avc: denied { read } for pid=8554 comm="syz.0.2825" dev="nsfs" ino=4026532410 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 359.522581][ T30] audit: type=1400 audit(1756978043.039:150): avc: denied { open } for pid=8554 comm="syz.0.2825" path="uts:[4026532410]" dev="nsfs" ino=4026532410 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 361.677001][ T8625] syz.2.2850[8625] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 361.677096][ T8625] syz.2.2850[8625] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 362.395397][ C0] Illegal XDP return value 16128, expect packet loss! [ 363.574709][ T283] syz-executor (283) used greatest stack depth: 20768 bytes left [ 364.114689][ T8689] bridge0: port 1(bridge_slave_0) entered blocking state [ 364.127719][ T8689] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.135419][ T8689] device bridge_slave_0 entered promiscuous mode [ 364.176442][ T8689] bridge0: port 2(bridge_slave_1) entered blocking state [ 364.257124][ T8689] bridge0: port 2(bridge_slave_1) entered disabled state [ 364.275026][ T8689] device bridge_slave_1 entered promiscuous mode [ 364.867246][ T8689] bridge0: port 2(bridge_slave_1) entered blocking state [ 364.874367][ T8689] bridge0: port 2(bridge_slave_1) entered forwarding state [ 364.881713][ T8689] bridge0: port 1(bridge_slave_0) entered blocking state [ 364.888836][ T8689] bridge0: port 1(bridge_slave_0) entered forwarding state [ 364.955239][ T332] GPL: port 1(erspan0) entered disabled state [ 364.973985][ T332] device erspan0 left promiscuous mode [ 364.979562][ T332] GPL: port 1(erspan0) entered disabled state [ 365.085938][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 365.101498][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 365.402625][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 365.410463][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 365.418309][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 365.432882][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 365.441801][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 365.448998][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 365.456630][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 365.465412][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 365.474186][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 365.481266][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 365.542918][ T332] device veth0 left promiscuous mode [ 365.548472][ T332] bridge0: port 3(veth0) entered disabled state [ 365.556828][ T332] device bridge_slave_1 left promiscuous mode [ 365.571747][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 365.591720][ T332] device bridge_slave_0 left promiscuous mode [ 365.612749][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 365.635169][ T332] device veth1_macvtap left promiscuous mode [ 365.906424][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 365.945590][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 366.069651][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 366.093134][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 366.228994][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 366.237737][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 366.251092][ T8689] device veth0_vlan entered promiscuous mode [ 366.280439][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 366.290418][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 366.330600][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 366.338441][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 366.352962][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 366.361494][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 366.413296][ T8689] device veth1_macvtap entered promiscuous mode [ 366.478955][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 366.487389][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 366.496303][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 366.505184][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 