last executing test programs: 8.270079651s ago: executing program 1 (id=5594): bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000540)='fib6_table_lookup\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x14, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000001000000b7040000000000008500000033000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200001f000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f0000000180)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1d, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x70, '\x00', 0x0, @fallback=0x14}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x3, 0x5, &(0x7f00000006c0)=@framed={{0x18, 0x2, 0x0, 0x0, 0x80}, [@call={0x85, 0x0, 0x0, 0x27}, @call={0x85, 0x0, 0x0, 0x8c}]}, &(0x7f0000000680)='GPL\x00'}, 0x5d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x200}) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) 8.098008154s ago: executing program 1 (id=5598): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180200000000000000000000000000001801000020646c4300000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180200000000000000000000000000001801000020646c4300000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r0}, 0x10) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="06000000040000000300000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x3, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x8, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xe}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000000140)='syzkaller\x00', 0xaa2, 0x40, &(0x7f0000000180)=""/64, 0x41100, 0x9, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0)={0x0, 0x5, 0x5, 0x310}, 0x10, r3, r0, 0x7, 0x0, &(0x7f0000000340)=[{0x2, 0x3, 0xc, 0xb}, {0x1, 0x1, 0x9, 0x8}, {0x2, 0x3, 0xb, 0x1}, {0x2, 0x5, 0xd, 0x9}, {0x2, 0x2, 0xa, 0x5}, {0x3, 0x5, 0x10, 0x1}, {0x0, 0x1, 0x2, 0x1}], 0x10, 0xffff}, 0x94) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) 7.29391182s ago: executing program 1 (id=5611): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='-0'], 0x9) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x18) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 7.129005153s ago: executing program 1 (id=5612): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x28000, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000180)={0x4, &(0x7f0000000000)=[{0x1d, 0x0, 0x2}, {0x2}, {}, {0x6}]}) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r2, 0x10f, 0x85, 0x0, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r5, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x4004743d, 0x110e22fff6) write$cgroup_type(r4, &(0x7f0000000280), 0xfffffeed) 6.510031895s ago: executing program 1 (id=5613): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0xff, 0x5, 0x0, 0x2, 0x4, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0xfffffffffffffff8, 0x8}, 0x0, 0xc8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x1, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[@ANYRESOCT], 0xfdef) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000200000000000000000000040000000300000000010000060400000000219ae30000000000000000000036abf3ec4e74f804073cd633f7370f7639e83539f027b7f50a1d1f6fb34e7e4754727d319a53874ef074542f1842df41655ffbcdf0b111268b66624c6b769c1ec355bf05fbb182f4efc8e5759dbf7339f74438cfedd933510dbff811d3d41225932e74aa13e229dd7aa9d93f821cf7a722e20f63b71082ae20f0d92123a150ab0420e1ac73d57919096639f839d12e8513556b02f70eb68fd63d090d258ec8879d8c90f9"], 0xffffffffffffffff, 0x3e, 0xb1, 0x2}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x18, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10000}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000180)='signal_generate\x00', r6}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 6.509865305s ago: executing program 0 (id=5614): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x6}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) 6.451611616s ago: executing program 0 (id=5615): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB="ffffffff00000000002000000000000000000000eb1a34948550fee61cae32c018068f282a4fccf7b84b9b811a22f7d169f33b2a49ba388a098f99d5698ed12a0a6c7908b1b009d0d4026a48bdc528504a07f6e5ab869998a1b558cdc77534320f73672409f17da1b3c3e86b774bfeeec10dc3342de71b34f801365ca3c74cadcb589dadbfec89c9f32395b308c348b04c16475956acfb", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000281bbf6400000000000018110000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x17, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x79848af2}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'nr0\x00', 0x6132}) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[], 0xfe3a) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r2}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x8, 0x8}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000400850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x5, 0x0, 0x0, 0x0, 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000ff0100007b8af8ff00000000bfa200000000000007020000f8ffffffb703000004000000b704000000000000850000001500000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r8, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0857f9f582f0300000000000500", 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r6, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000900)={r7, &(0x7f0000000800)="def20feaab1d096690fa1a3614e41e4ed3c893fbb87533c1db2298351b73b5ab33d4115edfa1c2b69b5b447ef17ca9ac251a315ab460d5", &(0x7f0000000840)=""/138}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x40f9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0xfffffffffff7bbfe, 0x0, 0xe, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 2.079068s ago: executing program 0 (id=5624): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000080000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000040008500000083000000bf090000000000005509010000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffc}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x7}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x7, &(0x7f0000000440)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @call={0x85, 0x0, 0x0, 0x94}, @jmp={0x5, 0x1, 0xa, 0xb, 0x9, 0x1, 0xfffffffffffffff9}, @ringbuf_query], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x3, 0xc, &(0x7f0000000d00)=ANY=[@ANYBLOB="180000d530a100000000000000000000000000090000008bee357e85abdf8c20907ba57af72f52b6a63a7c3a27a40582f46ac6e2a149feb8f625b10f427b47167429d39b1838623e334c0c3501698164d565ee7c382b7194621a00301c9cf3cdaf35ab0ef469a339512d1ca84b388ce9a6247286bbc493ce6e6a432b6fcf835db06bb6fea3", @ANYRES32=r3, @ANYBLOB="00f5ffffff000000b7080008000000007b8af8ff0000000007020000f8ffffffb703000000f9c9a519907fa02a43cb38e093de002700b7040000000000008500fe98570000000000000000", @ANYRESDEC=r0, @ANYRES16=r3, @ANYRESDEC], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r7) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r6) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r9}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r9, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000002c0), &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xde, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000480), 0x0, 0x0, 0xdb, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r10, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x7, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc98, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x4, 0x2, 0x1, 0x50}, @jmp={0x5, 0x0, 0x8, 0x4, 0x9, 0xffffffffffffffe0, 0xfffffffffffffff0}, @map_fd={0x18, 0x2, 0x1, 0x0, r2}]}, &(0x7f0000000080)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x44, '\x00', r10, 0x25, r11, 0x8, &(0x7f0000000340)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0xd, 0x2, 0x5}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000400)=[r2], &(0x7f00000004c0)=[{0x3, 0x5, 0xe, 0xa}], 0x10, 0x7}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r12}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.032197931s ago: executing program 4 (id=5626): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)=@generic={&(0x7f00000002c0)='./file0\x00', 0xf6, 0x10}, 0x18) 1.972454342s ago: executing program 4 (id=5630): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc3}, 0x40) close(0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x13240, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000080)) close(0x4) 1.972034442s ago: executing program 2 (id=5631): recvmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000003680)}, 0x40012022) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000037c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000001000)='kfree\x00', r0}, 0x18) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xd, 0xffffffffffffffff, 0xc) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f0000003000), 0x201, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001000)=ANY=[], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x8, &(0x7f0000000280)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f00000004c0)='kfree\x00', r4}, 0x10) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x3, 0x0}, 0x8) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x4, 0x4, &(0x7f0000001180)=ANY=[@ANYBLOB="1800000004000000000000f1950003000000e5987d747d52a2dd3d7a4731dfa295085486704590e99eb41f5a08bb4eb8313926289974cd125a1a8e279fcbd70978bccc13f952637791f3b660c59ff2e21fc53bb9d77b584cbef041f3567a75cd9dc954b3436c452b4ccd8ae385d578aaada4be44cd3b625645f2533794be00088966233f37ab163feec181899198a4a7d25318bf1e9c39390a402fc83078c7b4e7c8882cd4a73333adead4f81d028786c4527a7f591f70af266e83c331c64c698aa7e9cdf15a2d0900"], &(0x7f00000002c0)='GPL\x00', 0x6, 0x44, &(0x7f0000000300)=""/68, 0x40f00, 0x4f, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x5, 0x4}, 0x8, 0x10, 0x0, 0x0, r5, r6, 0x3, &(0x7f00000004c0)=[r2, r2, r2, r2, r2, r2, r2, 0xffffffffffffffff], &(0x7f0000000500)=[{0x3, 0x4, 0xe, 0x7}, {0x3, 0x2, 0x9, 0x5}, {0x5, 0x5, 0xc, 0xb}], 0x10, 0x3ff}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000001080)={0x0, r3}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000e1a200000000000027020000f8ffffffb7030001000085000000430000009500"/65], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x0, 0x2, 0x2, &(0x7f0000000000)={0x0, 0x0}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1201, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x40004400, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000a80)) write$cgroup_pid(r7, &(0x7f00000001c0), 0xffbf) openat$cgroup_subtree(r1, &(0x7f0000001140), 0x2, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) 1.735963447s ago: executing program 4 (id=5632): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040), 0x8) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x11, 0x13, &(0x7f0000000140)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x41100, 0x7, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r2}, 0x18) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="180200000000000000000000000000008500000018000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009e00000095000000000000002f81c461b3fea834ceb0e17d9838c2830ca7ce46e581a192326a3698c79205e02f1561b0a3c595448e9f7024b45fb2006c9917fe2a42fcd2ce278009682dc8f7c867b177ec5bd50b92aedef35b6cd87b56690b4c96f63ab021ee1cf616d8af74911d5e51b76d2c31b8bece7b0f"], &(0x7f0000000080)='GPL\x00'}, 0x65) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000030000000800000001"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r4, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f00000003c0)='%-010d \x00'}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r5, &(0x7f0000000040)="a162d4591840"}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0xe, 0x0, &(0x7f0000000000)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x14, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="000000000000000000850000000700009500020000000000"], &(0x7f0000000080)='syzkaller\x00'}, 0x80) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000002c0)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r7}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) 1.350813444s ago: executing program 4 (id=5633): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='-0'], 0x9) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x18) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 1.341199114s ago: executing program 3 (id=5603): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000000)=0x1) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x4004743d, 0x110e22fff6) close(r0) write$cgroup_type(r3, &(0x7f0000000280), 0x9) 1.279158335s ago: executing program 4 (id=5634): r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0xa}, 0xa100, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 1.182382238s ago: executing program 4 (id=5635): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB="ffffffff00000000002000000000000000000000eb1a34948550fee61cae32c018068f282a4fccf7b84b9b811a22f7d169f33b2a49ba388a098f99d5698ed12a0a6c7908b1b009d0d4026a48bdc528504a07f6e5ab869998a1b558cdc77534320f73672409f17da1b3c3e86b774bfeeec10dc3342de71b34f801365ca3c74cadcb589dadbfec89c9f32395b308c348b04c16475956acfb", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000281bbf6400000000000018110000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x17, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x79848af2}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'nr0\x00', 0x6132}) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[], 0xfe3a) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r2}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x8, 0x8}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000400850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x5, 0x0, 0x0, 0x0, 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000ff0100007b8af8ff00000000bfa200000000000007020000f8ffffffb703000004000000b704000000000000850000001500000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r8, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0857f9f582f0300000000000500", 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r6, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000900)={r7, &(0x7f0000000800)="def20feaab1d096690fa1a3614e41e4ed3c893fbb87533c1db2298351b73b5ab33d4115edfa1c2b69b5b447ef17ca9ac251a315ab460d5", &(0x7f0000000840)=""/138}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x40f9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0xfffffffffff7bbfe, 0x0, 0xe, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 1.170506127s ago: executing program 3 (id=5636): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x5, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x8}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x109200, 0x0) ioctl$TUNSETIFF(r3, 0x400454da, &(0x7f0000000140)={'bond0\x00'}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) 1.063727769s ago: executing program 2 (id=5637): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x6}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) 989.970291ms ago: executing program 2 (id=5638): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000074"], 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x10, 0x8, &(0x7f0000000740)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xcd62b1ab) (async, rerun: 64) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r1, @ANYBLOB], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) (async) bpf$MAP_CREATE(0x0, 0x0, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x8, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="465b317af1e276f886993b455690345b20fe7f4a50c49dec411e323e5a79ffdc8d32c578497bfb1d289926b1f75d37d51ed507e39beb892d1b9b7ab7a4668fed0fe538d1db9fd6b5b70b79f42fe54cfa985fd071e19cbd6bce5f5d26545e87ce7c788e1d55993d8ce0f452ec6246d447b5b1413c82d5fd0562b3037d237d7f92e0b35da10d653e91435dcaf58c5d6e57cdb865abfb14194861"], 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r4}, 0x10) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r5}, 0x10) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x20000000}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) 973.389171ms ago: executing program 0 (id=5639): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x5, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x8}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x109200, 0x0) ioctl$TUNSETIFF(r3, 0x400454da, &(0x7f0000000140)={'bond0\x00'}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) (fail_nth: 1) 935.116722ms ago: executing program 2 (id=5640): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x5, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x8}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r5}, 0x10) write$cgroup_int(r4, &(0x7f0000000200), 0x43451) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x109200, 0x0) ioctl$TUNSETIFF(r7, 0x400454da, &(0x7f0000000140)={'bond0\x00'}) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) 921.044992ms ago: executing program 3 (id=5641): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="000000000018ca181659c35349be7d00850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x13240, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000200)='percpu_free_percpu\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x7}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x6, 0x40, 0x40, 0x45, 0x1}, 0x50) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x10, 0x0, 0xa, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f0000000680)='ext4_discard_preallocations\x00', r2, 0x0, 0x8}, 0x18) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x9b, &(0x7f00000008c0)=[{}], 0x8, 0x0, 0x0, 0x0, 0x0, 0xaa, 0x8, 0x8, &(0x7f0000000b00)}}, 0x10) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@bloom_filter={0x1e, 0xfffffff7, 0x10, 0x1, 0x7957e2b1533fdb8f, 0xffffffffffffffff, 0x7, '\x00', r11, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0xd}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x29, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@jmp={0x5, 0x1, 0xd, 0xc, 0x3, 0x20, 0xfffffffffffffff0}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @alu={0x4, 0x0, 0xa, 0x4, 0xb, 0x100, 0x8}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r10}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @map_fd={0x18, 0xa, 0x1, 0x0, 0x1}, @generic={0x6, 0x0, 0x9, 0x5, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000300)='GPL\x00', 0x3, 0x23, &(0x7f0000000340)=""/35, 0x41000, 0x4e, '\x00', r11, 0x25, r7, 0x8, &(0x7f0000000380)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0x5, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000440)=[{0x1, 0x1, 0x0, 0x2}, {0x1, 0x2, 0xd, 0xc}, {0x1, 0x2, 0x3}, {0x0, 0x5, 0x2, 0x5}, {0x5, 0x4, 0x7, 0xb}], 0x10, 0x7}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a1, &(0x7f0000000080)) 460.858931ms ago: executing program 0 (id=5642): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0xe60, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) 460.409091ms ago: executing program 2 (id=5643): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0xe60, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) (fail_nth: 5) 424.223612ms ago: executing program 0 (id=5644): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040), 0x8) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x11, 0x13, &(0x7f0000000140)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x41100, 0x7, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r2}, 0x18) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="180200000000000000000000000000008500000018000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009e00000095000000000000002f81c461b3fea834ceb0e17d9838c2830ca7ce46e581a192326a3698c79205e02f1561b0a3c595448e9f7024b45fb2006c9917fe2a42fcd2ce278009682dc8f7c867b177ec5bd50b92aedef35b6cd87b56690b4c96f63ab021ee1cf616d8af74911d5e51b76d2c31b8bece7b0f"], &(0x7f0000000080)='GPL\x00'}, 0x65) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000030000000800000001"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r4, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f00000003c0)='%-010d \x00'}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r5, &(0x7f0000000040)="a162d4591840"}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0xe, 0x0, &(0x7f0000000000)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x14, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="000000000000000000850000000700009500020000000000"], &(0x7f0000000080)='syzkaller\x00'}, 0x80) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000002c0)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r7}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) 365.032713ms ago: executing program 3 (id=5645): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='-0'], 0x9) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x18) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 326.430454ms ago: executing program 3 (id=5646): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) (rerun: 32) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES64, @ANYRESDEC=r1, @ANYRES32=r0], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r2}, 0x10) (async, rerun: 64) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r3}, 0x10) (async, rerun: 64) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0, 0x2}, 0x218201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) (async, rerun: 32) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80000000000000101000007f0c08000000000000000071273fa7b49301641184a907c5"], 0xfdef) (async, rerun: 32) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) (async) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) (async) ioctl$TUNATTACHFILTER(r7, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0xfffffffffffffe8b, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1beae40f00000000000100000000050000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r10}, 0x10) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x7000002}, 0x2c) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\t\x00\x00'], 0x50) (async, rerun: 32) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f00000000c0)={'macsec0\x00', 0x400}) (async) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f00000006c0)={'bridge_slave_0\x00', 0x600}) 10.13361ms ago: executing program 2 (id=5647): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000040000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 4.91231ms ago: executing program 1 (id=5613): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0xff, 0x5, 0x0, 0x2, 0x4, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0xfffffffffffffff8, 0x8}, 0x0, 0xc8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x1, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[@ANYRESOCT], 0xfdef) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000200000000000000000000040000000300000000010000060400000000219ae30000000000000000000036abf3ec4e74f804073cd633f7370f7639e83539f027b7f50a1d1f6fb34e7e4754727d319a53874ef074542f1842df41655ffbcdf0b111268b66624c6b769c1ec355bf05fbb182f4efc8e5759dbf7339f74438cfedd933510dbff811d3d41225932e74aa13e229dd7aa9d93f821cf7a722e20f63b71082ae20f0d92123a150ab0420e1ac73d57919096639f839d12e8513556b02f70eb68fd63d090d258ec8879d8c90f9"], 0xffffffffffffffff, 0x3e, 0xb1, 0x2}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x18, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10000}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000180)='signal_generate\x00', r6}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 0s ago: executing program 3 (id=5648): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x10000, 0x0, r1, 0xff070000, '\x00', 0x0, 0xffffffffffffffff, 0x4000000, 0x3}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) kernel console output (not intermixed with test programs): macsec0: link becomes ready [ 340.157925][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 340.169828][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 340.185617][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 340.194087][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 340.417586][T12656] FAULT_INJECTION: forcing a failure. [ 340.417586][T12656] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 340.472051][T12656] CPU: 1 PID: 12656 Comm: syz.3.4718 Not tainted syzkaller #0 [ 340.479583][T12656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 340.489665][T12656] Call Trace: [ 340.492960][T12656] [ 340.495913][T12656] __dump_stack+0x21/0x30 [ 340.500274][T12656] dump_stack_lvl+0xee/0x150 [ 340.504895][T12656] ? show_regs_print_info+0x20/0x20 [ 340.510141][T12656] dump_stack+0x15/0x20 [ 340.514327][T12656] should_fail+0x3c1/0x510 [ 340.519082][T12656] should_fail_usercopy+0x1a/0x20 [ 340.524139][T12656] strncpy_from_user+0x24/0x2e0 [ 340.529030][T12656] ? kmem_cache_alloc+0xf7/0x260 [ 340.533992][T12656] getname_flags+0xf4/0x500 [ 340.538601][T12656] __x64_sys_unlink+0x3c/0x50 [ 340.543427][T12656] x64_sys_call+0x878/0x9a0 [ 340.547950][T12656] do_syscall_64+0x4c/0xa0 [ 340.552382][T12656] ? clear_bhb_loop+0x50/0xa0 [ 340.557116][T12656] ? clear_bhb_loop+0x50/0xa0 [ 340.562006][T12656] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 340.568106][T12656] RIP: 0033:0x7fd1146f7be9 [ 340.572645][T12656] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 340.592277][T12656] RSP: 002b:00007fd113160038 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 340.600843][T12656] RAX: ffffffffffffffda RBX: 00007fd11492efa0 RCX: 00007fd1146f7be9 [ 340.608857][T12656] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000000 [ 340.616941][T12656] RBP: 00007fd113160090 R08: 0000000000000000 R09: 0000000000000000 [ 340.624937][T12656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 340.632921][T12656] R13: 00007fd11492f038 R14: 00007fd11492efa0 R15: 00007ffc6f9b84c8 [ 340.640915][T12656] [ 341.331351][T12669] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.338474][T12669] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.711489][T12669] device bridge_slave_0 entered promiscuous mode [ 341.937682][T12669] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.944976][T12669] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.953128][T12669] device bridge_slave_1 entered promiscuous mode [ 342.094458][T12691] FAULT_INJECTION: forcing a failure. [ 342.094458][T12691] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 342.110070][T12691] CPU: 1 PID: 12691 Comm: syz.0.4757 Not tainted syzkaller #0 [ 342.117575][T12691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 342.127647][T12691] Call Trace: [ 342.130939][T12691] [ 342.133874][T12691] __dump_stack+0x21/0x30 [ 342.138219][T12691] dump_stack_lvl+0xee/0x150 [ 342.142815][T12691] ? show_regs_print_info+0x20/0x20 [ 342.148028][T12691] dump_stack+0x15/0x20 [ 342.152196][T12691] should_fail+0x3c1/0x510 [ 342.156625][T12691] should_fail_usercopy+0x1a/0x20 [ 342.161658][T12691] _copy_to_user+0x20/0x90 [ 342.166079][T12691] simple_read_from_buffer+0xe9/0x160 [ 342.171457][T12691] proc_fail_nth_read+0x19a/0x210 [ 342.176499][T12691] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 342.182673][T12691] ? proc_fault_inject_write+0x2f0/0x2f0 [ 342.188400][T12691] ? vfs_read+0x26c/0xbe0 [ 342.192766][T12691] ? proc_fault_inject_write+0x2f0/0x2f0 [ 342.198415][T12691] vfs_read+0x282/0xbe0 [ 342.202666][T12691] ? kernel_read+0x1f0/0x1f0 [ 342.207257][T12691] ? __kasan_check_write+0x14/0x20 [ 342.212376][T12691] ? mutex_lock+0x95/0x1a0 [ 342.216794][T12691] ? wait_for_completion_killable_timeout+0x10/0x10 [ 342.223383][T12691] ? __fget_files+0x2c4/0x320 [ 342.228078][T12691] ? __fdget_pos+0x2d2/0x380 [ 342.232671][T12691] ? ksys_read+0x71/0x240 [ 342.237011][T12691] ksys_read+0x140/0x240 [ 342.241252][T12691] ? vfs_write+0xf70/0xf70 [ 342.245669][T12691] ? sched_clock_cpu+0x18/0x3c0 [ 342.250527][T12691] ? __bpf_trace_sys_enter+0x62/0x70 [ 342.255834][T12691] __x64_sys_read+0x7b/0x90 [ 342.260508][T12691] x64_sys_call+0x96d/0x9a0 [ 342.265030][T12691] do_syscall_64+0x4c/0xa0 [ 342.269471][T12691] ? clear_bhb_loop+0x50/0xa0 [ 342.274161][T12691] ? clear_bhb_loop+0x50/0xa0 [ 342.278873][T12691] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 342.284798][T12691] RIP: 0033:0x7f10202c85fc [ 342.289222][T12691] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 342.309126][T12691] RSP: 002b:00007f101ed32030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 342.317574][T12691] RAX: ffffffffffffffda RBX: 00007f1020500fa0 RCX: 00007f10202c85fc [ 342.325559][T12691] RDX: 000000000000000f RSI: 00007f101ed320a0 RDI: 0000000000000003 [ 342.333550][T12691] RBP: 00007f101ed32090 R08: 0000000000000000 R09: 0000000000000000 [ 342.341528][T12691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 342.349592][T12691] R13: 00007f1020501038 R14: 00007f1020500fa0 R15: 00007ffcadc4e938 [ 342.357599][T12691] [ 342.551026][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 342.559481][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 342.813054][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 342.821672][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 342.831226][ T407] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.838335][ T407] bridge0: port 1(bridge_slave_0) entered forwarding state [ 342.846536][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 342.865197][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 342.914574][ T407] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.921709][ T407] bridge0: port 2(bridge_slave_1) entered forwarding state [ 342.938761][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 342.949378][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 342.972358][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 342.982015][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 342.995146][ T10] device bridge_slave_1 left promiscuous mode [ 343.001398][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.009283][ T10] device bridge_slave_0 left promiscuous mode [ 343.015447][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.024039][ T10] device veth1_macvtap left promiscuous mode [ 343.197637][T12669] device veth0_vlan entered promiscuous mode [ 343.226740][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 343.248894][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 343.284442][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 343.303224][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 343.350936][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 343.363675][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 343.387305][T12669] device veth1_macvtap entered promiscuous mode [ 343.465778][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 343.488842][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 343.518934][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 343.566981][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 343.622178][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 343.886378][T12729] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.998567][T12729] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.006235][T12729] device bridge_slave_0 entered promiscuous mode [ 344.054033][T12729] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.068557][T12729] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.089979][T12729] device bridge_slave_1 entered promiscuous mode [ 344.959850][T12873] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.999148][T12873] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.006790][T12873] device bridge_slave_0 entered promiscuous mode [ 345.033336][T12873] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.040448][T12873] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.047993][T12873] device bridge_slave_1 entered promiscuous mode [ 345.235015][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 345.242602][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 345.260585][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 345.269192][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 345.277567][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.284973][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 345.303538][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 345.322811][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 345.331535][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 345.340147][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.347245][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 345.355736][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 345.364167][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 345.372355][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 345.380870][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 345.403453][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 345.411945][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 345.433767][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 345.442462][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 345.451240][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 345.459216][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 345.473198][T12729] device veth0_vlan entered promiscuous mode [ 345.517237][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 345.527109][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 345.538466][T12729] device veth1_macvtap entered promiscuous mode [ 345.563064][T12912] device wg2 left promiscuous mode [ 345.631099][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 345.644366][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 345.658913][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 345.688801][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 345.709731][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 345.728959][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.736102][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 345.755970][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 345.765065][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 345.776492][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.783696][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 345.853335][T12917] device syzkaller0 entered promiscuous mode [ 345.860406][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 345.868196][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 345.883146][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 345.909070][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 345.919069][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 345.947979][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 345.958037][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 345.966686][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 345.975514][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 345.988683][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 346.019031][ T10] device bridge_slave_1 left promiscuous mode [ 346.027273][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.038271][ T10] device bridge_slave_0 left promiscuous mode [ 346.044616][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.057525][ T10] device bridge_slave_1 left promiscuous mode [ 346.066454][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.158927][ T10] device bridge_slave_0 left promiscuous mode [ 346.165245][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.182280][ T10] device veth1_macvtap left promiscuous mode [ 346.188329][ T10] device veth0_vlan left promiscuous mode [ 346.197306][ T10] device veth1_macvtap left promiscuous mode [ 346.203535][ T10] device veth0_vlan left promiscuous mode [ 346.408872][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 346.417501][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 346.425303][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 346.454286][T12873] device veth0_vlan entered promiscuous mode [ 346.469771][T12916] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.477054][T12916] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.485384][T12916] device bridge_slave_0 entered promiscuous mode [ 346.497940][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 346.528940][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 346.548612][T12916] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.555797][T12916] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.569785][T12916] device bridge_slave_1 entered promiscuous mode [ 346.586009][T12873] device veth1_macvtap entered promiscuous mode [ 346.657159][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 346.665890][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 346.679418][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 346.688725][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 346.697403][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 347.022912][T12916] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.030072][T12916] bridge0: port 2(bridge_slave_1) entered forwarding state [ 347.037489][T12916] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.044545][T12916] bridge0: port 1(bridge_slave_0) entered forwarding state [ 347.069348][T13047] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.076429][T13047] bridge0: port 1(bridge_slave_0) entered disabled state [ 347.084041][T13047] device bridge_slave_0 entered promiscuous mode [ 347.138410][T13047] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.158539][T13047] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.166046][T13047] device bridge_slave_1 entered promiscuous mode [ 347.456450][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 347.464328][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 347.473509][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 347.578649][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 347.586926][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 347.629237][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 347.667844][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 347.818232][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 347.827803][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 347.870209][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 347.878206][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 347.890379][T13079] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.897484][T13079] bridge0: port 1(bridge_slave_0) entered disabled state [ 347.919076][T13079] device bridge_slave_0 entered promiscuous mode [ 347.927694][T13079] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.935033][T13079] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.942828][T13079] device bridge_slave_1 entered promiscuous mode [ 347.951330][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 347.959297][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 347.998172][T12916] device veth0_vlan entered promiscuous mode [ 348.061258][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 348.101492][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 348.185146][T12916] device veth1_macvtap entered promiscuous mode [ 348.292034][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 348.300422][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 348.328975][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 348.382323][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 348.391897][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 348.461974][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 348.477985][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 348.521036][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 348.533581][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 348.543040][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 348.550218][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 348.621579][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 348.630852][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 348.641022][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 348.649818][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 348.657046][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 348.802729][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 348.814401][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 348.868656][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 348.893817][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 349.036247][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 349.044850][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 349.073385][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 349.083320][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 349.091672][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 349.099506][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 349.109417][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 349.116931][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 349.126866][T13047] device veth0_vlan entered promiscuous mode [ 349.197589][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 349.207268][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 349.215972][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 349.223050][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 349.230604][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 349.239411][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 349.247589][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 349.254756][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 349.338965][ T10] device bridge_slave_1 left promiscuous mode [ 349.345279][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.353872][ T10] device bridge_slave_0 left promiscuous mode [ 349.360533][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.369169][ T10] device bridge_slave_1 left promiscuous mode [ 349.375486][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.386279][ T10] device bridge_slave_0 left promiscuous mode [ 349.392753][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.401500][ T10] device bridge_slave_1 left promiscuous mode [ 349.407662][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.415774][ T10] device bridge_slave_0 left promiscuous mode [ 349.422500][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.432265][ T10] device veth1_macvtap left promiscuous mode [ 349.438307][ T10] device veth0_vlan left promiscuous mode [ 349.444656][ T10] device veth1_macvtap left promiscuous mode [ 349.450981][ T10] device veth0_vlan left promiscuous mode [ 349.461379][ T10] device veth1_macvtap left promiscuous mode [ 349.467416][ T10] device veth0_vlan left promiscuous mode [ 349.683101][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 349.691097][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 349.699335][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 349.707310][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 349.715573][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 349.760032][T13047] device veth1_macvtap entered promiscuous mode [ 349.770033][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 349.778319][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 349.786659][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 349.799965][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 349.809201][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 349.864360][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 349.872817][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 349.908620][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 349.917366][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 349.926314][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 349.934607][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 349.972824][T13224] bridge0: port 1(bridge_slave_0) entered blocking state [ 349.980626][T13224] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.988426][T13224] device bridge_slave_0 entered promiscuous mode [ 349.996170][T13224] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.003467][T13224] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.011332][T13224] device bridge_slave_1 entered promiscuous mode [ 350.020008][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 350.028087][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 350.036644][T13079] device veth0_vlan entered promiscuous mode [ 350.051999][T13079] device veth1_macvtap entered promiscuous mode [ 350.071085][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 350.079902][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 350.088171][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 350.117331][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 350.126591][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 350.135877][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 350.147926][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 350.290268][T13224] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.297378][T13224] bridge0: port 2(bridge_slave_1) entered forwarding state [ 350.304751][T13224] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.311839][T13224] bridge0: port 1(bridge_slave_0) entered forwarding state [ 350.339840][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 350.351033][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.366166][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.394786][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 350.403420][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.410519][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 350.423950][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 350.433631][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.440707][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 350.452583][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 350.508159][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 350.567378][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 350.608272][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 350.619658][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 350.647936][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 350.669919][T13224] device veth0_vlan entered promiscuous mode [ 350.696518][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 350.712005][T13224] device veth1_macvtap entered promiscuous mode [ 350.729649][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 350.758876][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 350.831681][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 350.846808][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 350.897483][ T30] audit: type=1400 audit(1756971267.544:142): avc: denied { create } for pid=13266 comm="syz.1.4833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 350.984106][T13276] device wg2 entered promiscuous mode [ 351.309819][T13287] device syzkaller0 entered promiscuous mode [ 351.682161][T13295] bridge0: port 1(bridge_slave_0) entered blocking state [ 351.694240][T13295] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.703167][T13295] device bridge_slave_0 entered promiscuous mode [ 351.719537][T13295] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.727015][T13295] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.735383][T13295] device bridge_slave_1 entered promiscuous mode [ 351.875178][ T10] device bridge_slave_1 left promiscuous mode [ 351.885675][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.899095][ T10] device bridge_slave_0 left promiscuous mode [ 351.929043][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.961389][ T10] device veth1_macvtap left promiscuous mode [ 351.967481][ T10] device veth0_vlan left promiscuous mode [ 352.118890][T13320] FAULT_INJECTION: forcing a failure. [ 352.118890][T13320] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 352.132459][T13320] CPU: 1 PID: 13320 Comm: syz.2.4851 Not tainted syzkaller #0 [ 352.139955][T13320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 352.150037][T13320] Call Trace: [ 352.153315][T13320] [ 352.156240][T13320] __dump_stack+0x21/0x30 [ 352.160567][T13320] dump_stack_lvl+0xee/0x150 [ 352.165177][T13320] ? show_regs_print_info+0x20/0x20 [ 352.170371][T13320] dump_stack+0x15/0x20 [ 352.174518][T13320] should_fail+0x3c1/0x510 [ 352.178939][T13320] should_fail_usercopy+0x1a/0x20 [ 352.183998][T13320] _copy_to_user+0x20/0x90 [ 352.188547][T13320] simple_read_from_buffer+0xe9/0x160 [ 352.193951][T13320] proc_fail_nth_read+0x19a/0x210 [ 352.199115][T13320] ? proc_fault_inject_write+0x2f0/0x2f0 [ 352.204757][T13320] ? security_file_permission+0x83/0xa0 [ 352.210322][T13320] ? proc_fault_inject_write+0x2f0/0x2f0 [ 352.215961][T13320] vfs_read+0x282/0xbe0 [ 352.220139][T13320] ? kernel_read+0x1f0/0x1f0 [ 352.224735][T13320] ? __kasan_check_write+0x14/0x20 [ 352.229842][T13320] ? mutex_lock+0x95/0x1a0 [ 352.234251][T13320] ? wait_for_completion_killable_timeout+0x10/0x10 [ 352.240846][T13320] ? __fget_files+0x2c4/0x320 [ 352.245521][T13320] ? __fdget_pos+0x2d2/0x380 [ 352.250112][T13320] ? ksys_read+0x71/0x240 [ 352.254429][T13320] ksys_read+0x140/0x240 [ 352.258669][T13320] ? vfs_write+0xf70/0xf70 [ 352.263110][T13320] ? debug_smp_processor_id+0x17/0x20 [ 352.268581][T13320] __x64_sys_read+0x7b/0x90 [ 352.273091][T13320] x64_sys_call+0x96d/0x9a0 [ 352.277586][T13320] do_syscall_64+0x4c/0xa0 [ 352.281993][T13320] ? clear_bhb_loop+0x50/0xa0 [ 352.286665][T13320] ? clear_bhb_loop+0x50/0xa0 [ 352.291532][T13320] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 352.297441][T13320] RIP: 0033:0x7f29e31f25fc [ 352.301866][T13320] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 352.321570][T13320] RSP: 002b:00007f29e1c5c030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 352.330015][T13320] RAX: ffffffffffffffda RBX: 00007f29e342afa0 RCX: 00007f29e31f25fc [ 352.337988][T13320] RDX: 000000000000000f RSI: 00007f29e1c5c0a0 RDI: 0000000000000008 [ 352.346163][T13320] RBP: 00007f29e1c5c090 R08: 0000000000000000 R09: 0000000000000000 [ 352.354314][T13320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 352.362420][T13320] R13: 00007f29e342b038 R14: 00007f29e342afa0 R15: 00007fff892faf88 [ 352.370607][T13320] [ 352.779979][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 352.809609][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 352.851235][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 352.889209][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 352.942983][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.950097][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 353.065728][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 353.123264][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 353.148896][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.155981][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 353.199685][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 353.207344][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 353.222870][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 353.254579][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 353.285499][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 353.329090][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 353.386986][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 353.399076][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 353.407229][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 353.440650][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 353.448360][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 353.457666][T13295] device veth0_vlan entered promiscuous mode [ 353.613441][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 353.622191][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 353.673651][T13295] device veth1_macvtap entered promiscuous mode [ 353.735052][T13345] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.747016][T13345] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.755825][T13345] device bridge_slave_0 entered promiscuous mode [ 354.099116][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 354.107004][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 354.119750][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 354.128838][T13345] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.136005][T13345] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.144734][T13345] device bridge_slave_1 entered promiscuous mode [ 354.215806][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 354.224854][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 354.423275][T13376] FAULT_INJECTION: forcing a failure. [ 354.423275][T13376] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 354.444012][T13376] CPU: 0 PID: 13376 Comm: syz.0.4868 Not tainted syzkaller #0 [ 354.451997][T13376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 354.462082][T13376] Call Trace: [ 354.465381][T13376] [ 354.468332][T13376] __dump_stack+0x21/0x30 [ 354.472692][T13376] dump_stack_lvl+0xee/0x150 [ 354.477306][T13376] ? show_regs_print_info+0x20/0x20 [ 354.482534][T13376] ? migrate_enable+0x192/0x260 [ 354.487419][T13376] ? migrate_disable+0x180/0x180 [ 354.492746][T13376] dump_stack+0x15/0x20 [ 354.496932][T13376] should_fail+0x3c1/0x510 [ 354.501448][T13376] should_fail_usercopy+0x1a/0x20 [ 354.506555][T13376] _copy_from_user+0x20/0xd0 [ 354.511212][T13376] generic_map_update_batch+0x4a3/0x740 [ 354.517602][T13376] ? generic_map_delete_batch+0x510/0x510 [ 354.523367][T13376] ? generic_map_delete_batch+0x510/0x510 [ 354.529116][T13376] bpf_map_do_batch+0x463/0x5f0 [ 354.534105][T13376] __sys_bpf+0x5e3/0x730 [ 354.538386][T13376] ? bpf_link_show_fdinfo+0x310/0x310 [ 354.544166][T13376] ? debug_smp_processor_id+0x17/0x20 [ 354.549778][T13376] __x64_sys_bpf+0x7c/0x90 [ 354.554483][T13376] x64_sys_call+0x4b9/0x9a0 [ 354.559033][T13376] do_syscall_64+0x4c/0xa0 [ 354.563632][T13376] ? clear_bhb_loop+0x50/0xa0 [ 354.568377][T13376] ? clear_bhb_loop+0x50/0xa0 [ 354.573087][T13376] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 354.579009][T13376] RIP: 0033:0x7fb68cb7abe9 [ 354.583427][T13376] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 354.603034][T13376] RSP: 002b:00007fb68b5e3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 354.611463][T13376] RAX: ffffffffffffffda RBX: 00007fb68cdb1fa0 RCX: 00007fb68cb7abe9 [ 354.619527][T13376] RDX: 0000000000000038 RSI: 00002000000006c0 RDI: 000000000000001a [ 354.627497][T13376] RBP: 00007fb68b5e3090 R08: 0000000000000000 R09: 0000000000000000 [ 354.635471][T13376] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 354.643466][T13376] R13: 00007fb68cdb2038 R14: 00007fb68cdb1fa0 R15: 00007ffcfa34e848 [ 354.651491][T13376] [ 354.948940][T13381] device pim6reg1 entered promiscuous mode [ 355.074141][T13372] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.081309][T13372] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.089075][T13372] device bridge_slave_0 entered promiscuous mode [ 355.224842][T13372] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.232075][T13372] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.239651][T13372] device bridge_slave_1 entered promiscuous mode [ 355.773880][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 355.799834][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 355.928854][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 355.937444][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 355.945989][ T651] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.953113][ T651] bridge0: port 1(bridge_slave_0) entered forwarding state [ 355.997273][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 356.049732][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 356.058932][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 356.067300][ T651] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.074403][ T651] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.082223][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 356.090883][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 356.099249][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 356.107700][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 356.356618][ T10] device bridge_slave_1 left promiscuous mode [ 356.363439][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.371756][ T10] device bridge_slave_0 left promiscuous mode [ 356.378119][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.387472][ T10] device bridge_slave_1 left promiscuous mode [ 356.394489][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.402527][ T10] device bridge_slave_0 left promiscuous mode [ 356.413276][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.422574][ T10] device veth1_macvtap left promiscuous mode [ 356.428695][ T10] device veth0_vlan left promiscuous mode [ 356.434901][ T10] device veth1_macvtap left promiscuous mode [ 356.448587][ T10] device veth0_vlan left promiscuous mode [ 356.667546][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 356.675998][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 356.687984][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 356.696001][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 356.715331][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 356.723388][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 356.757126][T13345] device veth0_vlan entered promiscuous mode [ 356.806995][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 356.816053][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 356.866158][T13345] device veth1_macvtap entered promiscuous mode [ 356.879427][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 356.887418][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 356.896163][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 356.969044][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 356.977485][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 356.985867][ T651] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.992946][ T651] bridge0: port 1(bridge_slave_0) entered forwarding state [ 357.000856][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 357.009432][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 357.019235][ T651] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.026290][ T651] bridge0: port 2(bridge_slave_1) entered forwarding state [ 357.034000][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 357.042763][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 357.051468][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 357.067692][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 357.079128][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 357.140855][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 357.149604][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 357.202519][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 357.220566][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 357.301617][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 357.318974][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 357.327635][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 357.337225][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 357.346433][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 357.359121][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 357.369146][T13372] device veth0_vlan entered promiscuous mode [ 357.407773][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 357.416469][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 357.493163][T13372] device veth1_macvtap entered promiscuous mode [ 357.501179][T13422] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.508241][T13422] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.516028][T13422] device bridge_slave_0 entered promiscuous mode [ 357.588931][T13422] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.596472][T13422] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.709528][T13422] device bridge_slave_1 entered promiscuous mode [ 357.727377][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 357.735810][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 357.839106][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 357.858804][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 357.867376][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 358.679264][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 358.719325][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 358.747096][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 358.828790][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 358.902995][ T407] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.910110][ T407] bridge0: port 1(bridge_slave_0) entered forwarding state [ 358.949332][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 359.017504][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 359.037613][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 359.062168][ T407] bridge0: port 2(bridge_slave_1) entered blocking state [ 359.069294][ T407] bridge0: port 2(bridge_slave_1) entered forwarding state [ 359.078093][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 359.086439][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 359.123475][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 359.147964][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 359.156220][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 359.167675][T13422] device veth0_vlan entered promiscuous mode [ 359.186361][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 359.194405][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 359.224344][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 359.233684][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 359.244014][T13422] device veth1_macvtap entered promiscuous mode [ 359.324813][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 359.333078][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 359.399255][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 359.458821][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 359.467244][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 359.816276][ T10] device bridge_slave_1 left promiscuous mode [ 359.823513][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 359.850054][T13507] FAULT_INJECTION: forcing a failure. [ 359.850054][T13507] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 359.863231][T13507] CPU: 1 PID: 13507 Comm: syz.3.4900 Not tainted syzkaller #0 [ 359.863635][ T10] device bridge_slave_0 left promiscuous mode [ 359.870717][T13507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 359.870732][T13507] Call Trace: [ 359.870738][T13507] [ 359.870748][T13507] __dump_stack+0x21/0x30 [ 359.870776][T13507] dump_stack_lvl+0xee/0x150 [ 359.870797][T13507] ? show_regs_print_info+0x20/0x20 [ 359.880335][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 359.886931][T13507] dump_stack+0x15/0x20 [ 359.886960][T13507] should_fail+0x3c1/0x510 [ 359.923148][T13507] should_fail_usercopy+0x1a/0x20 [ 359.928189][T13507] _copy_from_iter+0x21a/0x1050 [ 359.933066][T13507] ? __kasan_check_write+0x14/0x20 [ 359.938187][T13507] ? skb_set_owner_w+0x24d/0x370 [ 359.943179][T13507] ? copy_mc_pipe_to_iter+0x770/0x770 [ 359.948562][T13507] ? check_stack_object+0x81/0x140 [ 359.953725][T13507] ? __check_object_size+0x2f4/0x3c0 [ 359.959026][T13507] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 359.964789][T13507] ? skb_put+0x10e/0x1f0 [ 359.969054][T13507] unix_stream_sendmsg+0x66b/0xc80 [ 359.974857][T13507] ? unix_show_fdinfo+0xa0/0xa0 [ 359.979736][T13507] ? security_socket_sendmsg+0x82/0xa0 [ 359.985221][T13507] ? unix_show_fdinfo+0xa0/0xa0 [ 359.990101][T13507] ____sys_sendmsg+0x5a2/0x8c0 [ 359.994884][T13507] ? __sys_sendmsg_sock+0x40/0x40 [ 359.999925][T13507] ? import_iovec+0x7c/0xb0 [ 360.004462][T13507] ___sys_sendmsg+0x1f0/0x260 [ 360.009177][T13507] ? __sys_sendmsg+0x250/0x250 [ 360.014063][T13507] ? __fdget+0x1a1/0x230 [ 360.018321][T13507] __x64_sys_sendmsg+0x1e2/0x2a0 [ 360.023271][T13507] ? ___sys_sendmsg+0x260/0x260 [ 360.028122][T13507] ? ksys_write+0x1eb/0x240 [ 360.032636][T13507] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 360.038722][T13507] x64_sys_call+0x4b/0x9a0 [ 360.043138][T13507] do_syscall_64+0x4c/0xa0 [ 360.047572][T13507] ? clear_bhb_loop+0x50/0xa0 [ 360.052249][T13507] ? clear_bhb_loop+0x50/0xa0 [ 360.056943][T13507] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 360.062860][T13507] RIP: 0033:0x7f0634c3dbe9 [ 360.067273][T13507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 360.086879][T13507] RSP: 002b:00007f06336a6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 360.095301][T13507] RAX: ffffffffffffffda RBX: 00007f0634e74fa0 RCX: 00007f0634c3dbe9 [ 360.103291][T13507] RDX: 0000000000020001 RSI: 0000200000000d40 RDI: 0000000000000003 [ 360.111361][T13507] RBP: 00007f06336a6090 R08: 0000000000000000 R09: 0000000000000000 [ 360.119335][T13507] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 360.127306][T13507] R13: 00007f0634e75038 R14: 00007f0634e74fa0 R15: 00007ffeb818aec8 [ 360.135306][T13507] [ 360.146907][ T10] device bridge_slave_1 left promiscuous mode [ 360.160566][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 360.179538][ T10] device bridge_slave_0 left promiscuous mode [ 360.190961][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.218086][ T10] device veth1_macvtap left promiscuous mode [ 360.236780][ T10] device veth0_vlan left promiscuous mode [ 360.243414][ T10] device veth1_macvtap left promiscuous mode [ 360.249647][ T10] device veth0_vlan left promiscuous mode [ 360.470865][T13500] device pim6reg1 entered promiscuous mode [ 361.932844][T13569] FAULT_INJECTION: forcing a failure. [ 361.932844][T13569] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 361.946095][T13569] CPU: 0 PID: 13569 Comm: syz.3.4924 Not tainted syzkaller #0 [ 361.953616][T13569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 361.963698][T13569] Call Trace: [ 361.967006][T13569] [ 361.969950][T13569] __dump_stack+0x21/0x30 [ 361.974304][T13569] dump_stack_lvl+0xee/0x150 [ 361.978901][T13569] ? show_regs_print_info+0x20/0x20 [ 361.984198][T13569] ? __kasan_check_write+0x14/0x20 [ 361.989316][T13569] ? _raw_spin_lock_irq+0x8f/0xe0 [ 361.994436][T13569] dump_stack+0x15/0x20 [ 361.998600][T13569] should_fail+0x3c1/0x510 [ 362.003026][T13569] should_fail_usercopy+0x1a/0x20 [ 362.008053][T13569] copy_page_from_iter_atomic+0x3fb/0x1350 [ 362.013958][T13569] ? pipe_zero+0x370/0x370 [ 362.018383][T13569] generic_perform_write+0x307/0x670 [ 362.023679][T13569] ? grab_cache_page_write_begin+0xb0/0xb0 [ 362.029606][T13569] ? file_remove_privs+0x590/0x590 [ 362.034736][T13569] ? rwsem_write_trylock+0x130/0x300 [ 362.040027][T13569] ? clear_nonspinnable+0x60/0x60 [ 362.045055][T13569] ? avc_policy_seqno+0x1b/0x70 [ 362.049910][T13569] __generic_file_write_iter+0x268/0x480 [ 362.055546][T13569] generic_file_write_iter+0xa9/0x1d0 [ 362.060921][T13569] vfs_write+0x802/0xf70 [ 362.065170][T13569] ? file_end_write+0x1b0/0x1b0 [ 362.070026][T13569] ? wait_for_completion_killable_timeout+0x10/0x10 [ 362.076619][T13569] ? __fget_files+0x2c4/0x320 [ 362.081302][T13569] ? __fdget_pos+0x2d2/0x380 [ 362.085894][T13569] ? ksys_write+0x71/0x240 [ 362.090312][T13569] ksys_write+0x140/0x240 [ 362.094647][T13569] ? __ia32_sys_read+0x90/0x90 [ 362.099414][T13569] ? debug_smp_processor_id+0x17/0x20 [ 362.104813][T13569] __x64_sys_write+0x7b/0x90 [ 362.109424][T13569] x64_sys_call+0x8ef/0x9a0 [ 362.113930][T13569] do_syscall_64+0x4c/0xa0 [ 362.118356][T13569] ? clear_bhb_loop+0x50/0xa0 [ 362.123057][T13569] ? clear_bhb_loop+0x50/0xa0 [ 362.127825][T13569] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 362.133721][T13569] RIP: 0033:0x7f0634c3dbe9 [ 362.138312][T13569] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 362.158011][T13569] RSP: 002b:00007f06336a6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 362.166450][T13569] RAX: ffffffffffffffda RBX: 00007f0634e74fa0 RCX: 00007f0634c3dbe9 [ 362.174425][T13569] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000007 [ 362.182506][T13569] RBP: 00007f06336a6090 R08: 0000000000000000 R09: 0000000000000000 [ 362.190498][T13569] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 362.198472][T13569] R13: 00007f0634e75038 R14: 00007f0634e74fa0 R15: 00007ffeb818aec8 [ 362.206458][T13569] [ 362.214572][T13559] device syzkaller0 entered promiscuous mode [ 362.592662][T13594] FAULT_INJECTION: forcing a failure. [ 362.592662][T13594] name failslab, interval 1, probability 0, space 0, times 0 [ 362.688572][T13594] CPU: 1 PID: 13594 Comm: syz.4.4937 Not tainted syzkaller #0 [ 362.696100][T13594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 362.706179][T13594] Call Trace: [ 362.709481][T13594] [ 362.712607][T13594] __dump_stack+0x21/0x30 [ 362.716959][T13594] dump_stack_lvl+0xee/0x150 [ 362.721754][T13594] ? show_regs_print_info+0x20/0x20 [ 362.727138][T13594] dump_stack+0x15/0x20 [ 362.731332][T13594] should_fail+0x3c1/0x510 [ 362.735805][T13594] __should_failslab+0xa4/0xe0 [ 362.740612][T13594] should_failslab+0x9/0x20 [ 362.745146][T13594] slab_pre_alloc_hook+0x3b/0xe0 [ 362.750121][T13594] __kmalloc+0x6d/0x2c0 [ 362.754307][T13594] ? security_prepare_creds+0x4e/0x140 [ 362.759796][T13594] security_prepare_creds+0x4e/0x140 [ 362.765199][T13594] prepare_creds+0x456/0x640 [ 362.769839][T13594] copy_creds+0xe4/0x640 [ 362.774107][T13594] copy_process+0x799/0x3210 [ 362.778725][T13594] ? kstrtol_from_user+0x260/0x260 [ 362.783869][T13594] ? __kasan_check_write+0x14/0x20 [ 362.789006][T13594] ? proc_fail_nth_write+0x17a/0x1f0 [ 362.794332][T13594] ? proc_fail_nth_read+0x210/0x210 [ 362.799554][T13594] ? __pidfd_prepare+0x150/0x150 [ 362.804609][T13594] ? security_file_permission+0x83/0xa0 [ 362.810315][T13594] kernel_clone+0x23f/0x940 [ 362.814854][T13594] ? create_io_thread+0x130/0x130 [ 362.819919][T13594] ? __kasan_check_write+0x14/0x20 [ 362.825065][T13594] ? mutex_unlock+0x89/0x220 [ 362.829804][T13594] __x64_sys_clone+0x176/0x1d0 [ 362.834621][T13594] ? __kasan_check_write+0x14/0x20 [ 362.839836][T13594] ? __ia32_sys_vfork+0xf0/0xf0 [ 362.844730][T13594] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 362.850914][T13594] x64_sys_call+0x41f/0x9a0 [ 362.855455][T13594] do_syscall_64+0x4c/0xa0 [ 362.859897][T13594] ? clear_bhb_loop+0x50/0xa0 [ 362.864611][T13594] ? clear_bhb_loop+0x50/0xa0 [ 362.869316][T13594] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 362.875244][T13594] RIP: 0033:0x7f8dd6c46be9 [ 362.879799][T13594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 362.899435][T13594] RSP: 002b:00007f8dd56aefe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 362.907888][T13594] RAX: ffffffffffffffda RBX: 00007f8dd6e7dfa0 RCX: 00007f8dd6c46be9 [ 362.915873][T13594] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 362.923869][T13594] RBP: 00007f8dd56af090 R08: 0000000000000000 R09: 0000000000000000 [ 362.931960][T13594] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 362.939933][T13594] R13: 00007f8dd6e7e038 R14: 00007f8dd6e7dfa0 R15: 00007ffdc8ad33a8 [ 362.947917][T13594] [ 363.465335][T13609] device syzkaller0 entered promiscuous mode [ 364.805347][T13628] device wg2 entered promiscuous mode [ 364.939816][T13646] device syzkaller0 entered promiscuous mode [ 366.455542][T13764] bridge0: port 1(bridge_slave_0) entered blocking state [ 366.508801][T13764] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.548294][T13764] device bridge_slave_0 entered promiscuous mode [ 366.582088][T13764] bridge0: port 2(bridge_slave_1) entered blocking state [ 366.607962][T13764] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.633572][T13764] device bridge_slave_1 entered promiscuous mode [ 366.942697][ T10] device bridge_slave_1 left promiscuous mode [ 366.958012][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.007027][ T10] device bridge_slave_0 left promiscuous mode [ 367.038616][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.080941][ T10] device veth1_macvtap left promiscuous mode [ 367.130950][ T10] device veth0_vlan left promiscuous mode [ 367.907736][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 367.920170][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 367.939592][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 367.948270][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 367.976032][ T651] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.983365][ T651] bridge0: port 1(bridge_slave_0) entered forwarding state [ 368.073681][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 368.082121][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 368.097106][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 368.105645][ T651] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.112826][ T651] bridge0: port 2(bridge_slave_1) entered forwarding state [ 368.138671][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 368.146880][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 368.159305][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 368.173312][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 368.212522][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 368.221081][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 368.243037][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 368.251414][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 368.259914][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 368.267474][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 368.298241][T13804] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.309022][T13804] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.334667][T13804] device bridge_slave_0 entered promiscuous mode [ 368.359245][T13764] device veth0_vlan entered promiscuous mode [ 368.368180][T13804] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.429118][T13804] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.459071][T13804] device bridge_slave_1 entered promiscuous mode [ 368.479152][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 368.499322][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 368.529166][T13764] device veth1_macvtap entered promiscuous mode [ 368.560193][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 368.582113][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 368.598397][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 368.655521][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 368.663967][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 368.802558][T13804] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.809667][T13804] bridge0: port 2(bridge_slave_1) entered forwarding state [ 368.817121][T13804] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.824196][T13804] bridge0: port 1(bridge_slave_0) entered forwarding state [ 368.853358][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 368.881789][ T407] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.897799][ T407] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.956052][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 368.989926][ T407] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.997024][ T407] bridge0: port 1(bridge_slave_0) entered forwarding state [ 369.018914][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 369.028329][ T407] bridge0: port 2(bridge_slave_1) entered blocking state [ 369.035430][ T407] bridge0: port 2(bridge_slave_1) entered forwarding state [ 369.044221][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 369.052472][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 369.068121][T13868] device wg2 left promiscuous mode [ 369.139079][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 369.147799][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 369.164402][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 369.172648][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 369.183957][T13804] device veth0_vlan entered promiscuous mode [ 369.211448][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 369.219246][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 369.238237][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 369.246747][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 369.281679][T13804] device veth1_macvtap entered promiscuous mode [ 369.299978][T13869] bridge0: port 1(bridge_slave_0) entered blocking state [ 369.307069][T13869] bridge0: port 1(bridge_slave_0) entered disabled state [ 369.314843][T13869] device bridge_slave_0 entered promiscuous mode [ 369.329342][T13869] bridge0: port 2(bridge_slave_1) entered blocking state [ 369.348529][T13869] bridge0: port 2(bridge_slave_1) entered disabled state [ 369.356239][T13869] device bridge_slave_1 entered promiscuous mode [ 369.410525][ T10] device bridge_slave_1 left promiscuous mode [ 369.416785][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 369.425151][ T10] device bridge_slave_0 left promiscuous mode [ 369.431651][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 369.440276][ T10] device veth1_macvtap left promiscuous mode [ 369.446367][ T10] device veth0_vlan left promiscuous mode [ 369.544764][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 369.552906][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 369.561465][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 369.580093][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 369.588540][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 369.989008][T13869] bridge0: port 2(bridge_slave_1) entered blocking state [ 369.996125][T13869] bridge0: port 2(bridge_slave_1) entered forwarding state [ 370.129418][ T407] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.246458][T13907] FAULT_INJECTION: forcing a failure. [ 370.246458][T13907] name failslab, interval 1, probability 0, space 0, times 0 [ 370.288599][T13907] CPU: 1 PID: 13907 Comm: syz.2.4999 Not tainted syzkaller #0 [ 370.296127][T13907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 370.306206][T13907] Call Trace: [ 370.309511][T13907] [ 370.312460][T13907] __dump_stack+0x21/0x30 [ 370.316819][T13907] dump_stack_lvl+0xee/0x150 [ 370.321434][T13907] ? show_regs_print_info+0x20/0x20 [ 370.326661][T13907] dump_stack+0x15/0x20 [ 370.330835][T13907] should_fail+0x3c1/0x510 [ 370.335278][T13907] ? skb_copy+0x13e/0x720 [ 370.339637][T13907] __should_failslab+0xa4/0xe0 [ 370.344529][T13907] should_failslab+0x9/0x20 [ 370.349065][T13907] slab_pre_alloc_hook+0x3b/0xe0 [ 370.354034][T13907] ? skb_copy+0x13e/0x720 [ 370.358399][T13907] ? skb_copy+0x13e/0x720 [ 370.362756][T13907] __kmalloc_track_caller+0x6c/0x2c0 [ 370.368069][T13907] ? skb_copy+0x13e/0x720 [ 370.372536][T13907] ? skb_copy+0x13e/0x720 [ 370.376896][T13907] __alloc_skb+0x21a/0x740 [ 370.381343][T13907] skb_copy+0x13e/0x720 [ 370.385525][T13907] ? __kasan_kmalloc+0xec/0x110 [ 370.390409][T13907] ? __kasan_kmalloc+0xda/0x110 [ 370.395297][T13907] ? memcpy+0x56/0x70 [ 370.399310][T13907] tipc_buf_append+0x6dd/0x900 [ 370.404218][T13907] ? tipc_msg_create+0x4e0/0x4e0 [ 370.409186][T13907] ? skb_clone+0x202/0x360 [ 370.413633][T13907] tipc_msg_reassemble+0x282/0x440 [ 370.418776][T13907] tipc_mcast_xmit+0x1c6/0x1710 [ 370.423650][T13907] ? kasan_unpoison+0x67/0x90 [ 370.428356][T13907] ? tipc_bcbase_xmit+0x9d0/0x9d0 [ 370.433581][T13907] ? check_stack_object+0x81/0x140 [ 370.438743][T13907] ? __check_object_size+0x2f4/0x3c0 [ 370.444055][T13907] ? tipc_msg_build+0xba1/0xfb0 [ 370.448943][T13907] __tipc_sendmsg+0x1d81/0x2680 [ 370.453905][T13907] ? _raw_spin_lock+0xe0/0xe0 [ 370.458613][T13907] ? local_bh_enable+0x30/0x30 [ 370.463935][T13907] ? wait_woken+0x170/0x170 [ 370.468711][T13907] ? avc_has_perm+0x158/0x240 [ 370.473411][T13907] ? __kasan_check_write+0x14/0x20 [ 370.478686][T13907] ? _raw_spin_lock_bh+0x8e/0xe0 [ 370.483823][T13907] ? _raw_spin_lock_irq+0xe0/0xe0 [ 370.489222][T13907] ? unwind_get_return_address+0x4d/0x90 [ 370.494870][T13907] ? stack_trace_save+0xe0/0xe0 [ 370.499733][T13907] ? __local_bh_enable_ip+0x58/0x80 [ 370.504941][T13907] ? lock_sock_nested+0x1f1/0x290 [ 370.510237][T13907] ? sock_init_data+0xc0/0xc0 [ 370.514920][T13907] ? stack_trace_save+0x98/0xe0 [ 370.519779][T13907] tipc_sendmsg+0x55/0x70 [ 370.524134][T13907] ? tipc_recvmsg+0x13a0/0x13a0 [ 370.529255][T13907] ____sys_sendmsg+0x5a2/0x8c0 [ 370.534165][T13907] ? __sys_sendmsg_sock+0x40/0x40 [ 370.539230][T13907] ? import_iovec+0x7c/0xb0 [ 370.543750][T13907] ___sys_sendmsg+0x1f0/0x260 [ 370.548441][T13907] ? __sys_sendmsg+0x250/0x250 [ 370.553261][T13907] ? __fdget+0x1a1/0x230 [ 