366.514936][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 367.749206][ T8777] syz.3.2894[8777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.749285][ T8777] syz.3.2894[8777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 368.009807][ T8782] device syzkaller0 entered promiscuous mode [ 368.206848][ T8789] FAULT_INJECTION: forcing a failure. [ 368.206848][ T8789] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 368.253041][ T8789] CPU: 0 PID: 8789 Comm: syz.4.2897 Not tainted syzkaller #0 [ 368.260564][ T8789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 368.270632][ T8789] Call Trace: [ 368.274061][ T8789] [ 368.277080][ T8789] __dump_stack+0x21/0x30 [ 368.281421][ T8789] dump_stack_lvl+0xee/0x150 [ 368.286017][ T8789] ? show_regs_print_info+0x20/0x20 [ 368.291264][ T8789] ? get_page_from_freelist+0x2cc5/0x2d50 [ 368.297103][ T8789] dump_stack+0x15/0x20 [ 368.301283][ T8789] should_fail+0x3c1/0x510 [ 368.305725][ T8789] should_fail_alloc_page+0x55/0x80 [ 368.310938][ T8789] prepare_alloc_pages+0x156/0x600 [ 368.316257][ T8789] ? __alloc_pages_bulk+0xab0/0xab0 [ 368.321500][ T8789] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 368.327188][ T8789] __alloc_pages+0x10a/0x440 [ 368.331785][ T8789] ? prep_new_page+0x110/0x110 [ 368.336554][ T8789] ? __pcpu_chunk_move+0x275/0x310 [ 368.341677][ T8789] pcpu_populate_chunk+0x184/0xcb0 [ 368.346799][ T8789] ? _find_next_bit+0x1b5/0x200 [ 368.351666][ T8789] pcpu_alloc+0xc4d/0x1660 [ 368.356267][ T8789] __alloc_percpu_gfp+0x25/0x30 [ 368.361130][ T8789] bpf_map_alloc_percpu+0xc5/0x150 [ 368.366270][ T8789] htab_map_alloc+0xc1b/0x14f0 [ 368.371051][ T8789] map_create+0x455/0x21b0 [ 368.375572][ T8789] __sys_bpf+0x2cf/0x730 [ 368.379830][ T8789] ? bpf_link_show_fdinfo+0x310/0x310 [ 368.385385][ T8789] ? debug_smp_processor_id+0x17/0x20 [ 368.390794][ T8789] __x64_sys_bpf+0x7c/0x90 [ 368.395218][ T8789] x64_sys_call+0x4b9/0x9a0 [ 368.399729][ T8789] do_syscall_64+0x4c/0xa0 [ 368.404150][ T8789] ? clear_bhb_loop+0x50/0xa0 [ 368.408830][ T8789] ? clear_bhb_loop+0x50/0xa0 [ 368.413622][ T8789] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 368.419607][ T8789] RIP: 0033:0x7f9c3840abe9 [ 368.424048][ T8789] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 368.443747][ T8789] RSP: 002b:00007f9c36e73038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 368.452255][ T8789] RAX: ffffffffffffffda RBX: 00007f9c38641fa0 RCX: 00007f9c3840abe9 [ 368.460238][ T8789] RDX: 0000000000000050 RSI: 0000200000000380 RDI: 0000000000000000 [ 368.468215][ T8789] RBP: 00007f9c36e73090 R08: 0000000000000000 R09: 0000000000000000 [ 368.476233][ T8789] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 368.484206][ T8789] R13: 00007f9c38642038 R14: 00007f9c38641fa0 R15: 00007ffc48a91758 [ 368.492382][ T8789] [ 368.678375][ T8794] FAULT_INJECTION: forcing a failure. [ 368.678375][ T8794] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 368.704482][ T8794] CPU: 1 PID: 8794 Comm: syz.1.2898 Not tainted syzkaller #0 [ 368.712014][ T8794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 368.722358][ T8794] Call Trace: [ 368.725651][ T8794] [ 368.728590][ T8794] __dump_stack+0x21/0x30 [ 368.732927][ T8794] dump_stack_lvl+0xee/0x150 [ 368.737534][ T8794] ? show_regs_print_info+0x20/0x20 [ 368.742841][ T8794] ? 0xffffffffa001a000 [ 368.747030][ T8794] dump_stack+0x15/0x20 [ 368.751202][ T8794] should_fail+0x3c1/0x510 [ 368.755636][ T8794] should_fail_alloc_page+0x55/0x80 [ 368.760848][ T8794] prepare_alloc_pages+0x156/0x600 [ 368.766069][ T8794] ? __alloc_pages_bulk+0xab0/0xab0 [ 368.771308][ T8794] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 368.776987][ T8794] __alloc_pages+0x10a/0x440 [ 368.781706][ T8794] ? prep_new_page+0x110/0x110 [ 368.786510][ T8794] pcpu_populate_chunk+0x184/0xcb0 [ 368.791754][ T8794] ? _find_next_bit+0x1b5/0x200 [ 368.796646][ T8794] pcpu_alloc+0xc4d/0x1660 [ 368.801235][ T8794] __alloc_percpu_gfp+0x25/0x30 [ 368.806122][ T8794] bpf_map_alloc_percpu+0xc5/0x150 [ 368.811248][ T8794] array_map_alloc+0x39a/0x6d0 [ 368.816025][ T8794] map_create+0x455/0x21b0 [ 368.820461][ T8794] __sys_bpf+0x2cf/0x730 [ 368.824836][ T8794] ? bpf_link_show_fdinfo+0x310/0x310 [ 368.830405][ T8794] ? debug_smp_processor_id+0x17/0x20 [ 368.835792][ T8794] __x64_sys_bpf+0x7c/0x90 [ 368.840226][ T8794] x64_sys_call+0x4b9/0x9a0 [ 368.844846][ T8794] do_syscall_64+0x4c/0xa0 [ 368.849374][ T8794] ? clear_bhb_loop+0x50/0xa0 [ 368.854085][ T8794] ? clear_bhb_loop+0x50/0xa0 [ 368.858790][ T8794] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 368.864738][ T8794] RIP: 0033:0x7f36891d5be9 [ 368.869149][ T8794] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 368.888836][ T8794] RSP: 002b:00007f3687c3e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 368.897374][ T8794] RAX: ffffffffffffffda RBX: 00007f368940cfa0 RCX: 00007f36891d5be9 [ 368.905545][ T8794] RDX: 0000000000000048 RSI: 0000200000000b00 RDI: 2000000000000000 [ 368.913549][ T8794] RBP: 00007f3687c3e090 R08: 0000000000000000 R09: 0000000000000000 [ 368.921580][ T8794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 368.929711][ T8794] R13: 00007f368940d038 R14: 00007f368940cfa0 R15: 00007ffed595c7c8 [ 368.937795][ T8794] [ 369.867245][ T8816] FAULT_INJECTION: forcing a failure. [ 369.867245][ T8816] name failslab, interval 1, probability 0, space 0, times 0 [ 369.904402][ T8816] CPU: 1 PID: 8816 Comm: syz.4.2906 Not tainted syzkaller #0 [ 369.911840][ T8816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 369.921932][ T8816] Call Trace: [ 369.925216][ T8816] [ 369.928205][ T8816] __dump_stack+0x21/0x30 [ 369.932600][ T8816] dump_stack_lvl+0xee/0x150 [ 369.937223][ T8816] ? show_regs_print_info+0x20/0x20 [ 369.942453][ T8816] ? dev_queue_xmit+0x20/0x20 [ 369.947145][ T8816] dump_stack+0x15/0x20 [ 369.951304][ T8816] should_fail+0x3c1/0x510 [ 369.955726][ T8816] __should_failslab+0xa4/0xe0 [ 369.960495][ T8816] should_failslab+0x9/0x20 [ 369.965005][ T8816] slab_pre_alloc_hook+0x3b/0xe0 [ 369.970041][ T8816] ? skb_clone+0x1cf/0x360 [ 369.974564][ T8816] kmem_cache_alloc+0x44/0x260 [ 369.979335][ T8816] skb_clone+0x1cf/0x360 [ 369.983578][ T8816] bpf_clone_redirect+0xa7/0x380 [ 369.988537][ T8816] bpf_prog_6893982b85ceadf7+0x56/0x554 [ 369.994085][ T8816] ? __kasan_slab_alloc+0xcf/0xf0 [ 369.999129][ T8816] ? __kasan_slab_alloc+0xbd/0xf0 [ 370.004180][ T8816] ? slab_post_alloc_hook+0x4f/0x2b0 [ 370.009481][ T8816] ? kmem_cache_alloc+0xf7/0x260 [ 370.014425][ T8816] ? __build_skb+0x2d/0x310 [ 370.018948][ T8816] ? build_skb+0x24/0x200 [ 370.023279][ T8816] ? bpf_prog_test_run_skb+0x279/0x1150 [ 370.028825][ T8816] ? bpf_prog_test_run+0x3d5/0x620 [ 370.034022][ T8816] ? __sys_bpf+0x52c/0x730 [ 370.038446][ T8816] ? __x64_sys_bpf+0x7c/0x90 [ 370.043232][ T8816] ? x64_sys_call+0x4b9/0x9a0 [ 370.047921][ T8816] ? do_syscall_64+0x4c/0xa0 [ 370.052543][ T8816] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 370.058630][ T8816] ? __kasan_check_read+0x11/0x20 [ 370.063767][ T8816] ? bpf_test_timer_continue+0x146/0x4a0 [ 370.069442][ T8816] bpf_test_run+0x33d/0x8d0 [ 370.073969][ T8816] ? convert___skb_to_skb+0x4f0/0x4f0 [ 370.079559][ T8816] ? eth_get_headlen+0x1f0/0x1f0 [ 370.084517][ T8816] ? convert___skb_to_skb+0x41/0x4f0 [ 370.089822][ T8816] bpf_prog_test_run_skb+0x9ec/0x1150 [ 370.095228][ T8816] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 370.101159][ T8816] bpf_prog_test_run+0x3d5/0x620 [ 370.106138][ T8816] ? bpf_prog_query+0x230/0x230 [ 370.111023][ T8816] ? selinux_bpf+0xce/0xf0 [ 370.115539][ T8816] ? security_bpf+0x82/0xa0 [ 370.120063][ T8816] __sys_bpf+0x52c/0x730 [ 370.124306][ T8816] ? bpf_link_show_fdinfo+0x310/0x310 [ 370.129687][ T8816] ? debug_smp_processor_id+0x17/0x20 [ 370.135085][ T8816] __x64_sys_bpf+0x7c/0x90 [ 370.139605][ T8816] x64_sys_call+0x4b9/0x9a0 [ 370.144117][ T8816] do_syscall_64+0x4c/0xa0 [ 370.148534][ T8816] ? clear_bhb_loop+0x50/0xa0 [ 370.153216][ T8816] ? clear_bhb_loop+0x50/0xa0 [ 370.157897][ T8816] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 370.163794][ T8816] RIP: 0033:0x7f9c3840abe9 [ 370.168220][ T8816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 370.187925][ T8816] RSP: 002b:00007f9c36e73038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 370.196346][ T8816] RAX: ffffffffffffffda RBX: 00007f9c38641fa0 RCX: 00007f9c3840abe9 [ 370.204327][ T8816] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 370.212326][ T8816] RBP: 00007f9c36e73090 R08: 0000000000000000 R09: 0000000000000000 [ 370.220300][ T8816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 370.228282][ T8816] R13: 00007f9c38642038 R14: 00007f9c38641fa0 R15: 00007ffc48a91758 [ 370.236277][ T8816] [ 372.292885][ T8860] bridge0: port 1(bridge_slave_0) entered blocking state [ 372.311476][ T8860] bridge0: port 1(bridge_slave_0) entered disabled state [ 372.353199][ T8860] device bridge_slave_0 entered promiscuous mode [ 372.414988][ T8860] bridge0: port 2(bridge_slave_1) entered blocking state [ 372.441019][ T8860] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.449629][ T8860] device bridge_slave_1 entered promiscuous mode [ 372.948395][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 372.966279][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 373.014206][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 373.035220][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 373.044059][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 373.051150][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 373.070816][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 373.112751][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 373.129213][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 373.145281][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 373.152419][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 373.179596][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 373.284032][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 373.373548][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 373.382835][ T8894] FAULT_INJECTION: forcing a failure. [ 373.382835][ T8894] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 373.432418][ T8860] device veth0_vlan entered promiscuous mode [ 373.462759][ T8894] CPU: 1 PID: 8894 Comm: syz.3.2923 Not tainted syzkaller #0 [ 373.470197][ T8894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 373.480278][ T8894] Call Trace: [ 373.481391][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 373.483767][ T8894] [ 373.483776][ T8894] __dump_stack+0x21/0x30 [ 373.483804][ T8894] dump_stack_lvl+0xee/0x150 [ 373.483825][ T8894] ? show_regs_print_info+0x20/0x20 [ 373.508840][ T8894] ? migrate_enable+0x192/0x260 [ 373.513725][ T8894] ? migrate_disable+0x180/0x180 [ 373.516567][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 373.518818][ T8894] dump_stack+0x15/0x20 [ 373.530366][ T8894] should_fail+0x3c1/0x510 [ 373.531739][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 373.534806][ T8894] should_fail_usercopy+0x1a/0x20 [ 373.534851][ T8894] _copy_from_user+0x20/0xd0 [ 373.551853][ T8894] generic_map_update_batch+0x44f/0x740 [ 373.557545][ T8894] ? generic_map_delete_batch+0x510/0x510 [ 373.559801][ T8860] device veth1_macvtap entered promiscuous mode [ 373.563299][ T8894] ? __fdget+0x1a1/0x230 [ 373.563328][ T8894] ? generic_map_delete_batch+0x510/0x510 [ 373.579655][ T8894] bpf_map_do_batch+0x463/0x5f0 [ 373.584634][ T8894] __sys_bpf+0x5e3/0x730 [ 373.585655][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 373.588904][ T8894] ? bpf_link_show_fdinfo+0x310/0x310 [ 373.602203][ T8894] __x64_sys_bpf+0x7c/0x90 [ 373.606825][ T8894] x64_sys_call+0x4b9/0x9a0 [ 373.611373][ T8894] do_syscall_64+0x4c/0xa0 [ 373.611687][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 373.615818][ T8894] ? clear_bhb_loop+0x50/0xa0 [ 373.615843][ T8894] ? clear_bhb_loop+0x50/0xa0 [ 373.615866][ T8894] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 373.615889][ T8894] RIP: 0033:0x7f43be641be9 [ 373.638809][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 