370.557602][T13907] __x64_sys_sendmsg+0x1e2/0x2a0 [ 370.562559][T13907] ? ___sys_sendmsg+0x260/0x260 [ 370.567449][T13907] ? ksys_write+0x1eb/0x240 [ 370.571962][T13907] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 370.578147][T13907] x64_sys_call+0x4b/0x9a0 [ 370.582565][T13907] do_syscall_64+0x4c/0xa0 [ 370.586983][T13907] ? clear_bhb_loop+0x50/0xa0 [ 370.591660][T13907] ? clear_bhb_loop+0x50/0xa0 [ 370.596718][T13907] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 370.602652][T13907] RIP: 0033:0x7f8e461a3be9 [ 370.607089][T13907] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 370.626912][T13907] RSP: 002b:00007f8e44c0c038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 370.635476][T13907] RAX: ffffffffffffffda RBX: 00007f8e463dafa0 RCX: 00007f8e461a3be9 [ 370.644191][T13907] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000004 [ 370.652434][T13907] RBP: 00007f8e44c0c090 R08: 0000000000000000 R09: 0000000000000000 [ 370.660408][T13907] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 370.668480][T13907] R13: 00007f8e463db038 R14: 00007f8e463dafa0 R15: 00007ffde5ca7b58 [ 370.676485][T13907] [ 370.693504][T13907] tipc: Failed do clone local mcast rcv buffer [ 370.793101][T13915] FAULT_INJECTION: forcing a failure. [ 370.793101][T13915] name failslab, interval 1, probability 0, space 0, times 0 [ 370.805933][T13915] CPU: 0 PID: 13915 Comm: syz.1.5003 Not tainted syzkaller #0 [ 370.813679][T13915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 370.823866][T13915] Call Trace: [ 370.827275][T13915] [ 370.830317][T13915] __dump_stack+0x21/0x30 [ 370.834944][T13915] dump_stack_lvl+0xee/0x150 [ 370.839755][T13915] ? show_regs_print_info+0x20/0x20 [ 370.845803][T13915] ? unwind_get_return_address+0x4d/0x90 [ 370.851502][T13915] ? stack_trace_save+0xe0/0xe0 [ 370.856544][T13915] dump_stack+0x15/0x20 [ 370.860739][T13915] should_fail+0x3c1/0x510 [ 370.865895][T13915] __should_failslab+0xa4/0xe0 [ 370.872945][T13915] should_failslab+0x9/0x20 [ 370.877765][T13915] slab_pre_alloc_hook+0x3b/0xe0 [ 370.882731][T13915] ? dst_alloc+0x15c/0x1d0 [ 370.887282][T13915] kmem_cache_alloc+0x44/0x260 [ 370.892163][T13915] ? ipv6_sysctl_rtcache_flush+0x100/0x100 [ 370.897992][T13915] dst_alloc+0x15c/0x1d0 [ 370.902258][T13915] icmp6_dst_alloc+0xf5/0x560 [ 370.906952][T13915] ? security_sk_classify_flow+0x7b/0x90 [ 370.912790][T13915] ? icmpv6_flow_init+0xd2/0x130 [ 370.917766][T13915] ndisc_send_skb+0x258/0xc70 [ 370.922470][T13915] ? x64_sys_call+0x8ef/0x9a0 [ 370.927168][T13915] ? do_syscall_64+0x4c/0xa0 [ 370.931870][T13915] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 370.937978][T13915] ? ndisc_alloc_skb+0x2b0/0x2b0 [ 370.942953][T13915] ? memcpy+0x56/0x70 [ 370.946964][T13915] ndisc_send_ns+0x842/0xaf0 [ 370.951580][T13915] ? ndisc_send_skb+0xc70/0xc70 [ 370.956458][T13915] ? ipv6_chk_addr_and_flags+0x3e/0x60 [ 370.962129][T13915] ndisc_solicit+0x30a/0x440 [ 370.966743][T13915] ? ndisc_cleanup+0x40/0x40 [ 370.971360][T13915] ? skb_clone+0x202/0x360 [ 370.975821][T13915] ? ndisc_cleanup+0x40/0x40 [ 370.980438][T13915] __neigh_event_send+0xcc3/0x11c0 [ 370.985588][T13915] ? __local_bh_enable_ip+0x58/0x80 [ 370.990808][T13915] neigh_resolve_output+0x1e1/0x770 [ 370.996112][T13915] ? __local_bh_enable_ip+0x58/0x80 [ 371.001341][T13915] ip6_finish_output2+0x10b7/0x1760 [ 371.006565][T13915] ? __ip6_finish_output+0x7d0/0x7d0 [ 371.011954][T13915] ? __local_bh_enable_ip+0x58/0x80 [ 371.017185][T13915] ? local_bh_enable+0x1f/0x30 [ 371.021974][T13915] __ip6_finish_output+0x61e/0x7d0 [ 371.027110][T13915] ip6_finish_output+0x31/0x240 [ 371.032069][T13915] ? ip6_output+0x384/0x3b0 [ 371.036597][T13915] ip6_output+0x1d1/0x3b0 [ 371.040970][T13915] ? ac6_seq_show+0xf0/0xf0 [ 371.045504][T13915] ? ip6_output+0x3b0/0x3b0 [ 371.050031][T13915] ip6_local_out+0x21a/0x3d0 [ 371.054667][T13915] ? dst_output+0x80/0x80 [ 371.059021][T13915] ? __ip6_local_out+0x350/0x350 [ 371.063981][T13915] ? __kasan_check_read+0x11/0x20 [ 371.069026][T13915] ? ip6_setup_cork+0xd10/0x1290 [ 371.074083][T13915] ip6_push_pending_frames+0x17d/0x2d0 [ 371.079739][T13915] icmpv6_push_pending_frames+0x29f/0x440 [ 371.085657][T13915] icmp6_send+0xf6d/0x14c0 [ 371.090093][T13915] ? icmpv6_push_pending_frames+0x440/0x440 [ 371.096022][T13915] ? numa_migrate_prep+0xd0/0xd0 [ 371.101493][T13915] ? __skb_flow_dissect+0x520c/0x5930 [ 371.106901][T13915] icmpv6_param_prob+0x2f/0x40 [ 371.111790][T13915] ip6_parse_tlv+0x1a4c/0x1ba0 [ 371.116604][T13915] ipv6_parse_hopopts+0x2a3/0x580 [ 371.121652][T13915] ip6_rcv_core+0xca7/0x1390 [ 371.126785][T13915] ipv6_rcv+0xca/0x210 [ 371.130866][T13915] ? irqentry_exit+0x37/0x40 [ 371.135490][T13915] ? exc_page_fault+0x5e/0xb0 [ 371.140356][T13915] ? ip6_rcv_finish+0x360/0x360 [ 371.145241][T13915] ? asm_exc_page_fault+0x27/0x30 [ 371.150373][T13915] ? _copy_from_iter+0x181/0x1050 [ 371.155529][T13915] ? ip6_rcv_finish+0x360/0x360 [ 371.160654][T13915] __netif_receive_skb+0xc8/0x280 [ 371.166650][T13915] ? _copy_from_iter+0x4ae/0x1050 [ 371.171703][T13915] ? __kasan_check_write+0x14/0x20 [ 371.177008][T13915] netif_receive_skb+0x98/0x3d0 [ 371.181872][T13915] ? netif_receive_skb_core+0x100/0x100 [ 371.187433][T13915] ? __kernel_text_address+0xa0/0x100 [ 371.192905][T13915] ? virtio_net_hdr_to_skb+0x9df/0x11c0 [ 371.198463][T13915] tun_rx_batched+0x5e8/0x710 [ 371.203153][T13915] ? local_bh_enable+0x30/0x30 [ 371.208042][T13915] tun_get_user+0x279c/0x33c0 [ 371.212733][T13915] ? __kasan_init_slab_obj+0x10/0x40 [ 371.218035][T13915] ? kmem_cache_free+0x100/0x320 [ 371.222982][T13915] ? __x64_sys_openat+0x136/0x160 [ 371.228038][T13915] ? x64_sys_call+0x219/0x9a0 [ 371.232729][T13915] ? tun_do_read+0x1c40/0x1c40 [ 371.237625][T13915] ? kstrtouint_from_user+0x1a0/0x200 [ 371.243010][T13915] ? kstrtol_from_user+0x260/0x260 [ 371.248140][T13915] ? avc_policy_seqno+0x1b/0x70 [ 371.253005][T13915] ? selinux_file_permission+0x2aa/0x510 [ 371.259096][T13915] tun_chr_write_iter+0x1eb/0x2e0 [ 371.264679][T13915] vfs_write+0x802/0xf70 [ 371.269043][T13915] ? file_end_write+0x1b0/0x1b0 [ 371.273937][T13915] ? __fget_files+0x2c4/0x320 [ 371.278940][T13915] ? __fdget_pos+0x1f7/0x380 [ 371.283558][T13915] ? ksys_write+0x71/0x240 [ 371.287992][T13915] ksys_write+0x140/0x240 [ 371.292336][T13915] ? __ia32_sys_read+0x90/0x90 [ 371.297204][T13915] ? debug_smp_processor_id+0x17/0x20 [ 371.302696][T13915] __x64_sys_write+0x7b/0x90 [ 371.307332][T13915] x64_sys_call+0x8ef/0x9a0 [ 371.311857][T13915] do_syscall_64+0x4c/0xa0 [ 371.316396][T13915] ? clear_bhb_loop+0x50/0xa0 [ 371.321100][T13915] ? clear_bhb_loop+0x50/0xa0 [ 371.325796][T13915] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 371.331719][T13915] RIP: 0033:0x7f864716fbe9 [ 371.336312][T13915] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 371.356698][T13915] RSP: 002b:00007f8645bd8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 371.365316][T13915] RAX: ffffffffffffffda RBX: 00007f86473a6fa0 RCX: 00007f864716fbe9 [ 371.373409][T13915] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 371.381694][T13915] RBP: 00007f8645bd8090 R08: 0000000000000000 R09: 0000000000000000 [ 371.389690][T13915] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 371.398093][T13915] R13: 00007f86473a7038 R14: 00007f86473a6fa0 R15: 00007fffd55424b8 [ 371.406292][T13915] [ 371.456993][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 371.482474][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 371.513584][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 371.579958][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 371.645993][ T30] audit: type=1400 audit(1756971288.294:143): avc: denied { create } for pid=13927 comm="syz.0.5008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 371.656779][ T407] bridge0: port 1(bridge_slave_0) entered blocking state [ 371.674140][ T407] bridge0: port 1(bridge_slave_0) entered forwarding state [ 371.768799][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 371.781245][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 371.798787][ T407] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.805914][ T407] bridge0: port 2(bridge_slave_1) entered forwarding state [ 371.873820][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 371.882139][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 371.959680][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 371.985143][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 372.141055][T13949] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.148323][T13949] bridge0: port 1(bridge_slave_0) entered disabled state [ 372.170277][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 372.185553][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 372.255720][T13869] device veth0_vlan entered promiscuous mode [ 372.300652][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 372.316915][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 372.330557][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 372.338231][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 372.357194][T13869] device veth1_macvtap entered promiscuous mode [ 372.367537][T13949] device bridge_slave_1 left promiscuous mode [ 372.376004][T13949] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.395289][T13949] device bridge_slave_0 left promiscuous mode [ 372.418274][T13949] bridge0: port 1(bridge_slave_0) entered disabled state [ 372.532804][T13954] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.540130][T13954] bridge0: port 1(bridge_slave_0) entered disabled state [ 372.551193][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 372.567324][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 372.575816][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 372.586629][T13960] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.594109][T13960] bridge0: port 1(bridge_slave_0) entered disabled state [ 372.620199][T13961] device bridge_slave_1 left promiscuous mode [ 372.629360][T13961] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.654640][T13961] device bridge_slave_0 left promiscuous mode [ 372.664124][T13961] bridge0: port 1(bridge_slave_0) entered disabled state [ 372.797990][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 372.816636][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 372.825704][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 372.835999][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 372.849787][T13962] FAULT_INJECTION: forcing a failure. [ 372.849787][T13962] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 372.874512][T13962] CPU: 0 PID: 13962 Comm: syz.2.5018 Not tainted syzkaller #0 [ 372.882037][T13962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 372.892131][T13962] Call Trace: [ 372.895521][T13962] [ 372.898478][T13962] __dump_stack+0x21/0x30 [ 372.902854][T13962] dump_stack_lvl+0xee/0x150 [ 372.907465][T13962] ? show_regs_print_info+0x20/0x20 [ 372.912692][T13962] dump_stack+0x15/0x20 [ 372.917073][T13962] should_fail+0x3c1/0x510 [ 372.921518][T13962] should_fail_usercopy+0x1a/0x20 [ 372.926567][T13962] _copy_from_user+0x20/0xd0 [ 372.931195][T13962] br_ioctl_stub+0x2a7/0x7a0 [ 372.935947][T13962] ? vfs_write+0xc17/0xf70 [ 372.940393][T13962] ? br_dev_siocdevprivate+0x1320/0x1320 [ 372.946082][T13962] ? __mutex_lock_slowpath+0xe/0x10 [ 372.951301][T13962] ? mutex_lock+0x100/0x1a0 [ 372.955810][T13962] ? wait_for_completion_killable_timeout+0x10/0x10 [ 372.962494][T13962] ? selinux_file_ioctl+0x377/0x480 [ 372.967700][T13962] ? br_dev_siocdevprivate+0x1320/0x1320 [ 372.973336][T13962] sock_ioctl+0x2e8/0x6b0 [ 372.977669][T13962] ? sock_poll+0x3d0/0x3d0 [ 372.982085][T13962] ? __fget_files+0x2c4/0x320 [ 372.986769][T13962] ? security_file_ioctl+0x84/0xa0 [ 372.991902][T13962] ? sock_poll+0x3d0/0x3d0 [ 372.996326][T13962] __se_sys_ioctl+0x121/0x1a0 [ 373.001008][T13962] __x64_sys_ioctl+0x7b/0x90 [ 373.005610][T13962] x64_sys_call+0x2f/0x9a0 [ 373.010044][T13962] do_syscall_64+0x4c/0xa0 [ 373.014471][T13962] ? clear_bhb_loop+0x50/0xa0 [ 373.019156][T13962] ? clear_bhb_loop+0x50/0xa0 [ 373.023837][T13962] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 373.029734][T13962] RIP: 0033:0x7f8e461a3be9 [ 373.034164][T13962] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 373.053867][T13962] RSP: 002b:00007f8e44beb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 373.062288][T13962] RAX: ffffffffffffffda RBX: 00007f8e463db090 RCX: 00007f8e461a3be9 [ 373.070263][T13962] RDX: 0000200000000900 RSI: 00000000000089a1 RDI: 0000000000000007 [ 373.078236][T13962] RBP: 00007f8e44beb090 R08: 0000000000000000 R09: 0000000000000000 [ 373.086208][T13962] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 373.094186][T13962] R13: 00007f8e463db128 R14: 00007f8e463db090 R15: 00007ffde5ca7b58 [ 373.102173][T13962] [ 373.123599][ T10] device bridge_slave_1 left promiscuous mode [ 373.129947][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 373.159881][ T10] device bridge_slave_0 left promiscuous mode [ 373.169825][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 373.178303][ T10] device veth1_macvtap left promiscuous mode [ 373.188677][ T10] device veth0_vlan left promiscuous mode [ 373.907636][T13996] device sit0 entered promiscuous mode [ 374.523297][T14015] ÿÿÿÿÿÿþ€: renamed from vlan1 [ 375.246105][T14038] device sit0 entered promiscuous mode [ 375.739044][T14049] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 375.769562][T14049] device syzkaller0 entered promiscuous mode [ 377.583855][T14076] device syzkaller0 entered promiscuous mode [ 379.013908][T14121] device sit0 entered promiscuous mode [ 379.233134][T14133] FAULT_INJECTION: forcing a failure. [ 379.233134][T14133] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 379.369551][T14133] CPU: 0 PID: 14133 Comm: syz.3.5069 Not tainted syzkaller #0 [ 379.377166][T14133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 379.387328][T14133] Call Trace: [ 379.390631][T14133] [ 379.393585][T14133] __dump_stack+0x21/0x30 [ 379.397989][T14133] dump_stack_lvl+0xee/0x150 [ 379.402602][T14133] ? show_regs_print_info+0x20/0x20 [ 379.407917][T14133] ? format_decode+0x1bb/0x1520 [ 379.412977][T14133] dump_stack+0x15/0x20 [ 379.417236][T14133] should_fail+0x3c1/0x510 [ 379.421672][T14133] should_fail_usercopy+0x1a/0x20 [ 379.426745][T14133] _copy_from_user+0x20/0xd0 [ 379.431350][T14133] kstrtouint_from_user+0xbe/0x200 [ 379.436559][T14133] ? kstrtol_from_user+0x260/0x260 [ 379.441686][T14133] ? 0xffffffff81000000 [ 379.445845][T14133] ? _copy_to_user+0x78/0x90 [ 379.450646][T14133] ? simple_read_from_buffer+0x10f/0x160 [ 379.456295][T14133] proc_fail_nth_write+0x85/0x1f0 [ 379.461317][T14133] ? proc_fail_nth_read+0x210/0x210 [ 379.466527][T14133] ? security_file_permission+0x79/0xa0 [ 379.472255][T14133] ? security_file_permission+0x83/0xa0 [ 379.477813][T14133] ? proc_fail_nth_read+0x210/0x210 [ 379.483192][T14133] vfs_write+0x3ee/0xf70 [ 379.487445][T14133] ? file_end_write+0x1b0/0x1b0 [ 379.492307][T14133] ? __kasan_check_write+0x14/0x20 [ 379.497436][T14133] ? mutex_lock+0x95/0x1a0 [ 379.501904][T14133] ? wait_for_completion_killable_timeout+0x10/0x10 [ 379.508506][T14133] ? __fget_files+0x2c4/0x320 [ 379.513371][T14133] ? __fdget_pos+0x2d2/0x380 [ 379.517966][T14133] ? ksys_write+0x71/0x240 [ 379.522385][T14133] ksys_write+0x140/0x240 [ 379.526804][T14133] ? __ia32_sys_read+0x90/0x90 [ 379.531569][T14133] ? debug_smp_processor_id+0x17/0x20 [ 379.536947][T14133] __x64_sys_write+0x7b/0x90 [ 379.541542][T14133] x64_sys_call+0x8ef/0x9a0 [ 379.546050][T14133] do_syscall_64+0x4c/0xa0 [ 379.550469][T14133] ? clear_bhb_loop+0x50/0xa0 [ 379.555153][T14133] ? clear_bhb_loop+0x50/0xa0 [ 379.559831][T14133] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 379.565733][T14133] RIP: 0033:0x7fcc3cbbd69f [ 379.570151][T14133] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 379.589772][T14133] RSP: 002b:00007fcc3b5e5030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 379.598202][T14133] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fcc3cbbd69f [ 379.606195][T14133] RDX: 0000000000000001 RSI: 00007fcc3b5e50a0 RDI: 0000000000000008 [ 379.614192][T14133] RBP: 00007fcc3b5e5090 R08: 0000000000000000 R09: 0000000000000000 [ 379.622181][T14133] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 379.630166][T14133] R13: 00007fcc3cdf6218 R14: 00007fcc3cdf6180 R15: 00007ffc4d254cf8 [ 379.638145][T14133] [ 380.038571][T14146] device sit0 left promiscuous mode [ 380.260585][T14151] device sit0 entered promiscuous mode [ 381.499174][T14188] device syzkaller0 entered promiscuous mode [ 385.199517][T14208] FAULT_INJECTION: forcing a failure. [ 385.199517][T14208] name failslab, interval 1, probability 0, space 0, times 0 [ 385.212712][T14208] CPU: 0 PID: 14208 Comm: syz.4.5095 Not tainted syzkaller #0 [ 385.220214][T14208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 385.230279][T14208] Call Trace: [ 385.233645][T14208] [ 385.236582][T14208] __dump_stack+0x21/0x30 [ 385.240949][T14208] dump_stack_lvl+0xee/0x150 [ 385.245543][T14208] ? show_regs_print_info+0x20/0x20 [ 385.250763][T14208] ? dev_queue_xmit+0x20/0x20 [ 385.255451][T14208] dump_stack+0x15/0x20 [ 385.259611][T14208] should_fail+0x3c1/0x510 [ 385.264031][T14208] __should_failslab+0xa4/0xe0 [ 385.268800][T14208] should_failslab+0x9/0x20 [ 385.273307][T14208] slab_pre_alloc_hook+0x3b/0xe0 [ 385.278253][T14208] ? skb_clone+0x1cf/0x360 [ 385.282676][T14208] kmem_cache_alloc+0x44/0x260 [ 385.287451][T14208] skb_clone+0x1cf/0x360 [ 385.291709][T14208] bpf_clone_redirect+0xa7/0x380 [ 385.296662][T14208] bpf_prog_39a964f25a93dc5b+0x59/0x68 [ 385.302123][T14208] ? __kasan_slab_alloc+0xcf/0xf0 [ 385.307149][T14208] ? __kasan_slab_alloc+0xbd/0xf0 [ 385.312188][T14208] ? slab_post_alloc_hook+0x4f/0x2b0 [ 385.317490][T14208] ? kmem_cache_alloc+0xf7/0x260 [ 385.322445][T14208] ? __build_skb+0x2d/0x310 [ 385.326963][T14208] ? build_skb+0x24/0x200 [ 385.331303][T14208] ? bpf_prog_test_run_skb+0x279/0x1150 [ 385.336864][T14208] ? bpf_prog_test_run+0x3d5/0x620 [ 385.341991][T14208] ? __sys_bpf+0x52c/0x730 [ 385.346591][T14208] ? __x64_sys_bpf+0x7c/0x90 [ 385.351296][T14208] ? x64_sys_call+0x4b9/0x9a0 [ 385.355992][T14208] ? do_syscall_64+0x4c/0xa0 [ 385.360589][T14208] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 385.366704][T14208] ? __kasan_check_read+0x11/0x20 [ 385.371782][T14208] ? bpf_test_timer_continue+0x146/0x4a0 [ 385.377850][T14208] bpf_test_run+0x33d/0x8d0 [ 385.382491][T14208] ? convert___skb_to_skb+0x4f0/0x4f0 [ 385.387887][T14208] ? eth_get_headlen+0x1f0/0x1f0 [ 385.392935][T14208] ? convert___skb_to_skb+0x41/0x4f0 [ 385.398329][T14208] bpf_prog_test_run_skb+0x9ec/0x1150 [ 385.403809][T14208] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 385.409715][T14208] bpf_prog_test_run+0x3d5/0x620 [ 385.414674][T14208] ? bpf_prog_query+0x230/0x230 [ 385.419547][T14208] ? selinux_bpf+0xce/0xf0 [ 385.423992][T14208] ? security_bpf+0x82/0xa0 [ 385.428518][T14208] __sys_bpf+0x52c/0x730 [ 385.432868][T14208] ? bpf_link_show_fdinfo+0x310/0x310 [ 385.438256][T14208] ? debug_smp_processor_id+0x17/0x20 [ 385.443668][T14208] __x64_sys_bpf+0x7c/0x90 [ 385.448093][T14208] x64_sys_call+0x4b9/0x9a0 [ 385.452690][T14208] do_syscall_64+0x4c/0xa0 [ 385.457121][T14208] ? clear_bhb_loop+0x50/0xa0 [ 385.461890][T14208] ? clear_bhb_loop+0x50/0xa0 [ 385.466574][T14208] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 385.472483][T14208] RIP: 0033:0x7f4bdee55be9 [ 385.476906][T14208] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 385.496514][T14208] RSP: 002b:00007f4bdd8be038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 385.504933][T14208] RAX: ffffffffffffffda RBX: 00007f4bdf08cfa0 RCX: 00007f4bdee55be9 [ 385.512938][T14208] RDX: 0000000000000050 RSI: 0000200000000900 RDI: 000000000000000a [ 385.520935][T14208] RBP: 00007f4bdd8be090 R08: 0000000000000000 R09: 0000000000000000 [ 385.528943][T14208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 385.536921][T14208] R13: 00007f4bdf08d038 R14: 00007f4bdf08cfa0 R15: 00007ffecd9a4ca8 [ 385.545085][T14208] [ 386.429821][T14277] syz.3.5120[14277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 386.429931][T14277] syz.3.5120[14277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 386.668926][T14291] FAULT_INJECTION: forcing a failure. [ 386.668926][T14291] name failslab, interval 1, probability 0, space 0, times 0 [ 386.718985][T14291] CPU: 0 PID: 14291 Comm: syz.2.5125 Not tainted syzkaller #0 [ 386.726512][T14291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 386.736601][T14291] Call Trace: [ 386.739894][T14291] [ 386.742828][T14291] __dump_stack+0x21/0x30 [ 386.747166][T14291] dump_stack_lvl+0xee/0x150 [ 386.751758][T14291] ? show_regs_print_info+0x20/0x20 [ 386.756961][T14291] ? dev_queue_xmit+0x20/0x20 [ 386.761642][T14291] dump_stack+0x15/0x20 [ 386.765803][T14291] should_fail+0x3c1/0x510 [ 386.770222][T14291] __should_failslab+0xa4/0xe0 [ 386.774996][T14291] should_failslab+0x9/0x20 [ 386.779503][T14291] slab_pre_alloc_hook+0x3b/0xe0 [ 386.784468][T14291] ? skb_clone+0x1cf/0x360 [ 386.789078][T14291] kmem_cache_alloc+0x44/0x260 [ 386.794021][T14291] skb_clone+0x1cf/0x360 [ 386.798465][T14291] bpf_clone_redirect+0xa7/0x380 [ 386.803417][T14291] bpf_prog_b36a1f39e2fdd4f4+0x56/0x38c [ 386.808965][T14291] ? __kasan_slab_alloc+0xcf/0xf0 [ 386.814003][T14291] ? __kasan_slab_alloc+0xbd/0xf0 [ 386.819027][T14291] ? slab_post_alloc_hook+0x4f/0x2b0 [ 386.824331][T14291] ? kmem_cache_alloc+0xf7/0x260 [ 386.829276][T14291] ? __build_skb+0x2d/0x310 [ 386.833790][T14291] ? build_skb+0x24/0x200 [ 386.838120][T14291] ? bpf_prog_test_run_skb+0x279/0x1150 [ 386.843757][T14291] ? bpf_prog_test_run+0x3d5/0x620 [ 386.848873][T14291] ? __sys_bpf+0x52c/0x730 [ 386.853321][T14291] ? __x64_sys_bpf+0x7c/0x90 [ 386.857910][T14291] ? x64_sys_call+0x4b9/0x9a0 [ 386.862592][T14291] ? do_syscall_64+0x4c/0xa0 [ 386.867184][T14291] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 386.873269][T14291] ? __kasan_check_read+0x11/0x20 [ 386.878306][T14291] ? bpf_test_timer_continue+0x146/0x4a0 [ 386.884032][T14291] bpf_test_run+0x33d/0x8d0 [ 386.888545][T14291] ? convert___skb_to_skb+0x4f0/0x4f0 [ 386.894007][T14291] ? eth_get_headlen+0x1f0/0x1f0 [ 386.898948][T14291] ? convert___skb_to_skb+0x41/0x4f0 [ 386.904238][T14291] bpf_prog_test_run_skb+0x9ec/0x1150 [ 386.909704][T14291] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 386.915603][T14291] bpf_prog_test_run+0x3d5/0x620 [ 386.920549][T14291] ? bpf_prog_query+0x230/0x230 [ 386.925406][T14291] ? selinux_bpf+0xce/0xf0 [ 386.929827][T14291] ? security_bpf+0x82/0xa0 [ 386.934333][T14291] __sys_bpf+0x52c/0x730 [ 386.938587][T14291] ? bpf_link_show_fdinfo+0x310/0x310 [ 386.943966][T14291] ? debug_smp_processor_id+0x17/0x20 [ 386.949515][T14291] __x64_sys_bpf+0x7c/0x90 [ 386.953935][T14291] x64_sys_call+0x4b9/0x9a0 [ 386.958437][T14291] do_syscall_64+0x4c/0xa0 [ 386.962858][T14291] ? clear_bhb_loop+0x50/0xa0 [ 386.967540][T14291] ? clear_bhb_loop+0x50/0xa0 [ 386.972227][T14291] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 386.978128][T14291] RIP: 0033:0x7f8e461a3be9 [ 386.982547][T14291] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 387.002284][T14291] RSP: 002b:00007f8e44c0c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 387.010714][T14291] RAX: ffffffffffffffda RBX: 00007f8e463dafa0 RCX: 00007f8e461a3be9 [ 387.018694][T14291] RDX: 0000000000000048 RSI: 0000200000000040 RDI: 000000000000000a [ 387.026670][T14291] RBP: 00007f8e44c0c090 R08: 0000000000000000 R09: 0000000000000000 [ 387.034646][T14291] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 387.042622][T14291] R13: 00007f8e463db038 R14: 00007f8e463dafa0 R15: 00007ffde5ca7b58 [ 387.050613][T14291] [ 387.113091][ T30] audit: type=1400 audit(1756971303.764:144): avc: denied { create } for pid=14305 comm="syz.1.5130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 387.727214][T14335] device pim6reg1 entered promiscuous mode [ 387.811218][T14336] device wg2 entered promiscuous mode [ 388.072346][T14346] syz.1.5145[14346] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 388.072467][T14346] syz.1.5145[14346] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 388.939309][T14369] device syzkaller0 entered promiscuous mode [ 389.746747][T14416] device syzkaller0 entered promiscuous mode [ 389.851153][T14426] FAULT_INJECTION: forcing a failure. [ 389.851153][T14426] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 389.864620][T14426] CPU: 1 PID: 14426 Comm: syz.0.5173 Not tainted syzkaller #0 [ 389.872119][T14426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 389.882202][T14426] Call Trace: [ 389.885514][T14426] [ 389.888465][T14426] __dump_stack+0x21/0x30 [ 389.892819][T14426] dump_stack_lvl+0xee/0x150 [ 389.897431][T14426] ? show_regs_print_info+0x20/0x20 [ 389.902660][T14426] ? __kasan_check_write+0x14/0x20 [ 389.907793][T14426] ? _raw_spin_lock_irq+0x8f/0xe0 [ 389.912857][T14426] dump_stack+0x15/0x20 [ 389.917131][T14426] should_fail+0x3c1/0x510 [ 389.921575][T14426] should_fail_usercopy+0x1a/0x20 [ 389.926626][T14426] copy_page_from_iter_atomic+0x3fb/0x1350 [ 389.932473][T14426] ? pipe_zero+0x370/0x370 [ 389.936924][T14426] generic_perform_write+0x307/0x670 [ 389.942244][T14426] ? grab_cache_page_write_begin+0xb0/0xb0 [ 389.948073][T14426] ? file_remove_privs+0x590/0x590 [ 389.953218][T14426] ? rwsem_write_trylock+0x130/0x300 [ 389.958578][T14426] ? clear_nonspinnable+0x60/0x60 [ 389.963768][T14426] ? avc_policy_seqno+0x1b/0x70 [ 389.968657][T14426] __generic_file_write_iter+0x268/0x480 [ 389.974542][T14426] generic_file_write_iter+0xa9/0x1d0 [ 389.979962][T14426] vfs_write+0x802/0xf70 [ 389.984241][T14426] ? file_end_write+0x1b0/0x1b0 [ 389.989165][T14426] ? wait_for_completion_killable_timeout+0x10/0x10 [ 389.995784][T14426] ? __fget_files+0x2c4/0x320 [ 390.000496][T14426] ? __fdget_pos+0x2d2/0x380 [ 390.005118][T14426] ? ksys_write+0x71/0x240 [ 390.009661][T14426] ksys_write+0x140/0x240 [ 390.014015][T14426] ? __ia32_sys_read+0x90/0x90 [ 390.018823][T14426] ? debug_smp_processor_id+0x17/0x20 [ 390.024223][T14426] __x64_sys_write+0x7b/0x90 [ 390.028842][T14426] x64_sys_call+0x8ef/0x9a0 [ 390.033371][T14426] do_syscall_64+0x4c/0xa0 [ 390.037824][T14426] ? clear_bhb_loop+0x50/0xa0 [ 390.042531][T14426] ? clear_bhb_loop+0x50/0xa0 [ 390.047247][T14426] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 390.053168][T14426] RIP: 0033:0x7fb68cb7abe9 [ 390.057609][T14426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 390.077245][T14426] RSP: 002b:00007fb68b5e3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 390.085743][T14426] RAX: ffffffffffffffda RBX: 00007fb68cdb1fa0 RCX: 00007fb68cb7abe9 [ 390.093748][T14426] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000006 [ 390.101784][T14426] RBP: 00007fb68b5e3090 R08: 0000000000000000 R09: 0000000000000000 [ 