373.639284][ T8894] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 373.649736][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 373.651961][ T8894] RSP: 002b:00007f43bd0aa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 373.688299][ T8894] RAX: ffffffffffffffda RBX: 00007f43be878fa0 RCX: 00007f43be641be9 [ 373.696287][ T8894] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 373.704281][ T8894] RBP: 00007f43bd0aa090 R08: 0000000000000000 R09: 0000000000000000 [ 373.712278][ T8894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 373.720515][ T8894] R13: 00007f43be879038 R14: 00007f43be878fa0 R15: 00007ffc7a21ff08 [ 373.728501][ T8894] [ 373.812943][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 374.166309][ T332] GPL: port 1(erspan0) entered disabled state [ 374.218007][ T332] device erspan0 left promiscuous mode [ 374.254218][ T332] GPL: port 1(erspan0) entered disabled state [ 374.660063][ T332] device veth0 left promiscuous mode [ 374.673006][ T332] bridge0: port 3(veth0) entered disabled state [ 374.783112][ T332] device bridge_slave_1 left promiscuous mode [ 374.819713][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.922948][ T332] device bridge_slave_0 left promiscuous mode [ 374.929164][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.938065][ T332] device veth1_macvtap left promiscuous mode [ 375.872876][ T8935] FAULT_INJECTION: forcing a failure. [ 375.872876][ T8935] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 376.015583][ T8935] CPU: 1 PID: 8935 Comm: syz.0.2935 Not tainted syzkaller #0 [ 376.023028][ T8935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 376.033109][ T8935] Call Trace: [ 376.036484][ T8935] [ 376.039444][ T8935] __dump_stack+0x21/0x30 [ 376.043789][ T8935] dump_stack_lvl+0xee/0x150 [ 376.048645][ T8935] ? show_regs_print_info+0x20/0x20 [ 376.053844][ T8935] ? _raw_spin_lock+0x8e/0xe0 [ 376.058654][ T8935] ? _raw_spin_trylock_bh+0x130/0x130 [ 376.064031][ T8935] dump_stack+0x15/0x20 [ 376.068245][ T8935] should_fail+0x3c1/0x510 [ 376.072807][ T8935] should_fail_alloc_page+0x55/0x80 [ 376.078239][ T8935] prepare_alloc_pages+0x156/0x600 [ 376.083480][ T8935] ? __alloc_pages_bulk+0xab0/0xab0 [ 376.088817][ T8935] ? fault_around_bytes_set+0xc0/0xc0 [ 376.094210][ T8935] ? debug_smp_processor_id+0x17/0x20 [ 376.099669][ T8935] __alloc_pages+0x10a/0x440 [ 376.104275][ T8935] ? prep_new_page+0x110/0x110 [ 376.109053][ T8935] shmem_alloc_and_acct_page+0x42b/0x870 [ 376.114818][ T8935] ? shmem_swapin_page+0x14c0/0x14c0 [ 376.120304][ T8935] ? xas_load+0x2ea/0x300 [ 376.124649][ T8935] ? pagecache_get_page+0xcbd/0xda0 [ 376.129906][ T8935] ? page_cache_prev_miss+0x270/0x270 [ 376.135290][ T8935] shmem_getpage_gfp+0xfe5/0x2310 [ 376.140419][ T8935] shmem_write_begin+0xce/0x1b0 [ 376.145281][ T8935] generic_perform_write+0x2ad/0x670 [ 376.150577][ T8935] ? grab_cache_page_write_begin+0xb0/0xb0 [ 376.156407][ T8935] ? file_remove_privs+0x590/0x590 [ 376.161522][ T8935] ? rwsem_write_trylock+0x130/0x300 [ 376.166820][ T8935] ? clear_nonspinnable+0x60/0x60 [ 376.171853][ T8935] ? avc_policy_seqno+0x1b/0x70 [ 376.176714][ T8935] __generic_file_write_iter+0x268/0x480 [ 376.182384][ T8935] generic_file_write_iter+0xa9/0x1d0 [ 376.187794][ T8935] vfs_write+0x802/0xf70 [ 376.192135][ T8935] ? file_end_write+0x1b0/0x1b0 [ 376.196991][ T8935] ? wait_for_completion_killable_timeout+0x10/0x10 [ 376.203700][ T8935] ? __fget_files+0x2c4/0x320 [ 376.208392][ T8935] ? __fdget_pos+0x2d2/0x380 [ 376.212985][ T8935] ? ksys_write+0x71/0x240 [ 376.217417][ T8935] ksys_write+0x140/0x240 [ 376.221749][ T8935] ? __ia32_sys_read+0x90/0x90 [ 376.226518][ T8935] ? debug_smp_processor_id+0x17/0x20 [ 376.231982][ T8935] __x64_sys_write+0x7b/0x90 [ 376.236611][ T8935] x64_sys_call+0x8ef/0x9a0 [ 376.241122][ T8935] do_syscall_64+0x4c/0xa0 [ 376.245546][ T8935] ? clear_bhb_loop+0x50/0xa0 [ 376.250226][ T8935] ? clear_bhb_loop+0x50/0xa0 [ 376.254911][ T8935] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 376.260917][ T8935] RIP: 0033:0x7f48c0d62be9 [ 376.265440][ T8935] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 376.285245][ T8935] RSP: 002b:00007f48bf7cb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 376.293667][ T8935] RAX: ffffffffffffffda RBX: 00007f48c0f99fa0 RCX: 00007f48c0d62be9 [ 376.301727][ T8935] RDX: 00000000002a979d RSI: 0000200000000000 RDI: 0000000000000003 [ 376.309715][ T8935] RBP: 00007f48bf7cb090 R08: 0000000000000000 R09: 0000000000000000 [ 376.317689][ T8935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 376.325758][ T8935] R13: 00007f48c0f9a038 R14: 00007f48c0f99fa0 R15: 00007ffcc8297068 [ 376.333958][ T8935] [ 376.933085][ T8956] device syzkaller0 entered promiscuous mode [ 376.959886][ T8954] GPL: port 1(erspan0) entered blocking state [ 376.966616][ T8954] GPL: port 1(erspan0) entered disabled state [ 376.980330][ T8954] device erspan0 entered promiscuous mode [ 376.991239][ T8954] GPL: port 1(erspan0) entered blocking state [ 376.997515][ T8954] GPL: port 1(erspan0) entered forwarding state [ 377.483645][ T8969] device syzkaller0 entered promiscuous mode [ 381.334282][ T9008] device syzkaller0 entered promiscuous mode [ 381.539712][ T9016] syz.1.2961[9016] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.540104][ T9016] syz.1.2961[9016] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 382.754881][ T9050] device syzkaller0 entered promiscuous mode [ 384.740769][ T9086] device syzkaller0 entered promiscuous mode [ 385.798432][ T9120] device sit0 left promiscuous mode [ 385.860393][ T9123] device sit0 entered promiscuous mode Connection to 10.128.0.86 closed by remote host. [ 387.784977][ T332] GPL: port 1(erspan0) entered disabled state [ 387.792478][ T332] GPL: port 1(erspan0) entered disabled state [ 387.799604][ T332] GPL: port 1(erspan0) entered disabled state [ 387.806602][ T332] device erspan0 left promiscuous mode [ 387.812076][ T332] GPL: port 1(erspan0) entered disabled state [ 387.820829][ T332] device erspan0 left promiscuous mode [ 387.826371][ T332] GPL: port 1(erspan0) entered disabled state [ 387.834488][ T332] device erspan0 left promiscuous mode [ 387.839987][ T332] GPL: port 1(erspan0) entered disabled state [ 388.223895][ T332] device bridge_slave_1 left promiscuous mode [ 388.230150][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.237822][ T332] device bridge_slave_0 left promiscuous mode [ 388.244471][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.253231][ T332] device bridge_slave_1 left promiscuous mode [ 388.259513][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.267121][ T332] device bridge_slave_0 left promiscuous mode [ 388.273333][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.281837][ T332] device bridge_slave_1 left promiscuous mode [ 388.288120][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.295701][ T332] device bridge_slave_0 left promiscuous mode [ 388.301852][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.310257][ T332] device bridge_slave_1 left promiscuous mode [ 388.316407][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.324102][ T332] device bridge_slave_0 left promiscuous mode [ 388.330234][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.339002][ T332] device veth1_macvtap left promiscuous mode [ 388.345199][ T332] device veth0_vlan left promiscuous mode [ 388.351101][ T332] device veth1_macvtap left promiscuous mode [ 388.357359][ T332] device veth0_vlan left promiscuous mode [ 388.363768][ T332] device veth1_macvtap left promiscuous mode [ 388.370052][ T332] device veth1_macvtap left promiscuous mode [ 391.303750][ T332] GPL: port 1(erspan0) entered disabled state [ 391.310763][ T332] device erspan0 left promiscuous mode [ 391.316343][ T332] GPL: port 1(erspan0) entered disabled state [ 391.623702][ T332] device bridge_slave_1 left promiscuous mode [ 391.629957][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.637480][ T332] device bridge_slave_0 left promiscuous mode [ 391.643660][ T332] bridge0: port 1(bridge_slave_0) entered disabled state