390.109792][T14426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 390.117878][T14426] R13: 00007fb68cdb2038 R14: 00007fb68cdb1fa0 R15: 00007ffcfa34e848 [ 390.125910][T14426] [ 390.179226][T14441] FAULT_INJECTION: forcing a failure. [ 390.179226][T14441] name failslab, interval 1, probability 0, space 0, times 0 [ 390.211684][T14441] CPU: 0 PID: 14441 Comm: syz.3.5176 Not tainted syzkaller #0 [ 390.219214][T14441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 390.229296][T14441] Call Trace: [ 390.232677][T14441] [ 390.235624][T14441] __dump_stack+0x21/0x30 [ 390.239965][T14441] dump_stack_lvl+0xee/0x150 [ 390.244575][T14441] ? show_regs_print_info+0x20/0x20 [ 390.249783][T14441] dump_stack+0x15/0x20 [ 390.253943][T14441] should_fail+0x3c1/0x510 [ 390.258366][T14441] __should_failslab+0xa4/0xe0 [ 390.263223][T14441] should_failslab+0x9/0x20 [ 390.267742][T14441] slab_pre_alloc_hook+0x3b/0xe0 [ 390.272689][T14441] ? security_file_alloc+0x33/0x120 [ 390.277980][T14441] kmem_cache_alloc+0x44/0x260 [ 390.282763][T14441] security_file_alloc+0x33/0x120 [ 390.287814][T14441] __alloc_file+0xb5/0x2a0 [ 390.292249][T14441] alloc_empty_file+0x97/0x180 [ 390.297126][T14441] alloc_file+0x59/0x540 [ 390.301468][T14441] alloc_file_pseudo+0x17a/0x1f0 [ 390.306444][T14441] ? alloc_empty_file_noaccount+0x80/0x80 [ 390.312198][T14441] sock_alloc_file+0xba/0x260 [ 390.316994][T14441] __sys_socketpair+0x2c3/0x590 [ 390.321858][T14441] __x64_sys_socketpair+0x9b/0xb0 [ 390.326895][T14441] x64_sys_call+0x36/0x9a0 [ 390.331321][T14441] do_syscall_64+0x4c/0xa0 [ 390.335752][T14441] ? clear_bhb_loop+0x50/0xa0 [ 390.340441][T14441] ? clear_bhb_loop+0x50/0xa0 [ 390.345125][T14441] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 390.351022][T14441] RIP: 0033:0x7fcc3cbbebe9 [ 390.355460][T14441] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 390.375172][T14441] RSP: 002b:00007fcc3b627038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 390.383598][T14441] RAX: ffffffffffffffda RBX: 00007fcc3cdf5fa0 RCX: 00007fcc3cbbebe9 [ 390.391578][T14441] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 390.399552][T14441] RBP: 00007fcc3b627090 R08: 0000000000000000 R09: 0000000000000000 [ 390.407528][T14441] R10: 0000200000000940 R11: 0000000000000246 R12: 0000000000000002 [ 390.415520][T14441] R13: 00007fcc3cdf6038 R14: 00007fcc3cdf5fa0 R15: 00007ffc4d254cf8 [ 390.423509][T14441] [ 390.609851][T14432] device syzkaller0 entered promiscuous mode [ 391.116346][T14448] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.125594][T14448] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.133800][T14448] device bridge_slave_0 entered promiscuous mode [ 391.236758][T14448] bridge0: port 2(bridge_slave_1) entered blocking state [ 391.248522][T14448] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.268918][T14448] device bridge_slave_1 entered promiscuous mode [ 391.280005][T14499] device wg2 entered promiscuous mode [ 391.474828][T14500] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.485491][T14500] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.525122][T14500] device bridge_slave_0 entered promiscuous mode [ 391.590398][T14500] bridge0: port 2(bridge_slave_1) entered blocking state [ 391.614585][T14500] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.649158][T14500] device bridge_slave_1 entered promiscuous mode [ 391.702118][T14448] bridge0: port 2(bridge_slave_1) entered blocking state [ 391.709443][T14448] bridge0: port 2(bridge_slave_1) entered forwarding state [ 391.716786][T14448] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.724388][T14448] bridge0: port 1(bridge_slave_0) entered forwarding state [ 391.754807][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.763154][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.788584][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 391.801077][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 391.833296][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 391.859170][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 391.879515][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.886625][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 391.908846][ T45] device bridge_slave_1 left promiscuous mode [ 391.919651][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.926952][ T30] audit: type=1400 audit(1756971308.574:145): avc: denied { write } for pid=14520 comm="syz.0.5188" name="cgroup.subtree_control" dev="cgroup2" ino=139 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 391.969130][ T45] device bridge_slave_0 left promiscuous mode [ 391.975556][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.984799][ T45] device veth1_macvtap left promiscuous mode [ 391.991480][ T45] device veth0_vlan left promiscuous mode [ 392.045549][ T30] audit: type=1400 audit(1756971308.574:146): avc: denied { open } for pid=14520 comm="syz.0.5188" path="" dev="cgroup2" ino=139 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 392.097305][ T30] audit: type=1400 audit(1756971308.604:147): avc: denied { ioctl } for pid=14520 comm="syz.0.5188" path="" dev="cgroup2" ino=139 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 392.167255][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 392.176114][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 392.184472][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.191571][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 392.334989][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 392.349259][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 392.363620][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 392.373472][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 392.385430][T14539] FAULT_INJECTION: forcing a failure. [ 392.385430][T14539] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 392.389605][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 392.407701][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 392.416046][T14539] CPU: 0 PID: 14539 Comm: syz.1.5192 Not tainted syzkaller #0 [ 392.423546][T14539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 392.433837][T14539] Call Trace: [ 392.437140][T14539] [ 392.440093][T14539] __dump_stack+0x21/0x30 [ 392.444545][T14539] dump_stack_lvl+0xee/0x150 [ 392.449263][T14539] ? show_regs_print_info+0x20/0x20 [ 392.454468][T14539] dump_stack+0x15/0x20 [ 392.458636][T14539] should_fail+0x3c1/0x510 [ 392.463178][T14539] should_fail_usercopy+0x1a/0x20 [ 392.468391][T14539] _copy_from_iter+0x21a/0x1050 [ 392.473251][T14539] ? __kasan_check_write+0x14/0x20 [ 392.478375][T14539] ? skb_set_owner_w+0x24d/0x370 [ 392.483435][T14539] ? copy_mc_pipe_to_iter+0x770/0x770 [ 392.488828][T14539] ? __kernel_text_address+0xa0/0x100 [ 392.494238][T14539] ? check_stack_object+0x81/0x140 [ 392.499360][T14539] ? __kasan_check_read+0x11/0x20 [ 392.504384][T14539] ? __check_object_size+0x2f4/0x3c0 [ 392.509687][T14539] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 392.515407][T14539] ? skb_put+0x10e/0x1f0 [ 392.519649][T14539] tun_get_user+0xc3c/0x33c0 [ 392.524247][T14539] ? __kasan_init_slab_obj+0x10/0x40 [ 392.529527][T14539] ? kmem_cache_free+0x100/0x320 [ 392.534476][T14539] ? __x64_sys_openat+0x136/0x160 [ 392.539540][T14539] ? x64_sys_call+0x219/0x9a0 [ 392.544246][T14539] ? tun_do_read+0x1c40/0x1c40 [ 392.549096][T14539] ? kstrtouint_from_user+0x1a0/0x200 [ 392.554579][T14539] ? kstrtol_from_user+0x260/0x260 [ 392.559715][T14539] ? bpf_get_ns_current_pid_tgid+0x110/0x190 [ 392.565694][T14539] ? putname+0x111/0x160 [ 392.569929][T14539] ? avc_policy_seqno+0x1b/0x70 [ 392.574778][T14539] ? selinux_file_permission+0x2aa/0x510 [ 392.580538][T14539] tun_chr_write_iter+0x1eb/0x2e0 [ 392.585561][T14539] vfs_write+0x802/0xf70 [ 392.589802][T14539] ? file_end_write+0x1b0/0x1b0 [ 392.594785][T14539] ? __fget_files+0x2c4/0x320 [ 392.599472][T14539] ? __fdget_pos+0x1f7/0x380 [ 392.604066][T14539] ? ksys_write+0x71/0x240 [ 392.608492][T14539] ksys_write+0x140/0x240 [ 392.612829][T14539] ? __ia32_sys_read+0x90/0x90 [ 392.617722][T14539] ? debug_smp_processor_id+0x17/0x20 [ 392.623202][T14539] __x64_sys_write+0x7b/0x90 [ 392.627797][T14539] x64_sys_call+0x8ef/0x9a0 [ 392.632301][T14539] do_syscall_64+0x4c/0xa0 [ 392.636727][T14539] ? clear_bhb_loop+0x50/0xa0 [ 392.641430][T14539] ? clear_bhb_loop+0x50/0xa0 [ 392.646115][T14539] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 392.652313][T14539] RIP: 0033:0x7f864716fbe9 [ 392.656734][T14539] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 392.676463][T14539] RSP: 002b:00007f8645bd8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 392.684975][T14539] RAX: ffffffffffffffda RBX: 00007f86473a6fa0 RCX: 00007f864716fbe9 [ 392.692958][T14539] RDX: 000000000000fdef RSI: 0000200000000580 RDI: 00000000000000c8 [ 392.700937][T14539] RBP: 00007f8645bd8090 R08: 0000000000000000 R09: 0000000000000000 [ 392.709276][T14539] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 392.717502][T14539] R13: 00007f86473a7038 R14: 00007f86473a6fa0 R15: 00007fffd55424b8 [ 392.725472][T14539] [ 392.753245][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 392.768960][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 392.777777][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 392.786489][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 392.800060][T14448] device veth0_vlan entered promiscuous mode [ 392.877872][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 392.899185][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 393.010862][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 393.019217][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 393.029255][T14448] device veth1_macvtap entered promiscuous mode [ 393.041947][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 393.058955][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 393.077676][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 393.086501][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 393.095229][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 393.103737][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 393.110926][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 393.118819][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 393.145936][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 393.154718][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 393.164033][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 393.173558][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 393.182335][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 393.189424][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 393.197054][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 393.205940][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 393.214246][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 393.223010][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 393.236797][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 393.245498][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 393.268723][T14500] device veth0_vlan entered promiscuous mode [ 393.277130][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 393.323485][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 393.408310][T14500] device veth1_macvtap entered promiscuous mode [ 393.489445][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 393.510046][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 393.558183][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 393.629178][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 393.648785][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 393.753876][T14559] device syzkaller0 entered promiscuous mode [ 393.779863][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 393.797529][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 393.814074][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 393.831838][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 393.877845][T14566] bond_slave_1: mtu less than device minimum [ 394.201231][T14586] FAULT_INJECTION: forcing a failure. [ 394.201231][T14586] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 394.214438][T14586] CPU: 1 PID: 14586 Comm: syz.2.5202 Not tainted syzkaller #0 [ 394.221998][T14586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 394.232713][T14586] Call Trace: [ 394.235999][T14586] [ 394.238934][T14586] __dump_stack+0x21/0x30 [ 394.243268][T14586] dump_stack_lvl+0xee/0x150 [ 394.247976][T14586] ? show_regs_print_info+0x20/0x20 [ 394.253281][T14586] ? __kasan_check_write+0x14/0x20 [ 394.258410][T14586] ? _raw_spin_lock_irq+0x8f/0xe0 [ 394.263499][T14586] dump_stack+0x15/0x20 [ 394.267755][T14586] should_fail+0x3c1/0x510 [ 394.272187][T14586] should_fail_usercopy+0x1a/0x20 [ 394.277256][T14586] copy_page_from_iter_atomic+0x3fb/0x1350 [ 394.283090][T14586] ? pipe_zero+0x370/0x370 [ 394.287529][T14586] generic_perform_write+0x307/0x670 [ 394.292833][T14586] ? grab_cache_page_write_begin+0xb0/0xb0 [ 394.298775][T14586] ? file_remove_privs+0x590/0x590 [ 394.303912][T14586] ? rwsem_write_trylock+0x130/0x300 [ 394.309215][T14586] ? clear_nonspinnable+0x60/0x60 [ 394.314261][T14586] ? avc_policy_seqno+0x1b/0x70 [ 394.319130][T14586] __generic_file_write_iter+0x268/0x480 [ 394.324784][T14586] generic_file_write_iter+0xa9/0x1d0 [ 394.330169][T14586] vfs_write+0x802/0xf70 [ 394.334452][T14586] ? file_end_write+0x1b0/0x1b0 [ 394.339321][T14586] ? wait_for_completion_killable_timeout+0x10/0x10 [ 394.345919][T14586] ? __fget_files+0x2c4/0x320 [ 394.350612][T14586] ? __fdget_pos+0x2d2/0x380 [ 394.355219][T14586] ? ksys_write+0x71/0x240 [ 394.359642][T14586] ksys_write+0x140/0x240 [ 394.363979][T14586] ? __ia32_sys_read+0x90/0x90 [ 394.368747][T14586] ? debug_smp_processor_id+0x17/0x20 [ 394.374123][T14586] __x64_sys_write+0x7b/0x90 [ 394.378720][T14586] x64_sys_call+0x8ef/0x9a0 [ 394.383224][T14586] do_syscall_64+0x4c/0xa0 [ 394.387728][T14586] ? clear_bhb_loop+0x50/0xa0 [ 394.392408][T14586] ? clear_bhb_loop+0x50/0xa0 [ 394.397099][T14586] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 394.403009][T14586] RIP: 0033:0x7f5280821be9 [ 394.407432][T14586] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 394.427628][T14586] RSP: 002b:00007f527f28a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 394.436058][T14586] RAX: ffffffffffffffda RBX: 00007f5280a58fa0 RCX: 00007f5280821be9 [ 394.444051][T14586] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000004 [ 394.452045][T14586] RBP: 00007f527f28a090 R08: 0000000000000000 R09: 0000000000000000 [ 394.460034][T14586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 394.468154][T14586] R13: 00007f5280a59038 R14: 00007f5280a58fa0 R15: 00007ffe397982a8 [ 394.476180][T14586] [ 395.898085][T14594] device pim6reg1 entered promiscuous mode [ 396.178733][T14619] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 396.189062][ T45] device bridge_slave_1 left promiscuous mode [ 396.204401][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.255621][ T45] device bridge_slave_0 left promiscuous mode [ 396.262332][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.271072][ T45] device veth1_macvtap left promiscuous mode [ 396.277438][ T45] device veth0_vlan left promiscuous mode [ 396.725979][T14661] bond_slave_1: mtu less than device minimum [ 398.106569][T14661] device syzkaller0 entered promiscuous mode [ 398.337036][T14672] device syzkaller0 entered promiscuous mode [ 399.051948][T14705] bond_slave_1: mtu less than device minimum [ 399.149930][ T30] audit: type=1400 audit(1756971315.804:148): avc: denied { create } for pid=14706 comm="syz.4.5245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 399.311372][T14717] device syzkaller0 entered promiscuous mode [ 399.590717][T14745] bond_slave_1: mtu less than device minimum [ 400.018619][T14763] FAULT_INJECTION: forcing a failure. [ 400.018619][T14763] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 400.031755][T14763] CPU: 1 PID: 14763 Comm: syz.3.5262 Not tainted syzkaller #0 [ 400.039247][T14763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 400.049322][T14763] Call Trace: [ 400.052620][T14763] [ 400.055576][T14763] __dump_stack+0x21/0x30 [ 400.059935][T14763] dump_stack_lvl+0xee/0x150 [ 400.064551][T14763] ? show_regs_print_info+0x20/0x20 [ 400.069776][T14763] ? __kasan_check_write+0x14/0x20 [ 400.074919][T14763] ? _raw_spin_lock_irq+0x8f/0xe0 [ 400.079975][T14763] dump_stack+0x15/0x20 [ 400.084164][T14763] should_fail+0x3c1/0x510 [ 400.088611][T14763] should_fail_usercopy+0x1a/0x20 [ 400.093660][T14763] copy_page_from_iter_atomic+0x3fb/0x1350 [ 400.099586][T14763] ? pipe_zero+0x370/0x370 [ 400.104019][T14763] generic_perform_write+0x307/0x670 [ 400.109323][T14763] ? grab_cache_page_write_begin+0xb0/0xb0 [ 400.115140][T14763] ? file_remove_privs+0x590/0x590 [ 400.120265][T14763] ? rwsem_write_trylock+0x130/0x300 [ 400.125563][T14763] ? clear_nonspinnable+0x60/0x60 [ 400.130598][T14763] ? avc_policy_seqno+0x1b/0x70 [ 400.135457][T14763] __generic_file_write_iter+0x268/0x480 [ 400.141103][T14763] generic_file_write_iter+0xa9/0x1d0 [ 400.146482][T14763] vfs_write+0x802/0xf70 [ 400.150733][T14763] ? file_end_write+0x1b0/0x1b0 [ 400.155585][T14763] ? wait_for_completion_killable_timeout+0x10/0x10 [ 400.162177][T14763] ? __fget_files+0x2c4/0x320 [ 400.166868][T14763] ? __fdget_pos+0x2d2/0x380 [ 400.171464][T14763] ? ksys_write+0x71/0x240 [ 400.175887][T14763] ksys_write+0x140/0x240 [ 400.180222][T14763] ? __ia32_sys_read+0x90/0x90 [ 400.185009][T14763] ? debug_smp_processor_id+0x17/0x20 [ 400.190403][T14763] __x64_sys_write+0x7b/0x90 [ 400.195022][T14763] x64_sys_call+0x8ef/0x9a0 [ 400.199529][T14763] do_syscall_64+0x4c/0xa0 [ 400.203947][T14763] ? clear_bhb_loop+0x50/0xa0 [ 400.208640][T14763] ? clear_bhb_loop+0x50/0xa0 [ 400.213323][T14763] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 400.219249][T14763] RIP: 0033:0x7f54fd8ccbe9 [ 400.223668][T14763] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 400.243313][T14763] RSP: 002b:00007f54fc335038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 400.251820][T14763] RAX: ffffffffffffffda RBX: 00007f54fdb03fa0 RCX: 00007f54fd8ccbe9 [ 400.259803][T14763] RDX: 00000000002a979d RSI: 0000200000000000 RDI: 0000000000000003 [ 400.267876][T14763] RBP: 00007f54fc335090 R08: 0000000000000000 R09: 0000000000000000 [ 400.275852][T14763] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 400.283828][T14763] R13: 00007f54fdb04038 R14: 00007f54fdb03fa0 R15: 00007ffcbeeb2768 [ 400.291811][T14763] [ 400.659287][T14770] FAULT_INJECTION: forcing a failure. [ 400.659287][T14770] name failslab, interval 1, probability 0, space 0, times 0 [ 400.690178][T14770] CPU: 1 PID: 14770 Comm: syz.0.5265 Not tainted syzkaller #0 [ 400.697712][T14770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 400.707790][T14770] Call Trace: [ 400.711101][T14770] [ 400.714060][T14770] __dump_stack+0x21/0x30 [ 400.718420][T14770] dump_stack_lvl+0xee/0x150 [ 400.723037][T14770] ? show_regs_print_info+0x20/0x20 [ 400.728255][T14770] ? avc_has_perm_noaudit+0x2f4/0x460 [ 400.733654][T14770] dump_stack+0x15/0x20 [ 400.737828][T14770] should_fail+0x3c1/0x510 [ 400.742263][T14770] __should_failslab+0xa4/0xe0 [ 400.747051][T14770] should_failslab+0x9/0x20 [ 400.751578][T14770] slab_pre_alloc_hook+0x3b/0xe0 [ 400.756567][T14770] ? dup_fd+0x56/0xb20 [ 400.760645][T14770] kmem_cache_alloc+0x44/0x260 [ 400.765438][T14770] dup_fd+0x56/0xb20 [ 400.769441][T14770] ? __mutex_init+0xcd/0x1a0 [ 400.774049][T14770] ? perf_event_init_task+0x47b/0x4c0 [ 400.779425][T14770] copy_files+0x76/0xe0 [ 400.783599][T14770] copy_process+0x10ac/0x3210 [ 400.788290][T14770] ? kstrtol_from_user+0x260/0x260 [ 400.793434][T14770] ? __kasan_check_write+0x14/0x20 [ 400.798560][T14770] ? __pidfd_prepare+0x150/0x150 [ 400.803508][T14770] ? security_file_permission+0x83/0xa0 [ 400.809083][T14770] kernel_clone+0x23f/0x940 [ 400.813635][T14770] ? create_io_thread+0x130/0x130 [ 400.818671][T14770] ? __kasan_check_write+0x14/0x20 [ 400.823897][T14770] ? mutex_unlock+0x89/0x220 [ 400.828498][T14770] __x64_sys_clone+0x176/0x1d0 [ 400.833273][T14770] ? __kasan_check_write+0x14/0x20 [ 400.838388][T14770] ? __ia32_sys_vfork+0xf0/0xf0 [ 400.843276][T14770] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 400.849353][T14770] x64_sys_call+0x41f/0x9a0 [ 400.853858][T14770] do_syscall_64+0x4c/0xa0 [ 400.858289][T14770] ? clear_bhb_loop+0x50/0xa0 [ 400.863121][T14770] ? clear_bhb_loop+0x50/0xa0 [ 400.867825][T14770] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 400.873820][T14770] RIP: 0033:0x7fb68cb7abe9 [ 400.878494][T14770] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 400.898657][T14770] RSP: 002b:00007fb68b5e2fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 400.907089][T14770] RAX: ffffffffffffffda RBX: 00007fb68cdb1fa0 RCX: 00007fb68cb7abe9 [ 400.915167][T14770] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 400.923320][T14770] RBP: 00007fb68b5e3090 R08: 0000000000000000 R09: 0000000000000000 [ 400.931316][T14770] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 400.940318][T14770] R13: 00007fb68cdb2038 R14: 00007fb68cdb1fa0 R15: 00007ffcfa34e848 [ 400.948593][T14770] [ 401.119528][T14784] device wg2 entered promiscuous mode [ 401.269156][T14784] device syzkaller0 entered promiscuous mode [ 402.503090][T14832] FAULT_INJECTION: forcing a failure. [ 402.503090][T14832] name failslab, interval 1, probability 0, space 0, times 0 [ 402.519022][T14832] CPU: 1 PID: 14832 Comm: syz.3.5286 Not tainted syzkaller #0 [ 402.526551][T14832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 402.536636][T14832] Call Trace: [ 402.539940][T14832] [ 402.542900][T14832] __dump_stack+0x21/0x30 [ 402.547261][T14832] dump_stack_lvl+0xee/0x150 [ 402.551886][T14832] ? show_regs_print_info+0x20/0x20 [ 402.557128][T14832] dump_stack+0x15/0x20 [ 402.561308][T14832] should_fail+0x3c1/0x510 [ 402.565757][T14832] __should_failslab+0xa4/0xe0 [ 402.570634][T14832] should_failslab+0x9/0x20 [ 402.575163][T14832] slab_pre_alloc_hook+0x3b/0xe0 [ 402.580127][T14832] __kmalloc+0x6d/0x2c0 [ 402.584378][T14832] ? bpf_prog_test_run_flow_dissector+0x271/0x5e0 [ 402.590890][T14832] bpf_prog_test_run_flow_dissector+0x271/0x5e0 [ 402.597190][T14832] ? xdp_convert_buff_to_md+0x1e0/0x1e0 [ 402.602756][T14832] ? proc_fail_nth_write+0x17a/0x1f0 [ 402.608084][T14832] ? __fget_files+0x2c4/0x320 [ 402.612780][T14832] ? fput_many+0x15a/0x1a0 [ 402.617209][T14832] ? xdp_convert_buff_to_md+0x1e0/0x1e0 [ 402.622942][T14832] bpf_prog_test_run+0x3d5/0x620 [ 402.627895][T14832] ? bpf_prog_query+0x230/0x230 [ 402.632749][T14832] ? selinux_bpf+0xce/0xf0 [ 402.637179][T14832] ? security_bpf+0x82/0xa0 [ 402.641687][T14832] __sys_bpf+0x52c/0x730 [ 402.645969][T14832] ? bpf_link_show_fdinfo+0x310/0x310 [ 402.651357][T14832] ? debug_smp_processor_id+0x17/0x20 [ 402.656736][T14832] __x64_sys_bpf+0x7c/0x90 [ 402.661166][T14832] x64_sys_call+0x4b9/0x9a0 [ 402.665673][T14832] do_syscall_64+0x4c/0xa0 [ 402.670094][T14832] ? clear_bhb_loop+0x50/0xa0 [ 402.674774][T14832] ? clear_bhb_loop+0x50/0xa0 [ 402.679457][T14832] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 402.685365][T14832] RIP: 0033:0x7f54fd8ccbe9 [ 402.689791][T14832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 402.709781][T14832] RSP: 002b:00007f54fc335038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 402.718214][T14832] RAX: ffffffffffffffda RBX: 00007f54fdb03fa0 RCX: 00007f54fd8ccbe9 [ 402.726195][T14832] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 402.734187][T14832] RBP: 00007f54fc335090 R08: 0000000000000000 R09: 0000000000000000 [ 402.742161][T14832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 402.750143][T14832] R13: 00007f54fdb04038 R14: 00007f54fdb03fa0 R15: 00007ffcbeeb2768 [ 402.758392][T14832] [ 402.813748][T14839] syz.3.5289[14839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 402.813827][T14839] syz.3.5289[14839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 403.479067][T14857] device syzkaller0 entered promiscuous mode [ 403.719419][T14876] device syzkaller0 entered promiscuous mode [ 404.029008][T14882] device syzkaller0 entered promiscuous mode [ 404.423457][T14901] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 404.473831][T14901] device syzkaller0 entered promiscuous mode [ 404.605112][T14923] FAULT_INJECTION: forcing a failure. [ 404.605112][T14923] name failslab, interval 1, probability 0, space 0, times 0 [ 404.669487][T14923] CPU: 1 PID: 14923 Comm: syz.4.5314 Not tainted syzkaller #0 [ 404.677021][T14923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 404.687274][T14923] Call Trace: [ 404.690572][T14923] [ 404.693538][T14923] __dump_stack+0x21/0x30 [ 404.697929][T14923] dump_stack_lvl+0xee/0x150 [ 404.702658][T14923] ? show_regs_print_info+0x20/0x20 [ 404.708056][T14923] dump_stack+0x15/0x20 [ 404.712210][T14923] should_fail+0x3c1/0x510 [ 404.716622][T14923] ? skb_ensure_writable+0x2e7/0x460 [ 404.721901][T14923] __should_failslab+0xa4/0xe0 [ 404.726684][T14923] should_failslab+0x9/0x20 [ 404.731184][T14923] slab_pre_alloc_hook+0x3b/0xe0 [ 404.736236][T14923] ? skb_ensure_writable+0x2e7/0x460 [ 404.741724][T14923] ? skb_ensure_writable+0x2e7/0x460 [ 404.747543][T14923] __kmalloc_track_caller+0x6c/0x2c0 [ 404.752858][T14923] ? skb_ensure_writable+0x2e7/0x460 [ 404.758144][T14923] ? skb_ensure_writable+0x2e7/0x460 [ 404.763426][T14923] pskb_expand_head+0x11b/0x11d0 [ 404.768364][T14923] ? __copy_skb_header+0x437/0x600 [ 404.773575][T14923] ? __kasan_check_write+0x14/0x20 [ 404.778712][T14923] ? __skb_clone+0x47a/0x790 [ 404.783363][T14923] skb_ensure_writable+0x2e7/0x460 [ 404.788494][T14923] bpf_clone_redirect+0x10b/0x380 [ 404.793690][T14923] bpf_prog_6893982b85ceadf7+0x56/0xfc0 [ 404.799263][T14923] ? __kasan_slab_alloc+0xcf/0xf0 [ 404.804298][T14923] ? __kasan_slab_alloc+0xbd/0xf0 [ 404.809336][T14923] ? slab_post_alloc_hook+0x4f/0x2b0 [ 404.814622][T14923] ? kmem_cache_alloc+0xf7/0x260 [ 404.819565][T14923] ? __build_skb+0x2d/0x310 [ 404.824218][T14923] ? build_skb+0x24/0x200 [ 404.828669][T14923] ? bpf_prog_test_run_skb+0x279/0x1150 [ 404.834461][T14923] ? bpf_prog_test_run+0x3d5/0x620 [ 404.839688][T14923] ? __sys_bpf+0x52c/0x730 [ 404.844211][T14923] ? __x64_sys_bpf+0x7c/0x90 [ 404.848822][T14923] ? x64_sys_call+0x4b9/0x9a0 [ 404.853620][T14923] ? do_syscall_64+0x4c/0xa0 [ 404.858232][T14923] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 404.864326][T14923] ? __kasan_check_read+0x11/0x20 [ 404.869374][T14923] ? bpf_test_timer_continue+0x146/0x4a0 [ 404.875084][T14923] bpf_test_run+0x33d/0x8d0 [ 404.879615][T14923] ? convert___skb_to_skb+0x4f0/0x4f0 [ 404.885191][T14923] ? eth_get_headlen+0x1f0/0x1f0 [ 404.890149][T14923] ? convert___skb_to_skb+0x41/0x4f0 [ 404.895566][T14923] bpf_prog_test_run_skb+0x9ec/0x1150 [ 404.900965][T14923] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 404.907062][T14923] bpf_prog_test_run+0x3d5/0x620 [ 404.912161][T14923] ? bpf_prog_query+0x230/0x230 [ 404.917041][T14923] ? selinux_bpf+0xce/0xf0 [ 404.921578][T14923] ? security_bpf+0x82/0xa0 [ 404.926170][T14923] __sys_bpf+0x52c/0x730 [ 404.930435][T14923] ? bpf_link_show_fdinfo+0x310/0x310 [ 404.935823][T14923] ? debug_smp_processor_id+0x17/0x20 [ 404.941213][T14923] __x64_sys_bpf+0x7c/0x90 [ 404.945668][T14923] x64_sys_call+0x4b9/0x9a0 [ 404.950187][T14923] do_syscall_64+0x4c/0xa0 [ 404.954614][T14923] ? clear_bhb_loop+0x50/0xa0 [ 404.959312][T14923] ? clear_bhb_loop+0x50/0xa0 [ 404.964006][T14923] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 404.970033][T14923] RIP: 0033:0x7f4bdee55be9 [ 404.974523][T14923] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 404.994146][T14923] RSP: 002b:00007f4bdd8be038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 405.002694][T14923] RAX: ffffffffffffffda RBX: 00007f4bdf08cfa0 RCX: 00007f4bdee55be9 [ 405.010676][T14923] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 405.018653][T14923] RBP: 00007f4bdd8be090 R08: 0000000000000000 R09: 0000000000000000 [ 405.026636][T14923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 405.034622][T14923] R13: 00007f4bdf08d038 R14: 00007f4bdf08cfa0 R15: 00007ffecd9a4ca8 [ 405.042739][T14923] [ 405.248140][T14941] FAULT_INJECTION: forcing a failure. [ 405.248140][T14941] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 405.398555][T14941] CPU: 1 PID: 14941 Comm: syz.3.5323 Not tainted syzkaller #0 [ 405.406130][T14941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 405.416243][T14941] Call Trace: [ 405.419548][T14941] [ 405.422602][T14941] __dump_stack+0x21/0x30 [ 405.426950][T14941] dump_stack_lvl+0xee/0x150 [ 405.431633][T14941] ? show_regs_print_info+0x20/0x20 [ 405.436866][T14941] ? avc_has_perm+0x158/0x240 [ 405.441682][T14941] dump_stack+0x15/0x20 [ 405.445983][T14941] should_fail+0x3c1/0x510 [ 405.450836][T14941] should_fail_alloc_page+0x55/0x80 [ 405.456473][T14941] prepare_alloc_pages+0x156/0x600 [ 405.461600][T14941] ? __alloc_pages_bulk+0xab0/0xab0 [ 405.466859][T14941] ? 0xffffffffa00285b4 [ 405.471038][T14941] ? is_bpf_text_address+0x177/0x190 [ 405.476512][T14941] __alloc_pages+0x10a/0x440 [ 405.481281][T14941] ? prep_new_page+0x110/0x110 [ 405.486087][T14941] skb_page_frag_refill+0x202/0x3a0 [ 405.491420][T14941] tun_get_user+0x785/0x33c0 [ 405.496024][T14941] ? __kasan_init_slab_obj+0x10/0x40 [ 405.501401][T14941] ? kmem_cache_free+0x100/0x320 [ 405.506435][T14941] ? __x64_sys_openat+0x136/0x160 [ 405.511670][T14941] ? x64_sys_call+0x219/0x9a0 [ 405.516352][T14941] ? tun_do_read+0x1c40/0x1c40 [ 405.521141][T14941] ? kstrtouint_from_user+0x1a0/0x200 [ 405.526517][T14941] ? kstrtol_from_user+0x260/0x260 [ 405.531658][T14941] ? avc_policy_seqno+0x1b/0x70 [ 405.536522][T14941] ? selinux_file_permission+0x2aa/0x510 [ 405.542393][T14941] tun_chr_write_iter+0x1eb/0x2e0 [ 405.547520][T14941] vfs_write+0x802/0xf70 [ 405.551806][T14941] ? file_end_write+0x1b0/0x1b0 [ 405.556812][T14941] ? __fget_files+0x2c4/0x320 [ 405.561605][T14941] ? __fdget_pos+0x1f7/0x380 [ 405.566239][T14941] ? ksys_write+0x71/0x240 [ 405.570665][T14941] ksys_write+0x140/0x240 [ 405.575088][T14941] ? __ia32_sys_read+0x90/0x90 [ 405.579858][T14941] ? debug_smp_processor_id+0x17/0x20 [ 405.585285][T14941] __x64_sys_write+0x7b/0x90 [ 405.589905][T14941] x64_sys_call+0x8ef/0x9a0 [ 405.594571][T14941] do_syscall_64+0x4c/0xa0 [ 405.599009][T14941] ? clear_bhb_loop+0x50/0xa0 [ 405.603713][T14941] ? clear_bhb_loop+0x50/0xa0 [ 405.608574][T14941] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 405.614666][T14941] RIP: 0033:0x7f54fd8ccbe9 [ 405.619130][T14941] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 405.639233][T14941] RSP: 002b:00007f54fc335038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 405.647654][T14941] RAX: ffffffffffffffda RBX: 00007f54fdb03fa0 RCX: 00007f54fd8ccbe9 [ 405.655960][T14941] RDX: 000000000000000e RSI: 0000200000000000 RDI: 00000000000000c8 [ 405.663948][T14941] RBP: 00007f54fc335090 R08: 0000000000000000 R09: 0000000000000000 [ 405.671958][T14941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 405.679975][T14941] R13: 00007f54fdb04038 R14: 00007f54fdb03fa0 R15: 00007ffcbeeb2768 [ 405.687974][T14941] [ 406.120565][T14962] device wg2 entered promiscuous mode [ 406.188163][T14962] device syzkaller0 entered promiscuous mode [ 406.493548][T14975] FAULT_INJECTION: forcing a failure. [ 406.493548][T14975] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 406.550966][T14975] CPU: 1 PID: 14975 Comm: syz.4.5334 Not tainted syzkaller #0 [ 406.558681][T14975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 406.568955][T14975] Call Trace: [ 406.572365][T14975] [ 406.575318][T14975] __dump_stack+0x21/0x30 [ 406.579693][T14975] dump_stack_lvl+0xee/0x150 [ 406.584358][T14975] ? show_regs_print_info+0x20/0x20 [ 406.589777][T14975] ? stack_trace_save+0x98/0xe0 [ 406.596460][T14975] ? __stack_depot_save+0x34/0x480 [ 406.601761][T14975] dump_stack+0x15/0x20 [ 406.606016][T14975] should_fail+0x3c1/0x510 [ 406.610514][T14975] should_fail_usercopy+0x1a/0x20 [ 406.615577][T14975] _copy_from_user+0x20/0xd0 [ 406.620212][T14975] __copy_msghdr_from_user+0xaf/0x5e0 [ 406.625836][T14975] ? _kstrtoull+0x3c0/0x4d0 [ 406.630467][T14975] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 406.635950][T14975] ? kstrtouint_from_user+0x1a0/0x200 [ 406.641367][T14975] ___sys_sendmsg+0x156/0x260 [ 406.646645][T14975] ? __sys_sendmsg+0x250/0x250 [ 406.651971][T14975] ? __fdget+0x1a1/0x230 [ 406.656377][T14975] __x64_sys_sendmsg+0x1e2/0x2a0 [ 406.661836][T14975] ? ___sys_sendmsg+0x260/0x260 [ 406.666728][T14975] ? ksys_write+0x1eb/0x240 [ 406.671265][T14975] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 406.677775][T14975] x64_sys_call+0x4b/0x9a0 [ 406.682499][T14975] do_syscall_64+0x4c/0xa0 [ 406.687035][T14975] ? clear_bhb_loop+0x50/0xa0 [ 406.691757][T14975] ? clear_bhb_loop+0x50/0xa0 [ 406.696474][T14975] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 406.702407][T14975] RIP: 0033:0x7f4bdee55be9 [ 406.706849][T14975] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 406.726877][T14975] RSP: 002b:00007f4bdd8be038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 406.735405][T14975] RAX: ffffffffffffffda RBX: 00007f4bdf08cfa0 RCX: 00007f4bdee55be9 [ 406.743524][T14975] RDX: 0000000000020001 RSI: 0000200000000d40 RDI: 0000000000000003 [ 406.751509][T14975] RBP: 00007f4bdd8be090 R08: 0000000000000000 R09: 0000000000000000 [ 406.759745][T14975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 406.767835][T14975] R13: 00007f4bdf08d038 R14: 00007f4bdf08cfa0 R15: 00007ffecd9a4ca8 [ 406.775841][T14975] [ 406.809679][T14982] FAULT_INJECTION: forcing a failure. [ 406.809679][T14982] name failslab, interval 1, probability 0, space 0, times 0 [ 406.822733][T14982] CPU: 1 PID: 14982 Comm: syz.0.5336 Not tainted syzkaller #0 [ 406.830529][T14982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 406.840894][T14982] Call Trace: [ 406.844470][T14982] [ 406.847434][T14982] __dump_stack+0x21/0x30 [ 406.851800][T14982] dump_stack_lvl+0xee/0x150 [ 406.856435][T14982] ? show_regs_print_info+0x20/0x20 [ 406.861668][T14982] ? avc_has_perm_noaudit+0x2f4/0x460 [ 406.867068][T14982] dump_stack+0x15/0x20 [ 406.871249][T14982] should_fail+0x3c1/0x510 [ 406.875713][T14982] __should_failslab+0xa4/0xe0 [ 406.880491][T14982] should_failslab+0x9/0x20 [ 406.885264][T14982] slab_pre_alloc_hook+0x3b/0xe0 [ 406.890226][T14982] ? __alloc_skb+0xe0/0x740 [ 406.894930][T14982] kmem_cache_alloc+0x44/0x260 [ 406.900203][T14982] __alloc_skb+0xe0/0x740 [ 406.904946][T14982] alloc_skb_with_frags+0xa8/0x620 [ 406.910180][T14982] sock_alloc_send_pskb+0x853/0x980 [ 406.915408][T14982] ? is_bpf_text_address+0x177/0x190 [ 406.920909][T14982] ? __kernel_text_address+0xa0/0x100 [ 406.926305][T14982] ? sock_kzfree_s+0x60/0x60 [ 406.930990][T14982] ? stack_trace_save+0x98/0xe0 [ 406.935936][T14982] tun_get_user+0x4e6/0x33c0 [ 406.940557][T14982] ? __kasan_init_slab_obj+0x10/0x40 [ 406.946022][T14982] ? kmem_cache_free+0x100/0x320 [ 406.951169][T14982] ? __x64_sys_openat+0x136/0x160 [ 406.956298][T14982] ? x64_sys_call+0x219/0x9a0 [ 406.960988][T14982] ? tun_do_read+0x1c40/0x1c40 [ 406.965863][T14982] ? kstrtouint_from_user+0x1a0/0x200 [ 406.971241][T14982] ? kstrtol_from_user+0x260/0x260 [ 406.976364][T14982] ? avc_policy_seqno+0x1b/0x70 [ 406.981338][T14982] ? selinux_file_permission+0x2aa/0x510 [ 406.986995][T14982] tun_chr_write_iter+0x1eb/0x2e0 [ 406.992041][T14982] vfs_write+0x802/0xf70 [ 406.997091][T14982] ? file_end_write+0x1b0/0x1b0 [ 407.001953][T14982] ? __fget_files+0x2c4/0x320 [ 407.006818][T14982] ? __fdget_pos+0x1f7/0x380 [ 407.011416][T14982] ? ksys_write+0x71/0x240 [ 407.015855][T14982] ksys_write+0x140/0x240 [ 407.020213][T14982] ? __ia32_sys_read+0x90/0x90 [ 407.025084][T14982] ? debug_smp_processor_id+0x17/0x20 [ 407.030482][T14982] __x64_sys_write+0x7b/0x90 [ 407.035099][T14982] x64_sys_call+0x8ef/0x9a0 [ 407.039610][T14982] do_syscall_64+0x4c/0xa0 [ 407.044037][T14982] ? clear_bhb_loop+0x50/0xa0 [ 407.048731][T14982] ? clear_bhb_loop+0x50/0xa0 [ 407.053441][T14982] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 407.059339][T14982] RIP: 0033:0x7fb68cb7abe9 [ 407.063759][T14982] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 407.083471][T14982] RSP: 002b:00007fb68b5e3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 407.091889][T14982] RAX: ffffffffffffffda RBX: 00007fb68cdb1fa0 RCX: 00007fb68cb7abe9 [ 407.099952][T14982] RDX: 000000000000ffc0 RSI: 0000200000000000 RDI: 00000000000000c8 [ 407.107925][T14982] RBP: 00007fb68b5e3090 R08: 0000000000000000 R09: 0000000000000000 [ 407.115991][T14982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 407.123967][T14982] R13: 00007fb68cdb2038 R14: 00007fb68cdb1fa0 R15: 00007ffcfa34e848 [ 407.131954][T14982] [ 407.180488][T14987] device veth0_vlan left promiscuous mode [ 407.213789][T14987] device veth0_vlan entered promiscuous mode [ 407.263054][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 407.271761][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 407.284024][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 407.406829][T14998] device veth0_vlan left promiscuous mode [ 407.435778][T14998] device veth0_vlan entered promiscuous mode [ 407.494585][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 407.512334][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 407.555014][ T30] audit: type=1400 audit(1756971324.204:149): avc: denied { create } for pid=15006 comm="syz.2.5344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 407.559903][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿþ€: link becomes ready [ 407.688252][ T30] audit: type=1400 audit(1756971324.304:150): avc: denied { read } for pid=15010 comm="syz.4.5346" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 407.769867][ T30] audit: type=1400 audit(1756971324.304:151): avc: denied { open } for pid=15010 comm="syz.4.5346" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 407.821011][T15017] FAULT_INJECTION: forcing a failure. [ 407.821011][T15017] name failslab, interval 1, probability 0, space 0, times 0 [ 407.833702][T15017] CPU: 0 PID: 15017 Comm: syz.1.5348 Not tainted syzkaller #0 [ 407.841288][T15017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 407.851574][T15017] Call Trace: [ 407.854857][T15017] [ 407.857794][T15017] __dump_stack+0x21/0x30 [ 407.862146][T15017] dump_stack_lvl+0xee/0x150 [ 407.866751][T15017] ? show_regs_print_info+0x20/0x20 [ 407.871954][T15017] dump_stack+0x15/0x20 [ 407.876110][T15017] should_fail+0x3c1/0x510 [ 407.880638][T15017] ? ip_frag_next+0xd7/0xab0 [ 407.885226][T15017] __should_failslab+0xa4/0xe0 [ 407.889998][T15017] should_failslab+0x9/0x20 [ 407.894546][T15017] slab_pre_alloc_hook+0x3b/0xe0 [ 407.899675][T15017] ? ip_frag_next+0xd7/0xab0 [ 407.904276][T15017] ? ip_frag_next+0xd7/0xab0 [ 407.908870][T15017] __kmalloc_track_caller+0x6c/0x2c0 [ 407.914189][T15017] ? ip_frag_next+0xd7/0xab0 [ 407.918810][T15017] ? ip_frag_next+0xd7/0xab0 [ 407.923399][T15017] __alloc_skb+0x21a/0x740 [ 407.927841][T15017] ip_frag_next+0xd7/0xab0 [ 407.932259][T15017] ip_do_fragment+0x811/0x1ca0 [ 407.937062][T15017] ? ip_fragment+0x250/0x250 [ 407.941654][T15017] ip_fragment+0x152/0x250 [ 407.946070][T15017] __ip_finish_output+0x236/0x360 [ 407.951092][T15017] ip_finish_output+0x31/0x240 [ 407.955853][T15017] ? ip_output+0x31d/0x360 [ 407.960266][T15017] ip_output+0x1e1/0x360 [ 407.964508][T15017] ? ip_finish_output+0x240/0x240 [ 407.969533][T15017] ? ip_mc_finish_output+0x400/0x400 [ 407.974832][T15017] ? prandom_u32+0x24d/0x290 [ 407.979531][T15017] ip_local_out+0x96/0xb0 [ 407.984003][T15017] iptunnel_xmit+0x4db/0x8f0 [ 407.988606][T15017] ip_tunnel_xmit+0x1a2b/0x21c0 [ 407.993496][T15017] ? ip4_dst_hoplimit+0x110/0x110 [ 407.998530][T15017] ? skb_network_protocol+0x501/0x740 [ 408.004104][T15017] ? gre_build_header+0x229/0x850 [ 408.009376][T15017] ipgre_xmit+0x7c0/0xb30 [ 408.013709][T15017] dev_hard_start_xmit+0x244/0x670 [ 408.019069][T15017] __dev_queue_xmit+0x17bd/0x2d80 [ 408.024237][T15017] ? dev_queue_xmit+0x20/0x20 [ 408.028948][T15017] ? __kasan_check_write+0x14/0x20 [ 408.034167][T15017] ? skb_release_data+0x1c6/0xa10 [ 408.039310][T15017] ? __kasan_check_write+0x14/0x20 [ 408.044445][T15017] ? pskb_expand_head+0xbe6/0x11d0 [ 408.049564][T15017] dev_queue_xmit+0x17/0x20 [ 408.054071][T15017] __bpf_redirect+0x68a/0xe60 [ 408.058769][T15017] bpf_clone_redirect+0x242/0x380 [ 408.063803][T15017] bpf_prog_208b094576c80b22+0x56/0xe38 [ 408.069369][T15017] ? __kasan_slab_alloc+0xcf/0xf0 [ 408.074413][T15017] ? __kasan_slab_alloc+0xbd/0xf0 [ 408.079443][T15017] ? slab_post_alloc_hook+0x4f/0x2b0 [ 408.084802][T15017] ? kmem_cache_alloc+0xf7/0x260 [ 408.089871][T15017] ? __build_skb+0x2d/0x310 [ 408.094516][T15017] ? build_skb+0x24/0x200 [ 408.098857][T15017] ? bpf_prog_test_run_skb+0x279/0x1150 [ 408.104442][T15017] ? bpf_prog_test_run+0x3d5/0x620 [ 408.109561][T15017] ? __sys_bpf+0x52c/0x730 [ 408.114089][T15017] ? __x64_sys_bpf+0x7c/0x90 [ 408.118678][T15017] ? x64_sys_call+0x4b9/0x9a0 [ 408.123364][T15017] ? do_syscall_64+0x4c/0xa0 [ 408.128158][T15017] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 408.134253][T15017] ? ktime_get+0x12f/0x160 [ 408.138678][T15017] bpf_test_run+0x33d/0x8d0 [ 408.143196][T15017] ? convert___skb_to_skb+0x4f0/0x4f0 [ 408.148667][T15017] ? eth_get_headlen+0x1f0/0x1f0 [ 408.153629][T15017] ? convert___skb_to_skb+0x41/0x4f0 [ 408.158929][T15017] bpf_prog_test_run_skb+0x9ec/0x1150 [ 408.164314][T15017] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 408.170211][T15017] bpf_prog_test_run+0x3d5/0x620 [ 408.175156][T15017] ? bpf_prog_query+0x230/0x230 [ 408.180024][T15017] ? selinux_bpf+0xce/0xf0 [ 408.184442][T15017] ? security_bpf+0x82/0xa0 [ 408.188963][T15017] __sys_bpf+0x52c/0x730 [ 408.193205][T15017] ? bpf_link_show_fdinfo+0x310/0x310 [ 408.198583][T15017] ? debug_smp_processor_id+0x17/0x20 [ 408.203962][T15017] ? perf_trace_sys_enter+0x30/0x150 [ 408.209254][T15017] __x64_sys_bpf+0x7c/0x90 [ 408.213679][T15017] x64_sys_call+0x4b9/0x9a0 [ 408.218212][T15017] do_syscall_64+0x4c/0xa0 [ 408.222630][T15017] ? clear_bhb_loop+0x50/0xa0 [ 408.227313][T15017] ? clear_bhb_loop+0x50/0xa0 [ 408.231996][T15017] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 408.237893][T15017] RIP: 0033:0x7f864716fbe9 [ 408.242308][T15017] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 408.262000][T15017] RSP: 002b:00007f8645bd8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 408.270419][T15017] RAX: ffffffffffffffda RBX: 00007f86473a6fa0 RCX: 00007f864716fbe9 [ 408.278573][T15017] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 408.286547][T15017] RBP: 00007f8645bd8090 R08: 0000000000000000 R09: 0000000000000000 [ 408.294525][T15017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 408.302508][T15017] R13: 00007f86473a7038 R14: 00007f86473a6fa0 R15: 00007fffd55424b8 [ 408.310504][T15017] [ 408.583734][T15028] device sit0 left promiscuous mode [ 408.605673][T15027] FAULT_INJECTION: forcing a failure. [ 408.605673][T15027] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 408.636407][T15027] CPU: 0 PID: 15027 Comm: syz.3.5352 Not tainted syzkaller #0 [ 408.644029][T15027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 408.654129][T15027] Call Trace: [ 408.657424][T15027] [ 408.660359][T15027] __dump_stack+0x21/0x30 [ 408.664694][T15027] dump_stack_lvl+0xee/0x150 [ 408.669292][T15027] ? show_regs_print_info+0x20/0x20 [ 408.674519][T15027] ? avc_has_perm+0x158/0x240 [ 408.679231][T15027] dump_stack+0x15/0x20 [ 408.683409][T15027] should_fail+0x3c1/0x510 [ 408.687834][T15027] should_fail_alloc_page+0x55/0x80 [ 408.693131][T15027] prepare_alloc_pages+0x156/0x600 [ 408.698252][T15027] ? __alloc_pages_bulk+0xab0/0xab0 [ 408.703459][T15027] ? 0xffffffffa002c000 [ 408.707615][T15027] ? is_bpf_text_address+0x177/0x190 [ 408.712909][T15027] __alloc_pages+0x10a/0x440 [ 408.717519][T15027] ? prep_new_page+0x110/0x110 [ 408.722299][T15027] skb_page_frag_refill+0x202/0x3a0 [ 408.727596][T15027] tun_get_user+0x785/0x33c0 [ 408.732193][T15027] ? __kasan_init_slab_obj+0x10/0x40 [ 408.737501][T15027] ? kmem_cache_free+0x100/0x320 [ 408.742442][T15027] ? __x64_sys_openat+0x136/0x160 [ 408.747668][T15027] ? x64_sys_call+0x219/0x9a0 [ 408.752452][T15027] ? tun_do_read+0x1c40/0x1c40 [ 408.757220][T15027] ? kstrtouint_from_user+0x1a0/0x200 [ 408.762615][T15027] ? kstrtol_from_user+0x260/0x260 [ 408.767734][T15027] ? avc_policy_seqno+0x1b/0x70 [ 408.772603][T15027] ? selinux_file_permission+0x2aa/0x510 [ 408.778264][T15027] tun_chr_write_iter+0x1eb/0x2e0 [ 408.783305][T15027] vfs_write+0x802/0xf70 [ 408.787649][T15027] ? file_end_write+0x1b0/0x1b0 [ 408.792510][T15027] ? __fget_files+0x2c4/0x320 [ 408.797194][T15027] ? __fdget_pos+0x1f7/0x380 [ 408.801784][T15027] ? ksys_write+0x71/0x240 [ 408.806334][T15027] ksys_write+0x140/0x240 [ 408.810667][T15027] ? __ia32_sys_read+0x90/0x90 [ 408.815558][T15027] ? debug_smp_processor_id+0x17/0x20 [ 408.820953][T15027] __x64_sys_write+0x7b/0x90 [ 408.825544][T15027] x64_sys_call+0x8ef/0x9a0 [ 408.830052][T15027] do_syscall_64+0x4c/0xa0 [ 408.834473][T15027] ? clear_bhb_loop+0x50/0xa0 [ 408.839154][T15027] ? clear_bhb_loop+0x50/0xa0 [ 408.843846][T15027] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 408.849749][T15027] RIP: 0033:0x7f54fd8ccbe9 [ 408.854169][T15027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 408.873780][T15027] RSP: 002b:00007f54fc335038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 408.882285][T15027] RAX: ffffffffffffffda RBX: 00007f54fdb03fa0 RCX: 00007f54fd8ccbe9 [ 408.890261][T15027] RDX: 000000000000000e RSI: 0000200000000000 RDI: 00000000000000c8 [ 408.898243][T15027] RBP: 00007f54fc335090 R08: 0000000000000000 R09: 0000000000000000 [ 408.906230][T15027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 408.914212][T15027] R13: 00007f54fdb04038 R14: 00007f54fdb03fa0 R15: 00007ffcbeeb2768 [ 408.922200][T15027] [ 408.926151][T15040] device wg2 left promiscuous mode [ 408.933572][T15046] FAULT_INJECTION: forcing a failure. [ 408.933572][T15046] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 408.948300][T15046] CPU: 1 PID: 15046 Comm: syz.2.5356 Not tainted syzkaller #0 [ 408.955814][T15046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 408.965887][T15046] Call Trace: [ 408.969204][T15046] [ 408.972170][T15046] __dump_stack+0x21/0x30 [ 408.976533][T15046] dump_stack_lvl+0xee/0x150 [ 408.981158][T15046] ? show_regs_print_info+0x20/0x20 [ 408.986389][T15046] dump_stack+0x15/0x20 [ 408.990566][T15046] should_fail+0x3c1/0x510 [ 408.995019][T15046] should_fail_usercopy+0x1a/0x20 [ 409.000057][T15046] _copy_from_user+0x20/0xd0 [ 409.004663][T15046] sock_do_ioctl+0x175/0x300 [ 409.009268][T15046] ? sock_show_fdinfo+0xa0/0xa0 [ 409.014136][T15046] ? selinux_file_ioctl+0x377/0x480 [ 409.019348][T15046] sock_ioctl+0x4bc/0x6b0 [ 409.023695][T15046] ? sock_poll+0x3d0/0x3d0 [ 409.028118][T15046] ? __fget_files+0x2c4/0x320 [ 409.032808][T15046] ? security_file_ioctl+0x84/0xa0 [ 409.037925][T15046] ? sock_poll+0x3d0/0x3d0 [ 409.042349][T15046] __se_sys_ioctl+0x121/0x1a0 [ 409.047049][T15046] __x64_sys_ioctl+0x7b/0x90 [ 409.051648][T15046] x64_sys_call+0x2f/0x9a0 [ 409.056104][T15046] do_syscall_64+0x4c/0xa0 [ 409.060528][T15046] ? clear_bhb_loop+0x50/0xa0 [ 409.065220][T15046] ? clear_bhb_loop+0x50/0xa0 [ 409.069907][T15046] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 409.075806][T15046] RIP: 0033:0x7f5280821be9 [ 409.080226][T15046] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 409.099843][T15046] RSP: 002b:00007f527f269038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 409.108267][T15046] RAX: ffffffffffffffda RBX: 00007f5280a59090 RCX: 00007f5280821be9 [ 409.116247][T15046] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000007 [ 409.124226][T15046] RBP: 00007f527f269090 R08: 0000000000000000 R09: 0000000000000000 [ 409.132209][T15046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 409.140186][T15046] R13: 00007f5280a59128 R14: 00007f5280a59090 R15: 00007ffe397982a8 [ 409.148176][T15046] [ 409.153042][T15045] device wg2 entered promiscuous mode [ 409.208416][T15040] device syzkaller0 entered promiscuous mode [ 409.540294][ T30] audit: type=1400 audit(1756971326.194:152): avc: denied { create } for pid=15061 comm="syz.3.5362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 409.747704][T15075] FAULT_INJECTION: forcing a failure. [ 409.747704][T15075] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 409.798696][T15075] CPU: 0 PID: 15075 Comm: syz.0.5366 Not tainted syzkaller #0 [ 409.806219][T15075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 409.816298][T15075] Call Trace: [ 409.819624][T15075] [ 409.822578][T15075] __dump_stack+0x21/0x30 [ 409.826941][T15075] dump_stack_lvl+0xee/0x150 [ 409.831564][T15075] ? show_regs_print_info+0x20/0x20 [ 409.836795][T15075] ? vfs_write+0xc17/0xf70 [ 409.841239][T15075] dump_stack+0x15/0x20 [ 409.845434][T15075] should_fail+0x3c1/0x510 [ 409.849877][T15075] should_fail_usercopy+0x1a/0x20 [ 409.854926][T15075] _copy_from_user+0x20/0xd0 [ 409.859576][T15075] __sys_bpf+0x233/0x730 [ 409.863854][T15075] ? bpf_link_show_fdinfo+0x310/0x310 [ 409.869264][T15075] ? debug_smp_processor_id+0x17/0x20 [ 409.874667][T15075] __x64_sys_bpf+0x7c/0x90 [ 409.879107][T15075] x64_sys_call+0x4b9/0x9a0 [ 409.883628][T15075] do_syscall_64+0x4c/0xa0 [ 409.888069][T15075] ? clear_bhb_loop+0x50/0xa0 [ 409.892766][T15075] ? clear_bhb_loop+0x50/0xa0 [ 409.897474][T15075] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 409.903405][T15075] RIP: 0033:0x7fb68cb7abe9 [ 409.907856][T15075] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 409.927571][T15075] RSP: 002b:00007fb68b5e3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 409.936024][T15075] RAX: ffffffffffffffda RBX: 00007fb68cdb1fa0 RCX: 00007fb68cb7abe9 [ 409.944021][T15075] RDX: 000000000000000c RSI: 0000200000000180 RDI: 0000000000000023 [ 409.952140][T15075] RBP: 00007fb68b5e3090 R08: 0000000000000000 R09: 0000000000000000 [ 409.960134][T15075] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 409.968306][T15075] R13: 00007fb68cdb2038 R14: 00007fb68cdb1fa0 R15: 00007ffcfa34e848 [ 409.976314][T15075] [ 410.241605][T15081] device sit0 entered promiscuous mode [ 410.751372][T15103] FAULT_INJECTION: forcing a failure. [ 410.751372][T15103] name failslab, interval 1, probability 0, space 0, times 0 [ 410.844526][T15103] CPU: 0 PID: 15103 Comm: syz.0.5374 Not tainted syzkaller #0 [ 410.852062][T15103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 410.862151][T15103] Call Trace: [ 410.865463][T15103] [ 410.868432][T15103] __dump_stack+0x21/0x30 [ 410.872989][T15103] dump_stack_lvl+0xee/0x150 [ 410.877609][T15103] ? show_regs_print_info+0x20/0x20 [ 410.882844][T15103] dump_stack+0x15/0x20 [ 410.887027][T15103] should_fail+0x3c1/0x510 [ 410.891638][T15103] __should_failslab+0xa4/0xe0 [ 410.896427][T15103] should_failslab+0x9/0x20 [ 410.900956][T15103] slab_pre_alloc_hook+0x3b/0xe0 [ 410.905918][T15103] ? dup_task_struct+0x57/0xc10 [ 410.910784][T15103] kmem_cache_alloc+0x44/0x260 [ 410.915566][T15103] ? _raw_spin_lock_irq+0x8f/0xe0 [ 410.920620][T15103] dup_task_struct+0x57/0xc10 [ 410.925318][T15103] ? __kasan_check_write+0x14/0x20 [ 410.930539][T15103] ? recalc_sigpending+0x1ac/0x230 [ 410.935664][T15103] copy_process+0x5a9/0x3210 [ 410.940276][T15103] ? kstrtol_from_user+0x260/0x260 [ 410.945446][T15103] ? __kasan_check_write+0x14/0x20 [ 410.950598][T15103] ? proc_fail_nth_write+0x17a/0x1f0 [ 410.955901][T15103] ? proc_fail_nth_read+0x210/0x210 [ 410.961290][T15103] ? __pidfd_prepare+0x150/0x150 [ 410.966264][T15103] ? security_file_permission+0x83/0xa0 [ 410.972115][T15103] kernel_clone+0x23f/0x940 [ 410.976660][T15103] ? create_io_thread+0x130/0x130 [ 410.981737][T15103] ? __kasan_check_write+0x14/0x20 [ 410.986877][T15103] ? mutex_unlock+0x89/0x220 [ 410.991498][T15103] __x64_sys_clone+0x176/0x1d0 [ 410.996395][T15103] ? __kasan_check_write+0x14/0x20 [ 411.001543][T15103] ? __ia32_sys_vfork+0xf0/0xf0 [ 411.006442][T15103] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 411.012539][T15103] x64_sys_call+0x41f/0x9a0 [ 411.017071][T15103] do_syscall_64+0x4c/0xa0 [ 411.022264][T15103] ? clear_bhb_loop+0x50/0xa0 [ 411.026987][T15103] ? clear_bhb_loop+0x50/0xa0 [ 411.031701][T15103] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 411.037627][T15103] RIP: 0033:0x7fb68cb7abe9 [ 411.042079][T15103] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 411.061709][T15103] RSP: 002b:00007fb68b5e2fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 411.070153][T15103] RAX: ffffffffffffffda RBX: 00007fb68cdb1fa0 RCX: 00007fb68cb7abe9 [ 411.078156][T15103] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000c2002011 [ 411.086238][T15103] RBP: 00007fb68b5e3090 R08: 0000000000000000 R09: 0000000000000000 [ 411.094318][T15103] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 411.102310][T15103] R13: 00007fb68cdb2038 R14: 00007fb68cdb1fa0 R15: 00007ffcfa34e848 [ 411.110328][T15103] [ 411.225255][T15107] device sit0 entered promiscuous mode [ 412.350983][T15135] device sit0 left promiscuous mode [ 412.568545][T15136] device sit0 entered promiscuous mode [ 412.650061][T15148] FAULT_INJECTION: forcing a failure. [ 412.650061][T15148] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 412.812277][T15148] CPU: 1 PID: 15148 Comm: syz.3.5384 Not tainted syzkaller #0 [ 412.819810][T15148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 412.829908][T15148] Call Trace: [ 412.833218][T15148] [ 412.836173][T15148] __dump_stack+0x21/0x30 [ 412.840533][T15148] dump_stack_lvl+0xee/0x150 [ 412.845156][T15148] ? show_regs_print_info+0x20/0x20 [ 412.850385][T15148] dump_stack+0x15/0x20 [ 412.854826][T15148] should_fail+0x3c1/0x510 [ 412.859524][T15148] should_fail_usercopy+0x1a/0x20 [ 412.864846][T15148] _copy_to_user+0x20/0x90 [ 412.869295][T15148] simple_read_from_buffer+0xe9/0x160 [ 412.874691][T15148] proc_fail_nth_read+0x19a/0x210 [ 412.879746][T15148] ? proc_fault_inject_write+0x2f0/0x2f0 [ 412.885395][T15148] ? security_file_permission+0x83/0xa0 [ 412.890961][T15148] ? proc_fault_inject_write+0x2f0/0x2f0 [ 412.896785][T15148] vfs_read+0x282/0xbe0 [ 412.900962][T15148] ? kernel_read+0x1f0/0x1f0 [ 412.905567][T15148] ? __kasan_check_write+0x14/0x20 [ 412.910709][T15148] ? mutex_lock+0x95/0x1a0 [ 412.915149][T15148] ? wait_for_completion_killable_timeout+0x10/0x10 [ 412.921759][T15148] ? __fget_files+0x2c4/0x320 [ 412.926499][T15148] ? __fdget_pos+0x2d2/0x380 [ 412.931110][T15148] ? ksys_read+0x71/0x240 [ 412.935472][T15148] ksys_read+0x140/0x240 [ 412.939754][T15148] ? vfs_write+0xf70/0xf70 [ 412.944318][T15148] ? debug_smp_processor_id+0x17/0x20 [ 412.949719][T15148] __x64_sys_read+0x7b/0x90 [ 412.954309][T15148] x64_sys_call+0x96d/0x9a0 [ 412.958853][T15148] do_syscall_64+0x4c/0xa0 [ 412.963291][T15148] ? clear_bhb_loop+0x50/0xa0 [ 412.967982][T15148] ? clear_bhb_loop+0x50/0xa0 [ 412.972685][T15148] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 412.978653][T15148] RIP: 0033:0x7f54fd8cb5fc [ 412.983110][T15148] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 413.002757][T15148] RSP: 002b:00007f54fc2f3030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 413.011244][T15148] RAX: ffffffffffffffda RBX: 00007f54fdb04180 RCX: 00007f54fd8cb5fc [ 413.019241][T15148] RDX: 000000000000000f RSI: 00007f54fc2f30a0 RDI: 0000000000000009 [ 413.027247][T15148] RBP: 00007f54fc2f3090 R08: 0000000000000000 R09: 0000000000000000 [ 413.035336][T15148] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 413.043328][T15148] R13: 00007f54fdb04218 R14: 00007f54fdb04180 R15: 00007ffcbeeb2768 [ 413.051329][T15148] [ 413.667450][T15165] device sit0 left promiscuous mode [ 413.728696][T15171] FAULT_INJECTION: forcing a failure. [ 413.728696][T15171] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 413.758879][T15171] CPU: 1 PID: 15171 Comm: syz.3.5395 Not tainted syzkaller #0 [ 413.766404][T15171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 413.776479][T15171] Call Trace: [ 413.779773][T15171] [ 413.782721][T15171] __dump_stack+0x21/0x30 [ 413.787080][T15171] dump_stack_lvl+0xee/0x150 [ 413.791696][T15171] ? show_regs_print_info+0x20/0x20 [ 413.796926][T15171] dump_stack+0x15/0x20 [ 413.801108][T15171] should_fail+0x3c1/0x510 [ 413.805558][T15171] should_fail_usercopy+0x1a/0x20 [ 413.810602][T15171] _copy_from_user+0x20/0xd0 [ 413.815233][T15171] __sys_bpf+0x233/0x730 [ 413.819494][T15171] ? bpf_link_show_fdinfo+0x310/0x310 [ 413.824994][T15171] __x64_sys_bpf+0x7c/0x90 [ 413.829477][T15171] x64_sys_call+0x4b9/0x9a0 [ 413.834008][T15171] do_syscall_64+0x4c/0xa0 [ 413.838432][T15171] ? clear_bhb_loop+0x50/0xa0 [ 413.843131][T15171] ? clear_bhb_loop+0x50/0xa0 [ 413.848046][T15171] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 413.853958][T15171] RIP: 0033:0x7f54fd8ccbe9 [ 413.858409][T15171] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 413.878044][T15171] RSP: 002b:00007f54fc335038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 413.885883][T15165] device sit0 entered promiscuous mode [ 413.886683][T15171] RAX: ffffffffffffffda RBX: 00007f54fdb03fa0 RCX: 00007f54fd8ccbe9 [ 413.886705][T15171] RDX: 0000000000000050 RSI: 0000200000000d40 RDI: 000000000000000a [ 413.886721][T15171] RBP: 00007f54fc335090 R08: 0000000000000000 R09: 0000000000000000 [ 413.886736][T15171] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 413.886751][T15171] R13: 00007f54fdb04038 R14: 00007f54fdb03fa0 R15: 00007ffcbeeb2768 [ 413.886776][T15171] [ 414.739089][T15194] FAULT_INJECTION: forcing a failure. [ 414.739089][T15194] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 414.799915][T15194] CPU: 1 PID: 15194 Comm: syz.1.5401 Not tainted syzkaller #0 [ 414.807524][T15194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 414.817609][T15194] Call Trace: [ 414.820915][T15194] [ 414.823865][T15194] __dump_stack+0x21/0x30 [ 414.828314][T15194] dump_stack_lvl+0xee/0x150 [ 414.832930][T15194] ? show_regs_print_info+0x20/0x20 [ 414.838162][T15194] dump_stack+0x15/0x20 [ 414.842345][T15194] should_fail+0x3c1/0x510 [ 414.846825][T15194] should_fail_usercopy+0x1a/0x20 [ 414.851955][T15194] _copy_from_user+0x20/0xd0 [ 414.856656][T15194] sock_do_ioctl+0x175/0x300 [ 414.861270][T15194] ? sock_show_fdinfo+0xa0/0xa0 [ 414.866147][T15194] ? selinux_file_ioctl+0x377/0x480 [ 414.871370][T15194] sock_ioctl+0x4bc/0x6b0 [ 414.875722][T15194] ? sock_poll+0x3d0/0x3d0 [ 414.880293][T15194] ? __fget_files+0x2c4/0x320 [ 414.884996][T15194] ? security_file_ioctl+0x84/0xa0 [ 414.890255][T15194] ? sock_poll+0x3d0/0x3d0 [ 414.894693][T15194] __se_sys_ioctl+0x121/0x1a0 [ 414.899388][T15194] __x64_sys_ioctl+0x7b/0x90 [ 414.904000][T15194] x64_sys_call+0x2f/0x9a0 [ 414.908441][T15194] do_syscall_64+0x4c/0xa0 [ 414.912891][T15194] ? clear_bhb_loop+0x50/0xa0 [ 414.917603][T15194] ? clear_bhb_loop+0x50/0xa0 [ 414.922306][T15194] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 414.928233][T15194] RIP: 0033:0x7f864716fbe9 [ 414.932677][T15194] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 414.952309][T15194] RSP: 002b:00007f8645bd8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 414.960752][T15194] RAX: ffffffffffffffda RBX: 00007f86473a6fa0 RCX: 00007f864716fbe9 [ 414.968743][T15194] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000006 [ 414.976727][T15194] RBP: 00007f8645bd8090 R08: 0000000000000000 R09: 0000000000000000 [ 414.984718][T15194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 414.992708][T15194] R13: 00007f86473a7038 R14: 00007f86473a6fa0 R15: 00007fffd55424b8 [ 415.000713][T15194] [ 416.647635][T15249] GPL: port 1(erspan0) entered blocking state [ 416.697241][T15249] GPL: port 1(erspan0) entered disabled state [ 416.762679][T15249] device erspan0 entered promiscuous mode [ 416.824016][T15255] FAULT_INJECTION: forcing a failure. [ 416.824016][T15255] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 416.882299][T15255] CPU: 0 PID: 15255 Comm: syz.4.5424 Not tainted syzkaller #0 [ 416.889829][T15255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 416.899903][T15255] Call Trace: [ 416.903205][T15255] [ 416.906149][T15255] __dump_stack+0x21/0x30 [ 416.910502][T15255] dump_stack_lvl+0xee/0x150 [ 416.915112][T15255] ? show_regs_print_info+0x20/0x20 [ 416.920343][T15255] dump_stack+0x15/0x20 [ 416.924518][T15255] should_fail+0x3c1/0x510 [ 416.928964][T15255] should_fail_usercopy+0x1a/0x20 [ 416.934099][T15255] _copy_from_user+0x20/0xd0 [ 416.938724][T15255] br_ioctl_stub+0x2a7/0x7a0 [ 416.943342][T15255] ? br_dev_siocdevprivate+0x1320/0x1320 [ 416.949004][T15255] ? __mutex_lock_slowpath+0xe/0x10 [ 416.954241][T15255] ? mutex_lock+0x100/0x1a0 [ 416.958766][T15255] ? wait_for_completion_killable_timeout+0x10/0x10 [ 416.965466][T15255] ? br_dev_siocdevprivate+0x1320/0x1320 [ 416.971101][T15255] sock_ioctl+0x2e8/0x6b0 [ 416.975432][T15255] ? sock_poll+0x3d0/0x3d0 [ 416.979850][T15255] ? __fget_files+0x2c4/0x320 [ 416.984558][T15255] ? security_file_ioctl+0x84/0xa0 [ 416.989682][T15255] ? sock_poll+0x3d0/0x3d0 [ 416.994114][T15255] __se_sys_ioctl+0x121/0x1a0 [ 416.998803][T15255] __x64_sys_ioctl+0x7b/0x90 [ 417.003403][T15255] x64_sys_call+0x2f/0x9a0 [ 417.007825][T15255] do_syscall_64+0x4c/0xa0 [ 417.012247][T15255] ? clear_bhb_loop+0x50/0xa0 [ 417.016944][T15255] ? clear_bhb_loop+0x50/0xa0 [ 417.021627][T15255] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 417.027533][T15255] RIP: 0033:0x7f4bdee55be9 [ 417.031951][T15255] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 417.051665][T15255] RSP: 002b:00007f4bdd8be038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 417.060095][T15255] RAX: ffffffffffffffda RBX: 00007f4bdf08cfa0 RCX: 00007f4bdee55be9 [ 417.068096][T15255] RDX: 0000200000000080 RSI: 00000000000089a0 RDI: 000000000000000c [ 417.076070][T15255] RBP: 00007f4bdd8be090 R08: 0000000000000000 R09: 0000000000000000 [ 417.084135][T15255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 417.092181][T15255] R13: 00007f4bdf08d038 R14: 00007f4bdf08cfa0 R15: 00007ffecd9a4ca8 [ 417.100254][T15255] [ 417.289477][T15258] GPL: port 1(erspan0) entered blocking state [ 417.295748][T15258] GPL: port 1(erspan0) entered forwarding state [ 417.345627][T15269] device macsec0 entered promiscuous mode [ 417.816560][T15295] FAULT_INJECTION: forcing a failure. [ 417.816560][T15295] name failslab, interval 1, probability 0, space 0, times 0 [ 417.829261][T15295] CPU: 0 PID: 15295 Comm: syz.3.5432 Not tainted syzkaller #0 [ 417.836837][T15295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 417.846915][T15295] Call Trace: [ 417.850218][T15295] [ 417.853291][T15295] __dump_stack+0x21/0x30 [ 417.857650][T15295] dump_stack_lvl+0xee/0x150 [ 417.862271][T15295] ? show_regs_print_info+0x20/0x20 [ 417.867504][T15295] dump_stack+0x15/0x20 [ 417.871687][T15295] should_fail+0x3c1/0x510 [ 417.876129][T15295] ? ip_frag_next+0xd7/0xab0 [ 417.880748][T15295] __should_failslab+0xa4/0xe0 [ 417.885535][T15295] should_failslab+0x9/0x20 [ 417.890061][T15295] slab_pre_alloc_hook+0x3b/0xe0 [ 417.895026][T15295] ? ip_frag_next+0xd7/0xab0 [ 417.899640][T15295] ? ip_frag_next+0xd7/0xab0 [ 417.904267][T15295] __kmalloc_track_caller+0x6c/0x2c0 [ 417.909582][T15295] ? ip_frag_next+0xd7/0xab0 [ 417.914198][T15295] ? ip_frag_next+0xd7/0xab0 [ 417.918819][T15295] __alloc_skb+0x21a/0x740 [ 417.923264][T15295] ip_frag_next+0xd7/0xab0 [ 417.927790][T15295] ip_do_fragment+0x811/0x1ca0 [ 417.932573][T15295] ? ip_fragment+0x250/0x250 [ 417.937210][T15295] ip_fragment+0x152/0x250 [ 417.941646][T15295] __ip_finish_output+0x236/0x360 [ 417.946688][T15295] ip_finish_output+0x31/0x240 [ 417.951463][T15295] ? ip_output+0x31d/0x360 [ 417.955891][T15295] ip_output+0x1e1/0x360 [ 417.960148][T15295] ? ip_finish_output+0x240/0x240 [ 417.965183][T15295] ? ip_mc_finish_output+0x400/0x400 [ 417.971006][T15295] ? prandom_u32+0x24d/0x290 [ 417.975616][T15295] ip_local_out+0x96/0xb0 [ 417.979978][T15295] iptunnel_xmit+0x4db/0x8f0 [ 417.984594][T15295] ip_tunnel_xmit+0x1a2b/0x21c0 [ 417.989580][T15295] ? ip4_dst_hoplimit+0x110/0x110 [ 417.994625][T15295] ? skb_network_protocol+0x501/0x740 [ 418.000016][T15295] ? gre_build_header+0x229/0x850 [ 418.005062][T15295] ipgre_xmit+0x7c0/0xb30 [ 418.009411][T15295] dev_hard_start_xmit+0x244/0x670 [ 418.014549][T15295] __dev_queue_xmit+0x17bd/0x2d80 [ 418.019601][T15295] ? dev_queue_xmit+0x20/0x20 [ 418.024296][T15295] ? __kasan_check_write+0x14/0x20 [ 418.029425][T15295] ? skb_release_data+0x1c6/0xa10 [ 418.034480][T15295] ? __kasan_check_write+0x14/0x20 [ 418.039610][T15295] ? pskb_expand_head+0xbe6/0x11d0 [ 418.044742][T15295] dev_queue_xmit+0x17/0x20 [ 418.049259][T15295] __bpf_redirect+0x68a/0xe60 [ 418.053968][T15295] bpf_clone_redirect+0x242/0x380 [ 418.059025][T15295] bpf_prog_208b094576c80b22+0x56/0xfa0 [ 418.064616][T15295] ? __kasan_slab_alloc+0xcf/0xf0 [ 418.069653][T15295] ? __kasan_slab_alloc+0xbd/0xf0 [ 418.074690][T15295] ? slab_post_alloc_hook+0x4f/0x2b0 [ 418.079992][T15295] ? kmem_cache_alloc+0xf7/0x260 [ 418.084946][T15295] ? __build_skb+0x2d/0x310 [ 418.089473][T15295] ? build_skb+0x24/0x200 [ 418.093820][T15295] ? bpf_prog_test_run_skb+0x279/0x1150 [ 418.099622][T15295] ? bpf_prog_test_run+0x3d5/0x620 [ 418.104763][T15295] ? __sys_bpf+0x52c/0x730 [ 418.109208][T15295] ? __x64_sys_bpf+0x7c/0x90 [ 418.113831][T15295] ? x64_sys_call+0x4b9/0x9a0 [ 418.118543][T15295] ? do_syscall_64+0x4c/0xa0 [ 418.123154][T15295] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 418.129256][T15295] ? ktime_get+0x12f/0x160 [ 418.133782][T15295] bpf_test_run+0x33d/0x8d0 [ 418.138309][T15295] ? convert___skb_to_skb+0x4f0/0x4f0 [ 418.143802][T15295] ? eth_get_headlen+0x1f0/0x1f0 [ 418.148759][T15295] ? convert___skb_to_skb+0x41/0x4f0 [ 418.154058][T15295] bpf_prog_test_run_skb+0x9ec/0x1150 [ 418.159452][T15295] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 418.165362][T15295] bpf_prog_test_run+0x3d5/0x620 [ 418.170316][T15295] ? bpf_prog_query+0x230/0x230 [ 418.175270][T15295] ? selinux_bpf+0xce/0xf0 [ 418.179701][T15295] ? security_bpf+0x82/0xa0 [ 418.184231][T15295] __sys_bpf+0x52c/0x730 [ 418.188485][T15295] ? bpf_link_show_fdinfo+0x310/0x310 [ 418.193876][T15295] ? debug_smp_processor_id+0x17/0x20 [ 418.199267][T15295] __x64_sys_bpf+0x7c/0x90 [ 418.203693][T15295] x64_sys_call+0x4b9/0x9a0 [ 418.208208][T15295] do_syscall_64+0x4c/0xa0 [ 418.212640][T15295] ? clear_bhb_loop+0x50/0xa0 [ 418.217342][T15295] ? clear_bhb_loop+0x50/0xa0 [ 418.222043][T15295] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 418.228253][T15295] RIP: 0033:0x7f54fd8ccbe9 [ 418.232695][T15295] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 418.252492][T15295] RSP: 002b:00007f54fc335038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 418.261080][T15295] RAX: ffffffffffffffda RBX: 00007f54fdb03fa0 RCX: 00007f54fd8ccbe9 [ 418.269274][T15295] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 418.277435][T15295] RBP: 00007f54fc335090 R08: 0000000000000000 R09: 0000000000000000 [ 418.285420][T15295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 418.293415][T15295] R13: 00007f54fdb04038 R14: 00007f54fdb03fa0 R15: 00007ffcbeeb2768 [ 418.301414][T15295] [ 418.304964][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 418.677338][T15314] device macsec0 entered promiscuous mode [ 418.784676][T15324] FAULT_INJECTION: forcing a failure. [ 418.784676][T15324] name failslab, interval 1, probability 0, space 0, times 0 [ 418.818739][T15324] CPU: 0 PID: 15324 Comm: syz.4.5444 Not tainted syzkaller #0 [ 418.826265][T15324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 418.836522][T15324] Call Trace: [ 418.839914][T15324] [ 418.842879][T15324] __dump_stack+0x21/0x30 [ 418.847252][T15324] dump_stack_lvl+0xee/0x150 [ 418.851890][T15324] ? show_regs_print_info+0x20/0x20 [ 418.857239][T15324] ? avc_has_perm_noaudit+0x2f4/0x460 [ 418.862789][T15324] dump_stack+0x15/0x20 [ 418.866952][T15324] should_fail+0x3c1/0x510 [ 418.871378][T15324] __should_failslab+0xa4/0xe0 [ 418.876143][T15324] should_failslab+0x9/0x20 [ 418.880640][T15324] slab_pre_alloc_hook+0x3b/0xe0 [ 418.885581][T15324] ? __alloc_skb+0xe0/0x740 [ 418.890080][T15324] kmem_cache_alloc+0x44/0x260 [ 418.894847][T15324] __alloc_skb+0xe0/0x740 [ 418.899176][T15324] alloc_skb_with_frags+0xa8/0x620 [ 418.904390][T15324] sock_alloc_send_pskb+0x853/0x980 [ 418.909684][T15324] ? is_bpf_text_address+0x177/0x190 [ 418.914986][T15324] ? __kernel_text_address+0xa0/0x100 [ 418.920359][T15324] ? sock_kzfree_s+0x60/0x60 [ 418.924950][T15324] ? stack_trace_save+0x98/0xe0 [ 418.929806][T15324] tun_get_user+0x4e6/0x33c0 [ 418.934405][T15324] ? __kasan_init_slab_obj+0x10/0x40 [ 418.939783][T15324] ? kmem_cache_free+0x100/0x320 [ 418.944813][T15324] ? __x64_sys_openat+0x136/0x160 [ 418.949865][T15324] ? x64_sys_call+0x219/0x9a0 [ 418.954574][T15324] ? tun_do_read+0x1c40/0x1c40 [ 418.959370][T15324] ? kstrtouint_from_user+0x1a0/0x200 [ 418.964771][T15324] ? kstrtol_from_user+0x260/0x260 [ 418.969905][T15324] ? avc_policy_seqno+0x1b/0x70 [ 418.974767][T15324] ? selinux_file_permission+0x2aa/0x510 [ 418.980401][T15324] tun_chr_write_iter+0x1eb/0x2e0 [ 418.985425][T15324] vfs_write+0x802/0xf70 [ 418.989684][T15324] ? file_end_write+0x1b0/0x1b0 [ 418.994568][T15324] ? __fget_files+0x2c4/0x320 [ 418.999271][T15324] ? __fdget_pos+0x1f7/0x380 [ 419.003880][T15324] ? ksys_write+0x71/0x240 [ 419.008316][T15324] ksys_write+0x140/0x240 [ 419.012728][T15324] ? __ia32_sys_read+0x90/0x90 [ 419.017490][T15324] ? debug_smp_processor_id+0x17/0x20 [ 419.022887][T15324] __x64_sys_write+0x7b/0x90 [ 419.027482][T15324] x64_sys_call+0x8ef/0x9a0 [ 419.032002][T15324] do_syscall_64+0x4c/0xa0 [ 419.036449][T15324] ? clear_bhb_loop+0x50/0xa0 [ 419.041165][T15324] ? clear_bhb_loop+0x50/0xa0 [ 419.045851][T15324] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 419.051771][T15324] RIP: 0033:0x7f4bdee55be9 [ 419.056182][T15324] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 419.075805][T15324] RSP: 002b:00007f4bdd8be038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 419.084319][T15324] RAX: ffffffffffffffda RBX: 00007f4bdf08cfa0 RCX: 00007f4bdee55be9 [ 419.092383][T15324] RDX: 000000000000ffc0 RSI: 0000200000000000 RDI: 00000000000000c8 [ 419.100353][T15324] RBP: 00007f4bdd8be090 R08: 0000000000000000 R09: 0000000000000000 [ 419.108336][T15324] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 419.116310][T15324] R13: 00007f4bdf08d038 R14: 00007f4bdf08cfa0 R15: 00007ffecd9a4ca8 [ 419.124293][T15324] [ 420.135873][T15361] device macsec0 entered promiscuous mode [ 420.181811][T15362] FAULT_INJECTION: forcing a failure. [ 420.181811][T15362] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 420.222865][T15362] CPU: 1 PID: 15362 Comm: syz.1.5458 Not tainted syzkaller #0 [ 420.230402][T15362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 420.240598][T15362] Call Trace: [ 420.243922][T15362] [ 420.247126][T15362] __dump_stack+0x21/0x30 [ 420.251468][T15362] dump_stack_lvl+0xee/0x150 [ 420.256084][T15362] ? show_regs_print_info+0x20/0x20 [ 420.261494][T15362] ? bpf_cgroup_storage_free+0x8f/0xb0 [ 420.267423][T15362] dump_stack+0x15/0x20 [ 420.271693][T15362] should_fail+0x3c1/0x510 [ 420.276292][T15362] should_fail_usercopy+0x1a/0x20 [ 420.281319][T15362] _copy_to_user+0x20/0x90 [ 420.285738][T15362] bpf_test_finish+0x1ae/0x3b0 [ 420.290511][T15362] ? convert_skb_to___skb+0x360/0x360 [ 420.295933][T15362] ? convert_skb_to___skb+0x203/0x360 [ 420.301340][T15362] bpf_prog_test_run_skb+0xbba/0x1150 [ 420.306748][T15362] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 420.312675][T15362] bpf_prog_test_run+0x3d5/0x620 [ 420.317645][T15362] ? bpf_prog_query+0x230/0x230 [ 420.322538][T15362] ? selinux_bpf+0xce/0xf0 [ 420.326986][T15362] ? security_bpf+0x82/0xa0 [ 420.331522][T15362] __sys_bpf+0x52c/0x730 [ 420.335889][T15362] ? bpf_link_show_fdinfo+0x310/0x310 [ 420.341298][T15362] ? debug_smp_processor_id+0x17/0x20 [ 420.346935][T15362] __x64_sys_bpf+0x7c/0x90 [ 420.351381][T15362] x64_sys_call+0x4b9/0x9a0 [ 420.355910][T15362] do_syscall_64+0x4c/0xa0 [ 420.360350][T15362] ? clear_bhb_loop+0x50/0xa0 [ 420.365068][T15362] ? clear_bhb_loop+0x50/0xa0 [ 420.369791][T15362] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 420.375712][T15362] RIP: 0033:0x7f864716fbe9 [ 420.380135][T15362] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 420.399843][T15362] RSP: 002b:00007f8645bd8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 420.408271][T15362] RAX: ffffffffffffffda RBX: 00007f86473a6fa0 RCX: 00007f864716fbe9 [ 420.416449][T15362] RDX: 0000000000000050 RSI: 0000200000000340 RDI: 000000000000000a [ 420.424530][T15362] RBP: 00007f8645bd8090 R08: 0000000000000000 R09: 0000000000000000 [ 420.432518][T15362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 420.440495][T15362] R13: 00007f86473a7038 R14: 00007f86473a6fa0 R15: 00007fffd55424b8 [ 420.448591][T15362] [ 420.664197][T15389] device syzkaller0 entered promiscuous mode [ 420.684263][ T30] audit: type=1400 audit(1756971337.334:153): avc: denied { setattr } for pid=15380 comm="syz.0.5463" path="pipe:[72998]" dev="pipefs" ino=72998 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 422.113047][T15444] FAULT_INJECTION: forcing a failure. [ 422.113047][T15444] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 422.149166][T15444] CPU: 0 PID: 15444 Comm: syz.1.5486 Not tainted syzkaller #0 [ 422.156781][T15444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 422.167062][T15444] Call Trace: [ 422.170369][T15444] [ 422.173323][T15444] __dump_stack+0x21/0x30 [ 422.177680][T15444] dump_stack_lvl+0xee/0x150 [ 422.182301][T15444] ? show_regs_print_info+0x20/0x20 [ 422.187545][T15444] dump_stack+0x15/0x20 [ 422.191730][T15444] should_fail+0x3c1/0x510 [ 422.196182][T15444] should_fail_usercopy+0x1a/0x20 [ 422.201247][T15444] _copy_from_user+0x20/0xd0 [ 422.205868][T15444] __sys_bpf+0x233/0x730 [ 422.210149][T15444] ? bpf_link_show_fdinfo+0x310/0x310 [ 422.215564][T15444] ? debug_smp_processor_id+0x17/0x20 [ 422.220980][T15444] __x64_sys_bpf+0x7c/0x90 [ 422.225424][T15444] x64_sys_call+0x4b9/0x9a0 [ 422.229959][T15444] do_syscall_64+0x4c/0xa0 [ 422.234407][T15444] ? clear_bhb_loop+0x50/0xa0 [ 422.239132][T15444] ? clear_bhb_loop+0x50/0xa0 [ 422.243834][T15444] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 422.249757][T15444] RIP: 0033:0x7f864716fbe9 [ 422.254199][T15444] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 422.273829][T15444] RSP: 002b:00007f8645bd8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 422.282269][T15444] RAX: ffffffffffffffda RBX: 00007f86473a6fa0 RCX: 00007f864716fbe9 [ 422.290266][T15444] RDX: 0000000000000080 RSI: 0000200000003480 RDI: 0000000000000005 [ 422.298262][T15444] RBP: 00007f8645bd8090 R08: 0000000000000000 R09: 0000000000000000 [ 422.306451][T15444] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 422.314801][T15444] R13: 00007f86473a7038 R14: 00007f86473a6fa0 R15: 00007fffd55424b8 [ 422.322807][T15444] [ 422.432096][T15451] FAULT_INJECTION: forcing a failure. [ 422.432096][T15451] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 422.445476][T15451] CPU: 0 PID: 15451 Comm: syz.2.5484 Not tainted syzkaller #0 [ 422.453051][T15451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 422.463120][T15451] Call Trace: [ 422.466408][T15451] [ 422.469347][T15451] __dump_stack+0x21/0x30 [ 422.473689][T15451] dump_stack_lvl+0xee/0x150 [ 422.478291][T15451] ? show_regs_print_info+0x20/0x20 [ 422.483512][T15451] ? __kasan_check_write+0x14/0x20 [ 422.488629][T15451] ? _raw_spin_lock_irq+0x8f/0xe0 [ 422.493677][T15451] dump_stack+0x15/0x20 [ 422.497964][T15451] should_fail+0x3c1/0x510 [ 422.502392][T15451] should_fail_usercopy+0x1a/0x20 [ 422.507514][T15451] copy_page_from_iter_atomic+0x3fb/0x1350 [ 422.513338][T15451] ? pipe_zero+0x370/0x370 [ 422.517769][T15451] generic_perform_write+0x307/0x670 [ 422.523061][T15451] ? grab_cache_page_write_begin+0xb0/0xb0 [ 422.528871][T15451] ? file_remove_privs+0x590/0x590 [ 422.533993][T15451] ? rwsem_write_trylock+0x130/0x300 [ 422.539370][T15451] ? clear_nonspinnable+0x60/0x60 [ 422.544396][T15451] __generic_file_write_iter+0x268/0x480 [ 422.550030][T15451] generic_file_write_iter+0xa9/0x1d0 [ 422.555403][T15451] vfs_write+0x802/0xf70 [ 422.559652][T15451] ? file_end_write+0x1b0/0x1b0 [ 422.564509][T15451] ? wait_for_completion_killable_timeout+0x10/0x10 [ 422.571100][T15451] ? __fget_files+0x2c4/0x320 [ 422.575791][T15451] ? __fdget_pos+0x2d2/0x380 [ 422.580381][T15451] ? ksys_write+0x71/0x240 [ 422.584798][T15451] ksys_write+0x140/0x240 [ 422.589128][T15451] ? __ia32_sys_read+0x90/0x90 [ 422.593900][T15451] ? debug_smp_processor_id+0x17/0x20 [ 422.599364][T15451] __x64_sys_write+0x7b/0x90 [ 422.603957][T15451] x64_sys_call+0x8ef/0x9a0 [ 422.608464][T15451] do_syscall_64+0x4c/0xa0 [ 422.612930][T15451] ? clear_bhb_loop+0x50/0xa0 [ 422.617614][T15451] ? clear_bhb_loop+0x50/0xa0 [ 422.622308][T15451] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 422.628289][T15451] RIP: 0033:0x7f5280821be9 [ 422.632705][T15451] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 422.652409][T15451] RSP: 002b:00007f527f28a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 422.660826][T15451] RAX: ffffffffffffffda RBX: 00007f5280a58fa0 RCX: 00007f5280821be9 [ 422.668800][T15451] RDX: 0000000000040001 RSI: 0000200000000180 RDI: 0000000000000005 [ 422.676774][T15451] RBP: 00007f527f28a090 R08: 0000000000000000 R09: 0000000000000000 [ 422.684748][T15451] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 422.692719][T15451] R13: 00007f5280a59038 R14: 00007f5280a58fa0 R15: 00007ffe397982a8 [ 422.700900][T15451] [ 423.029869][T15476] bridge0: port 3(veth0) entered blocking state [ 423.038569][T15476] bridge0: port 3(veth0) entered disabled state [ 423.049632][T15476] device veth0 entered promiscuous mode [ 423.059865][T15476] bridge0: port 3(veth0) entered blocking state [ 423.066236][T15476] bridge0: port 3(veth0) entered forwarding state [ 423.255027][T15486] bond_slave_1: mtu less than device minimum [ 423.375559][T15495] FAULT_INJECTION: forcing a failure. [ 423.375559][T15495] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 423.447977][T15495] CPU: 0 PID: 15495 Comm: syz.4.5501 Not tainted syzkaller #0 [ 423.455622][T15495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 423.465686][T15495] Call Trace: [ 423.468968][T15495] [ 423.471904][T15495] __dump_stack+0x21/0x30 [ 423.476266][T15495] dump_stack_lvl+0xee/0x150 [ 423.480879][T15495] ? show_regs_print_info+0x20/0x20 [ 423.486093][T15495] dump_stack+0x15/0x20 [ 423.490262][T15495] should_fail+0x3c1/0x510 [ 423.494722][T15495] should_fail_alloc_page+0x55/0x80 [ 423.499953][T15495] prepare_alloc_pages+0x156/0x600 [ 423.505106][T15495] ? __alloc_pages_bulk+0xab0/0xab0 [ 423.510425][T15495] ? __alloc_pages_bulk+0x47f/0xab0 [ 423.515664][T15495] __alloc_pages+0x10a/0x440 [ 423.520293][T15495] ? prep_new_page+0x110/0x110 [ 423.525098][T15495] ? __vmalloc_node_range+0x375/0xaf0 [ 423.530505][T15495] __vmalloc_node_range+0x505/0xaf0 [ 423.535733][T15495] bpf_map_area_alloc+0xd5/0xe0 [ 423.540610][T15495] ? htab_map_alloc+0xb29/0x14f0 [ 423.545607][T15495] htab_map_alloc+0xb29/0x14f0 [ 423.550422][T15495] map_create+0x455/0x21b0 [ 423.554870][T15495] __sys_bpf+0x2cf/0x730 [ 423.559139][T15495] ? bpf_link_show_fdinfo+0x310/0x310 [ 423.564565][T15495] ? debug_smp_processor_id+0x17/0x20 [ 423.569971][T15495] __x64_sys_bpf+0x7c/0x90 [ 423.574411][T15495] x64_sys_call+0x4b9/0x9a0 [ 423.578982][T15495] do_syscall_64+0x4c/0xa0 [ 423.583491][T15495] ? clear_bhb_loop+0x50/0xa0 [ 423.588211][T15495] ? clear_bhb_loop+0x50/0xa0 [ 423.592929][T15495] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 423.598853][T15495] RIP: 0033:0x7f4bdee55be9 [ 423.603300][T15495] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 423.622938][T15495] RSP: 002b:00007f4bdd8be038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 423.631385][T15495] RAX: ffffffffffffffda RBX: 00007f4bdf08cfa0 RCX: 00007f4bdee55be9 [ 423.639394][T15495] RDX: 0000000000000050 RSI: 0000200000000380 RDI: 0000000000000000 [ 423.647494][T15495] RBP: 00007f4bdd8be090 R08: 0000000000000000 R09: 0000000000000000 [ 423.655511][T15495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 423.663494][T15495] R13: 00007f4bdf08d038 R14: 00007f4bdf08cfa0 R15: 00007ffecd9a4ca8 [ 423.671489][T15495] [ 423.748788][T15501] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 423.819994][T15501] device syzkaller0 entered promiscuous mode [ 426.054174][T15582] FAULT_INJECTION: forcing a failure. [ 426.054174][T15582] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 426.067504][T15582] CPU: 0 PID: 15582 Comm: syz.2.5531 Not tainted syzkaller #0 [ 426.074997][T15582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 426.085286][T15582] Call Trace: [ 426.088582][T15582] [ 426.091528][T15582] __dump_stack+0x21/0x30 [ 426.095896][T15582] dump_stack_lvl+0xee/0x150 [ 426.100684][T15582] ? show_regs_print_info+0x20/0x20 [ 426.106124][T15582] ? __kasan_check_write+0x14/0x20 [ 426.111268][T15582] ? _raw_spin_lock_irq+0x8f/0xe0 [ 426.116313][T15582] dump_stack+0x15/0x20 [ 426.120483][T15582] should_fail+0x3c1/0x510 [ 426.124926][T15582] should_fail_usercopy+0x1a/0x20 [ 426.129958][T15582] copy_page_from_iter_atomic+0x3fb/0x1350 [ 426.135787][T15582] ? pipe_zero+0x370/0x370 [ 426.140343][T15582] generic_perform_write+0x307/0x670 [ 426.145675][T15582] ? grab_cache_page_write_begin+0xb0/0xb0 [ 426.151502][T15582] ? file_remove_privs+0x590/0x590 [ 426.156636][T15582] ? rwsem_write_trylock+0x130/0x300 [ 426.161958][T15582] ? bpf_probe_read_user+0x68/0x70 [ 426.167136][T15582] ? clear_nonspinnable+0x60/0x60 [ 426.172269][T15582] ? avc_policy_seqno+0x1b/0x70 [ 426.177231][T15582] __generic_file_write_iter+0x268/0x480 [ 426.182981][T15582] generic_file_write_iter+0xa9/0x1d0 [ 426.188418][T15582] vfs_write+0x802/0xf70 [ 426.192678][T15582] ? file_end_write+0x1b0/0x1b0 [ 426.197710][T15582] ? wait_for_completion_killable_timeout+0x10/0x10 [ 426.204503][T15582] ? __fget_files+0x2c4/0x320 [ 426.209239][T15582] ? __fdget_pos+0x2d2/0x380 [ 426.213860][T15582] ? ksys_write+0x71/0x240 [ 426.218302][T15582] ksys_write+0x140/0x240 [ 426.222657][T15582] ? __ia32_sys_read+0x90/0x90 [ 426.227454][T15582] ? debug_smp_processor_id+0x17/0x20 [ 426.233009][T15582] __x64_sys_write+0x7b/0x90 [ 426.237756][T15582] x64_sys_call+0x8ef/0x9a0 [ 426.242292][T15582] do_syscall_64+0x4c/0xa0 [ 426.246730][T15582] ? clear_bhb_loop+0x50/0xa0 [ 426.251706][T15582] ? clear_bhb_loop+0x50/0xa0 [ 426.256611][T15582] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 426.263037][T15582] RIP: 0033:0x7f5280821be9 [ 426.267493][T15582] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 426.287262][T15582] RSP: 002b:00007f527f28a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 426.295699][T15582] RAX: ffffffffffffffda RBX: 00007f5280a58fa0 RCX: 00007f5280821be9 [ 426.303694][T15582] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000006 [ 426.311681][T15582] RBP: 00007f527f28a090 R08: 0000000000000000 R09: 0000000000000000 [ 426.319866][T15582] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 426.327849][T15582] R13: 00007f5280a59038 R14: 00007f5280a58fa0 R15: 00007ffe397982a8 [ 426.335846][T15582] [ 426.583653][ T30] audit: type=1400 audit(1756971343.234:154): avc: denied { ioctl } for pid=15601 comm="syz.3.5537" path="socket:[83924]" dev="sockfs" ino=83924 ioctlcmd=0x54d3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 426.609678][T15600] FAULT_INJECTION: forcing a failure. [ 426.609678][T15600] name failslab, interval 1, probability 0, space 0, times 0 [ 426.641378][T15600] CPU: 1 PID: 15600 Comm: syz.0.5536 Not tainted syzkaller #0 [ 426.648919][T15600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 426.659010][T15600] Call Trace: [ 426.662315][T15600] [ 426.665262][T15600] __dump_stack+0x21/0x30 [ 426.669621][T15600] dump_stack_lvl+0xee/0x150 [ 426.674232][T15600] ? show_regs_print_info+0x20/0x20 [ 426.679468][T15600] dump_stack+0x15/0x20 [ 426.683651][T15600] should_fail+0x3c1/0x510 [ 426.688085][T15600] __should_failslab+0xa4/0xe0 [ 426.692973][T15600] should_failslab+0x9/0x20 [ 426.697506][T15600] slab_pre_alloc_hook+0x3b/0xe0 [ 426.702561][T15600] ? dup_task_struct+0x57/0xc10 [ 426.707559][T15600] kmem_cache_alloc+0x44/0x260 [ 426.712359][T15600] ? _raw_spin_lock_irq+0x8f/0xe0 [ 426.717427][T15600] dup_task_struct+0x57/0xc10 [ 426.722134][T15600] ? __kasan_check_write+0x14/0x20 [ 426.727276][T15600] ? recalc_sigpending+0x1ac/0x230 [ 426.732434][T15600] copy_process+0x5a9/0x3210 [ 426.737174][T15600] ? kstrtol_from_user+0x260/0x260 [ 426.742330][T15600] ? __kasan_check_write+0x14/0x20 [ 426.747472][T15600] ? proc_fail_nth_write+0x17a/0x1f0 [ 426.752787][T15600] ? proc_fail_nth_read+0x210/0x210 [ 426.758007][T15600] ? __pidfd_prepare+0x150/0x150 [ 426.762974][T15600] ? security_file_permission+0x83/0xa0 [ 426.768550][T15600] kernel_clone+0x23f/0x940 [ 426.773082][T15600] ? create_io_thread+0x130/0x130 [ 426.778247][T15600] ? __kasan_check_write+0x14/0x20 [ 426.783386][T15600] ? mutex_unlock+0x89/0x220 [ 426.788012][T15600] __x64_sys_clone+0x176/0x1d0 [ 426.792818][T15600] ? __kasan_check_write+0x14/0x20 [ 426.798045][T15600] ? __ia32_sys_vfork+0xf0/0xf0 [ 426.802934][T15600] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 426.809035][T15600] x64_sys_call+0x41f/0x9a0 [ 426.813569][T15600] do_syscall_64+0x4c/0xa0 [ 426.818104][T15600] ? clear_bhb_loop+0x50/0xa0 [ 426.822853][T15600] ? clear_bhb_loop+0x50/0xa0 [ 426.827692][T15600] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 426.833703][T15600] RIP: 0033:0x7fb68cb7abe9 [ 426.838142][T15600] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 426.857891][T15600] RSP: 002b:00007fb68b5e2fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 426.866443][T15600] RAX: ffffffffffffffda RBX: 00007fb68cdb1fa0 RCX: 00007fb68cb7abe9 [ 426.874454][T15600] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 426.882454][T15600] RBP: 00007fb68b5e3090 R08: 0000000000000000 R09: 0000000000000000 [ 426.890840][T15600] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 426.898841][T15600] R13: 00007fb68cdb2038 R14: 00007fb68cdb1fa0 R15: 00007ffcfa34e848 [ 426.906842][T15600] [ 427.589662][T15641] FAULT_INJECTION: forcing a failure. [ 427.589662][T15641] name failslab, interval 1, probability 0, space 0, times 0 [ 427.673271][T15641] CPU: 0 PID: 15641 Comm: syz.4.5552 Not tainted syzkaller #0 [ 427.680798][T15641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 427.690965][T15641] Call Trace: [ 427.694328][T15641] [ 427.697277][T15641] __dump_stack+0x21/0x30 [ 427.701645][T15641] dump_stack_lvl+0xee/0x150 [ 427.706270][T15641] ? show_regs_print_info+0x20/0x20 [ 427.711680][T15641] dump_stack+0x15/0x20 [ 427.715862][T15641] should_fail+0x3c1/0x510 [ 427.720306][T15641] __should_failslab+0xa4/0xe0 [ 427.725095][T15641] should_failslab+0x9/0x20 [ 427.729619][T15641] slab_pre_alloc_hook+0x3b/0xe0 [ 427.734588][T15641] ? security_file_alloc+0x33/0x120 [ 427.739792][T15641] kmem_cache_alloc+0x44/0x260 [ 427.744555][T15641] security_file_alloc+0x33/0x120 [ 427.749585][T15641] __alloc_file+0xb5/0x2a0 [ 427.754003][T15641] alloc_empty_file+0x97/0x180 [ 427.758774][T15641] alloc_file+0x59/0x540 [ 427.763108][T15641] alloc_file_pseudo+0x17a/0x1f0 [ 427.768129][T15641] ? alloc_empty_file_noaccount+0x80/0x80 [ 427.773861][T15641] sock_alloc_file+0xba/0x260 [ 427.778546][T15641] __sys_socketpair+0x2c3/0x590 [ 427.783419][T15641] __x64_sys_socketpair+0x9b/0xb0 [ 427.788476][T15641] x64_sys_call+0x36/0x9a0 [ 427.792928][T15641] do_syscall_64+0x4c/0xa0 [ 427.797381][T15641] ? clear_bhb_loop+0x50/0xa0 [ 427.802113][T15641] ? clear_bhb_loop+0x50/0xa0 [ 427.806805][T15641] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 427.812703][T15641] RIP: 0033:0x7f4bdee55be9 [ 427.817148][T15641] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 427.836856][T15641] RSP: 002b:00007f4bdd8be038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 427.845309][T15641] RAX: ffffffffffffffda RBX: 00007f4bdf08cfa0 RCX: 00007f4bdee55be9 [ 427.853323][T15641] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 427.861328][T15641] RBP: 00007f4bdd8be090 R08: 0000000000000000 R09: 0000000000000000 [ 427.869309][T15641] R10: 00002000000000c0 R11: 0000000000000246 R12: 0000000000000002 [ 427.877281][T15641] R13: 00007f4bdf08d038 R14: 00007f4bdf08cfa0 R15: 00007ffecd9a4ca8 [ 427.885289][T15641] [ 428.129335][T15665] FAULT_INJECTION: forcing a failure. [ 428.129335][T15665] name failslab, interval 1, probability 0, space 0, times 0 [ 428.142606][T15665] CPU: 1 PID: 15665 Comm: syz.0.5562 Not tainted syzkaller #0 [ 428.150286][T15665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 428.161154][T15665] Call Trace: [ 428.164565][T15665] [ 428.167516][T15665] __dump_stack+0x21/0x30 [ 428.171874][T15665] dump_stack_lvl+0xee/0x150 [ 428.176485][T15665] ? show_regs_print_info+0x20/0x20 [ 428.181708][T15665] dump_stack+0x15/0x20 [ 428.185891][T15665] should_fail+0x3c1/0x510 [ 428.190343][T15665] __should_failslab+0xa4/0xe0 [ 428.195140][T15665] should_failslab+0x9/0x20 [ 428.199667][T15665] slab_pre_alloc_hook+0x3b/0xe0 [ 428.204633][T15665] __kmalloc+0x6d/0x2c0 [ 428.208810][T15665] ? bpf_map_kmalloc_node+0xb9/0x140 [ 428.214126][T15665] bpf_map_kmalloc_node+0xb9/0x140 [ 428.219485][T15665] alloc_htab_elem+0x299/0x950 [ 428.224468][T15665] htab_map_update_elem+0x37a/0x9c0 [ 428.229703][T15665] bpf_map_update_value+0x30e/0x3e0 [ 428.235039][T15665] generic_map_update_batch+0x4f5/0x740 [ 428.240716][T15665] ? generic_map_delete_batch+0x510/0x510 [ 428.246502][T15665] ? __fdget+0x1a1/0x230 [ 428.251054][T15665] ? generic_map_delete_batch+0x510/0x510 [ 428.256806][T15665] bpf_map_do_batch+0x463/0x5f0 [ 428.261710][T15665] __sys_bpf+0x5e3/0x730 [ 428.265995][T15665] ? bpf_link_show_fdinfo+0x310/0x310 [ 428.271399][T15665] ? debug_smp_processor_id+0x17/0x20 [ 428.276800][T15665] __x64_sys_bpf+0x7c/0x90 [ 428.281463][T15665] x64_sys_call+0x4b9/0x9a0 [ 428.286262][T15665] do_syscall_64+0x4c/0xa0 [ 428.290811][T15665] ? clear_bhb_loop+0x50/0xa0 [ 428.295512][T15665] ? clear_bhb_loop+0x50/0xa0 [ 428.300232][T15665] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 428.306275][T15665] RIP: 0033:0x7fb68cb7abe9 [ 428.310712][T15665] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 428.330877][T15665] RSP: 002b:00007fb68b5e3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 428.339409][T15665] RAX: ffffffffffffffda RBX: 00007fb68cdb1fa0 RCX: 00007fb68cb7abe9 [ 428.347403][T15665] RDX: 0000000000000038 RSI: 00002000000002c0 RDI: 000000000000001a [ 428.355393][T15665] RBP: 00007fb68b5e3090 R08: 0000000000000000 R09: 0000000000000000 [ 428.363485][T15665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 428.371510][T15665] R13: 00007fb68cdb2038 R14: 00007fb68cdb1fa0 R15: 00007ffcfa34e848 [ 428.379687][T15665] [ 428.823112][T15680] device pim6reg1 entered promiscuous mode [ 428.967202][T15687] device pim6reg1 entered promiscuous mode [ 428.987330][T15687] FAULT_INJECTION: forcing a failure. [ 428.987330][T15687] name failslab, interval 1, probability 0, space 0, times 0 [ 429.058855][T15687] CPU: 0 PID: 15687 Comm: syz.2.5570 Not tainted syzkaller #0 [ 429.066390][T15687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 429.076579][T15687] Call Trace: [ 429.079889][T15687] [ 429.082840][T15687] __dump_stack+0x21/0x30 [ 429.087200][T15687] dump_stack_lvl+0xee/0x150 [ 429.091901][T15687] ? show_regs_print_info+0x20/0x20 [ 429.097132][T15687] ? __kasan_check_write+0x14/0x20 [ 429.102384][T15687] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 429.107894][T15687] ? _raw_spin_lock+0xe0/0xe0 [ 429.112603][T15687] ? kasan_quarantine_put+0x34/0x190 [ 429.117920][T15687] dump_stack+0x15/0x20 [ 429.122109][T15687] should_fail+0x3c1/0x510 [ 429.126559][T15687] __should_failslab+0xa4/0xe0 [ 429.131372][T15687] should_failslab+0x9/0x20 [ 429.135920][T15687] slab_pre_alloc_hook+0x3b/0xe0 [ 429.140913][T15687] kmem_cache_alloc_trace+0x48/0x270 [ 429.146255][T15687] ? ____ip_mc_inc_group+0x1ab/0x860 [ 429.151684][T15687] ____ip_mc_inc_group+0x1ab/0x860 [ 429.156852][T15687] ip_mc_up+0x112/0x1f0 [ 429.161197][T15687] inetdev_event+0xc5d/0x10a0 [ 429.165893][T15687] ? devinet_exit_net+0x220/0x220 [ 429.171081][T15687] ? up_read+0x56/0x1d0 [ 429.175335][T15687] raw_notifier_call_chain+0x90/0x100 [ 429.180846][T15687] __dev_notify_flags+0x28f/0x500 [ 429.185875][T15687] ? __dev_change_flags+0x6a0/0x6a0 [ 429.191072][T15687] ? __dev_change_flags+0x510/0x6a0 [ 429.196302][T15687] ? dev_get_flags+0x1e0/0x1e0 [ 429.201075][T15687] ? __kasan_slab_free+0x11/0x20 [ 429.206016][T15687] dev_change_flags+0xe8/0x1a0 [ 429.210781][T15687] dev_ifsioc+0x147/0xe70 [ 429.215116][T15687] ? dev_ioctl+0xd10/0xd10 [ 429.219599][T15687] ? __kasan_check_write+0x14/0x20 [ 429.224718][T15687] ? mutex_lock+0x95/0x1a0 [ 429.229144][T15687] ? wait_for_completion_killable_timeout+0x10/0x10 [ 429.235757][T15687] ? dev_get_by_name_rcu+0xc8/0xf0 [ 429.240899][T15687] dev_ioctl+0x560/0xd10 [ 429.245265][T15687] sock_do_ioctl+0x22e/0x300 [ 429.249982][T15687] ? sock_show_fdinfo+0xa0/0xa0 [ 429.254841][T15687] ? selinux_file_ioctl+0x377/0x480 [ 429.260060][T15687] sock_ioctl+0x4bc/0x6b0 [ 429.264575][T15687] ? sock_poll+0x3d0/0x3d0 [ 429.269093][T15687] ? __fget_files+0x2c4/0x320 [ 429.274148][T15687] ? security_file_ioctl+0x84/0xa0 [ 429.279277][T15687] ? sock_poll+0x3d0/0x3d0 [ 429.283830][T15687] __se_sys_ioctl+0x121/0x1a0 [ 429.288535][T15687] __x64_sys_ioctl+0x7b/0x90 [ 429.293253][T15687] x64_sys_call+0x2f/0x9a0 [ 429.297680][T15687] do_syscall_64+0x4c/0xa0 [ 429.302107][T15687] ? clear_bhb_loop+0x50/0xa0 [ 429.306802][T15687] ? clear_bhb_loop+0x50/0xa0 [ 429.311511][T15687] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 429.317421][T15687] RIP: 0033:0x7f5280821be9 [ 429.321843][T15687] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 429.341562][T15687] RSP: 002b:00007f527f28a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 429.349997][T15687] RAX: ffffffffffffffda RBX: 00007f5280a58fa0 RCX: 00007f5280821be9 [ 429.358089][T15687] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 000000000000000c [ 429.366330][T15687] RBP: 00007f527f28a090 R08: 0000000000000000 R09: 0000000000000000 [ 429.375045][T15687] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 429.384565][T15687] R13: 00007f5280a59038 R14: 00007f5280a58fa0 R15: 00007ffe397982a8 [ 429.392906][T15687] [ 429.568911][T15707] FAULT_INJECTION: forcing a failure. [ 429.568911][T15707] name failslab, interval 1, probability 0, space 0, times 0 [ 429.593297][T15707] CPU: 1 PID: 15707 Comm: syz.3.5577 Not tainted syzkaller #0 [ 429.600832][T15707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 429.610924][T15707] Call Trace: [ 429.614262][T15707] [ 429.617222][T15707] __dump_stack+0x21/0x30 [ 429.621672][T15707] dump_stack_lvl+0xee/0x150 [ 429.626282][T15707] ? show_regs_print_info+0x20/0x20 [ 429.631497][T15707] dump_stack+0x15/0x20 [ 429.636448][T15707] should_fail+0x3c1/0x510 [ 429.640937][T15707] __should_failslab+0xa4/0xe0 [ 429.645723][T15707] should_failslab+0x9/0x20 [ 429.650406][T15707] slab_pre_alloc_hook+0x3b/0xe0 [ 429.655353][T15707] ? alloc_vmap_area+0x17a/0x1990 [ 429.660396][T15707] kmem_cache_alloc+0x44/0x260 [ 429.665200][T15707] alloc_vmap_area+0x17a/0x1990 [ 429.670063][T15707] ? vm_map_ram+0xa60/0xa60 [ 429.674572][T15707] ? kmem_cache_alloc_trace+0x119/0x270 [ 429.680133][T15707] __get_vm_area_node+0x14e/0x350 [ 429.685180][T15707] __vmalloc_node_range+0xdf/0xaf0 [ 429.690390][T15707] ? bpf_check+0x1b2/0xf280 [ 429.694903][T15707] ? get_page_from_freelist+0x2cc5/0x2d50 [ 429.700628][T15707] ? vm_mmap+0xb0/0xb0 [ 429.704700][T15707] ? bpf_check+0x1b2/0xf280 [ 429.709293][T15707] vzalloc+0x78/0x90 [ 429.713215][T15707] ? bpf_check+0x1b2/0xf280 [ 429.717726][T15707] bpf_check+0x1b2/0xf280 [ 429.722064][T15707] ? 0xffffffffa0002f0c [ 429.726232][T15707] ? is_bpf_text_address+0x177/0x190 [ 429.731611][T15707] ? bpf_get_btf_vmlinux+0x60/0x60 [ 429.736817][T15707] ? unwind_get_return_address+0x4d/0x90 [ 429.742459][T15707] ? stack_trace_save+0xe0/0xe0 [ 429.747317][T15707] ? arch_stack_walk+0xee/0x140 [ 429.752192][T15707] ? stack_trace_save+0x98/0xe0 [ 429.757075][T15707] ? __stack_depot_save+0x34/0x480 [ 429.762195][T15707] ? __kasan_slab_alloc+0x69/0xf0 [ 429.767255][T15707] ? _find_next_bit+0x1fa/0x200 [ 429.772114][T15707] ? __kasan_kmalloc+0xec/0x110 [ 429.776967][T15707] ? __kasan_kmalloc+0xda/0x110 [ 429.781917][T15707] ? kmem_cache_alloc_trace+0x119/0x270 [ 429.787470][T15707] ? selinux_bpf_prog_alloc+0x51/0x140 [ 429.793042][T15707] ? security_bpf_prog_alloc+0x62/0x90 [ 429.798504][T15707] ? bpf_prog_load+0x97c/0x1550 [ 429.803364][T15707] ? __sys_bpf+0x4c3/0x730 [ 429.807778][T15707] ? __x64_sys_bpf+0x7c/0x90 [ 429.812541][T15707] ? x64_sys_call+0x4b9/0x9a0 [ 429.817219][T15707] ? do_syscall_64+0x4c/0xa0 [ 429.821821][T15707] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 429.827907][T15707] ? check_stack_object+0x81/0x140 [ 429.833111][T15707] ? memset+0x35/0x40 [ 429.837102][T15707] ? bpf_obj_name_cpy+0x193/0x1e0 [ 429.842138][T15707] bpf_prog_load+0x1042/0x1550 [ 429.846912][T15707] ? __kasan_check_write+0x14/0x20 [ 429.852130][T15707] ? map_freeze+0x360/0x360 [ 429.856666][T15707] ? selinux_bpf+0xc7/0xf0 [ 429.861143][T15707] ? security_bpf+0x82/0xa0 [ 429.865686][T15707] __sys_bpf+0x4c3/0x730 [ 429.869944][T15707] ? bpf_link_show_fdinfo+0x310/0x310 [ 429.875416][T15707] ? debug_smp_processor_id+0x17/0x20 [ 429.880913][T15707] __x64_sys_bpf+0x7c/0x90 [ 429.885364][T15707] x64_sys_call+0x4b9/0x9a0 [ 429.889878][T15707] do_syscall_64+0x4c/0xa0 [ 429.894302][T15707] ? clear_bhb_loop+0x50/0xa0 [ 429.898983][T15707] ? clear_bhb_loop+0x50/0xa0 [ 429.903662][T15707] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 429.909762][T15707] RIP: 0033:0x7f54fd8ccbe9 [ 429.914195][T15707] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 429.933900][T15707] RSP: 002b:00007f54fc335038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 429.942420][T15707] RAX: ffffffffffffffda RBX: 00007f54fdb03fa0 RCX: 00007f54fd8ccbe9 [ 429.950485][T15707] RDX: 0000000000000048 RSI: 0000200000000080 RDI: 0000000000000005 [ 429.958463][T15707] RBP: 00007f54fc335090 R08: 0000000000000000 R09: 0000000000000000 [ 429.966459][T15707] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 429.974441][T15707] R13: 00007f54fdb04038 R14: 00007f54fdb03fa0 R15: 00007ffcbeeb2768 [ 429.982425][T15707] [ 430.016591][T15707] syz.3.5577: vmalloc error: size 280, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz3,mems_allowed=0 [ 430.035139][T15707] CPU: 1 PID: 15707 Comm: syz.3.5577 Not tainted syzkaller #0 [ 430.042654][T15707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 430.052729][T15707] Call Trace: [ 430.056116][T15707] [ 430.059064][T15707] __dump_stack+0x21/0x30 [ 430.063537][T15707] dump_stack_lvl+0xee/0x150 [ 430.068233][T15707] ? show_regs_print_info+0x20/0x20 [ 430.073450][T15707] ? pr_cont_kernfs_name+0xe3/0xf0 [ 430.078666][T15707] dump_stack+0x15/0x20 [ 430.082842][T15707] warn_alloc+0x1b0/0x1d0 [ 430.087455][T15707] ? __kasan_slab_free+0x11/0x20 [ 430.092424][T15707] ? slab_free_freelist_hook+0xc2/0x190 [ 430.098364][T15707] ? zone_watermark_ok_safe+0x270/0x270 [ 430.103937][T15707] ? kfree+0xc4/0x270 [ 430.107933][T15707] ? __get_vm_area_node+0x163/0x350 [ 430.113145][T15707] __vmalloc_node_range+0x152/0xaf0 [ 430.118354][T15707] ? get_page_from_freelist+0x2cc5/0x2d50 [ 430.124076][T15707] ? vm_mmap+0xb0/0xb0 [ 430.128152][T15707] ? bpf_check+0x1b2/0xf280 [ 430.132671][T15707] vzalloc+0x78/0x90 [ 430.136573][T15707] ? bpf_check+0x1b2/0xf280 [ 430.141091][T15707] bpf_check+0x1b2/0xf280 [ 430.145440][T15707] ? is_bpf_text_address+0x177/0x190 [ 430.150731][T15707] ? bpf_get_btf_vmlinux+0x60/0x60 [ 430.155850][T15707] ? unwind_get_return_address+0x4d/0x90 [ 430.161492][T15707] ? stack_trace_save+0xe0/0xe0 [ 430.166606][T15707] ? arch_stack_walk+0xee/0x140 [ 430.171465][T15707] ? stack_trace_save+0x98/0xe0 [ 430.176319][T15707] ? __stack_depot_save+0x34/0x480 [ 430.181439][T15707] ? __kasan_slab_alloc+0x69/0xf0 [ 430.186471][T15707] ? _find_next_bit+0x1fa/0x200 [ 430.191326][T15707] ? __kasan_kmalloc+0xec/0x110 [ 430.196204][T15707] ? __kasan_kmalloc+0xda/0x110 [ 430.201057][T15707] ? kmem_cache_alloc_trace+0x119/0x270 [ 430.206611][T15707] ? selinux_bpf_prog_alloc+0x51/0x140 [ 430.212069][T15707] ? security_bpf_prog_alloc+0x62/0x90 [ 430.217530][T15707] ? bpf_prog_load+0x97c/0x1550 [ 430.222385][T15707] ? __sys_bpf+0x4c3/0x730 [ 430.226803][T15707] ? __x64_sys_bpf+0x7c/0x90 [ 430.231392][T15707] ? x64_sys_call+0x4b9/0x9a0 [ 430.236070][T15707] ? do_syscall_64+0x4c/0xa0 [ 430.241017][T15707] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 430.247103][T15707] ? check_stack_object+0x81/0x140 [ 430.252233][T15707] ? memset+0x35/0x40 [ 430.256214][T15707] ? bpf_obj_name_cpy+0x193/0x1e0 [ 430.261254][T15707] bpf_prog_load+0x1042/0x1550 [ 430.266018][T15707] ? __kasan_check_write+0x14/0x20 [ 430.271138][T15707] ? map_freeze+0x360/0x360 [ 430.275649][T15707] ? selinux_bpf+0xc7/0xf0 [ 430.280068][T15707] ? security_bpf+0x82/0xa0 [ 430.284576][T15707] __sys_bpf+0x4c3/0x730 [ 430.288820][T15707] ? bpf_link_show_fdinfo+0x310/0x310 [ 430.294199][T15707] ? debug_smp_processor_id+0x17/0x20 [ 430.299664][T15707] __x64_sys_bpf+0x7c/0x90 [ 430.304082][T15707] x64_sys_call+0x4b9/0x9a0 [ 430.308592][T15707] do_syscall_64+0x4c/0xa0 [ 430.313013][T15707] ? clear_bhb_loop+0x50/0xa0 [ 430.317696][T15707] ? clear_bhb_loop+0x50/0xa0 [ 430.322374][T15707] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 430.328271][T15707] RIP: 0033:0x7f54fd8ccbe9 [ 430.332689][T15707] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 430.352572][T15707] RSP: 002b:00007f54fc335038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 430.360991][T15707] RAX: ffffffffffffffda RBX: 00007f54fdb03fa0 RCX: 00007f54fd8ccbe9 [ 430.368966][T15707] RDX: 0000000000000048 RSI: 0000200000000080 RDI: 0000000000000005 [ 430.377287][T15707] RBP: 00007f54fc335090 R08: 0000000000000000 R09: 0000000000000000 [ 430.385266][T15707] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 430.393242][T15707] R13: 00007f54fdb04038 R14: 00007f54fdb03fa0 R15: 00007ffcbeeb2768 [ 430.401225][T15707] [ 430.432432][T15721] device sit0 left promiscuous mode [ 430.432716][T15707] Mem-Info: [ 430.441662][T15707] active_anon:38 inactive_anon:9290 isolated_anon:0 [ 430.441662][T15707] active_file:24868 inactive_file:4784 isolated_file:0 [ 430.441662][T15707] unevictable:0 dirty:506 writeback:0 [ 430.441662][T15707] slab_reclaimable:8402 slab_unreclaimable:78880 [ 430.441662][T15707] mapped:30196 shmem:163 pagetables:570 bounce:0 [ 430.441662][T15707] kernel_misc_reclaimable:0 [ 430.441662][T15707] free:1529679 free_pcp:24628 free_cma:0 [ 430.501281][T15707] Node 0 active_anon:152kB inactive_anon:37160kB active_file:99472kB inactive_file:19136kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:120784kB dirty:2024kB writeback:0kB shmem:652kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:6432kB pagetables:2380kB all_unreclaimable? no [ 430.668531][T15707] DMA32 free:2978772kB min:62612kB low:78264kB high:93916kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2982960kB mlocked:0kB bounce:0kB free_pcp:4188kB local_pcp:56kB free_cma:0kB [ 430.711197][T15707] lowmem_reserve[]: 0 3941 3941 [ 430.716252][T15707] Normal free:3139944kB min:84840kB low:106048kB high:127256kB reserved_highatomic:0KB active_anon:152kB inactive_anon:37040kB active_file:99472kB inactive_file:19136kB unevictable:0kB writepending:2028kB present:5242880kB managed:4036096kB mlocked:0kB bounce:0kB free_pcp:94572kB local_pcp:47416kB free_cma:0kB [ 430.750128][T15707] lowmem_reserve[]: 0 0 0 [ 430.755941][T15707] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2978772kB [ 430.772555][T15707] Normal: 2462*4kB (UME) 526*8kB (UME) 1090*16kB (UME) 733*32kB (UME) 283*64kB (UME) 116*128kB (UME) 74*256kB (UME) 36*512kB (UME) 10*1024kB (UM) 1*2048kB (U) 733*4096kB (M) = 3139944kB [ 430.802993][T15707] 29815 total pagecache pages [ 430.808105][T15707] 0 pages in swap cache [ 430.822163][T15707] Swap cache stats: add 0, delete 0, find 0/0 [ 430.828917][T15707] Free swap = 124996kB [ 430.843242][T15707] Total swap = 124996kB [ 430.847468][T15707] 2097051 pages RAM [ 430.868161][T15707] 0 pages HighMem/MovableOnly [ 430.873116][T15707] 342287 pages reserved [ 430.877540][T15707] 0 pages cma reserved [ 430.922435][T15736] FAULT_INJECTION: forcing a failure. [ 430.922435][T15736] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 430.938629][T15736] CPU: 0 PID: 15736 Comm: syz.4.5588 Not tainted syzkaller #0 [ 430.946243][T15736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 430.956585][T15736] Call Trace: [ 430.959884][T15736] [ 430.962834][T15736] __dump_stack+0x21/0x30 [ 430.967171][T15736] dump_stack_lvl+0xee/0x150 [ 430.971764][T15736] ? show_regs_print_info+0x20/0x20 [ 430.977027][T15736] ? stack_trace_save+0x98/0xe0 [ 430.981894][T15736] ? __stack_depot_save+0x34/0x480 [ 430.987032][T15736] dump_stack+0x15/0x20 [ 430.991327][T15736] should_fail+0x3c1/0x510 [ 430.995746][T15736] should_fail_usercopy+0x1a/0x20 [ 431.000803][T15736] _copy_from_user+0x20/0xd0 [ 431.006215][T15736] __copy_msghdr_from_user+0xaf/0x5e0 [ 431.011791][T15736] ? _kstrtoull+0x3c0/0x4d0 [ 431.016452][T15736] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 431.022152][T15736] ? kstrtouint_from_user+0x1a0/0x200 [ 431.027629][T15736] ___sys_sendmsg+0x156/0x260 [ 431.032343][T15736] ? __sys_sendmsg+0x250/0x250 [ 431.037508][T15736] ? __fdget+0x1a1/0x230 [ 431.042467][T15736] __x64_sys_sendmsg+0x1e2/0x2a0 [ 431.047427][T15736] ? ___sys_sendmsg+0x260/0x260 [ 431.052383][T15736] ? ksys_write+0x1eb/0x240 [ 431.056915][T15736] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 431.063016][T15736] x64_sys_call+0x4b/0x9a0 [ 431.067441][T15736] do_syscall_64+0x4c/0xa0 [ 431.071860][T15736] ? clear_bhb_loop+0x50/0xa0 [ 431.076555][T15736] ? clear_bhb_loop+0x50/0xa0 [ 431.081258][T15736] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 431.087186][T15736] RIP: 0033:0x7f4bdee55be9 [ 431.091662][T15736] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 431.111273][T15736] RSP: 002b:00007f4bdd8be038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 431.120052][T15736] RAX: ffffffffffffffda RBX: 00007f4bdf08cfa0 RCX: 00007f4bdee55be9 [ 431.128209][T15736] RDX: 0000000020000000 RSI: 00002000000006c0 RDI: 0000000000000007 [ 431.136184][T15736] RBP: 00007f4bdd8be090 R08: 0000000000000000 R09: 0000000000000000 [ 431.144458][T15736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 431.152432][T15736] R13: 00007f4bdf08d038 R14: 00007f4bdf08cfa0 R15: 00007ffecd9a4ca8 [ 431.160429][T15736] [ 432.359701][T15776] bridge0: port 1(bridge_slave_0) entered blocking state [ 432.367224][T15776] bridge0: port 1(bridge_slave_0) entered disabled state [ 432.375313][T15776] device bridge_slave_0 entered promiscuous mode [ 432.383051][T15776] bridge0: port 2(bridge_slave_1) entered blocking state [ 432.391226][T15776] bridge0: port 2(bridge_slave_1) entered disabled state [ 432.398904][T15776] device bridge_slave_1 entered promiscuous mode [ 432.465185][T15791] device sit0 left promiscuous mode [ 432.639440][T15799] device sit0 entered promiscuous mode [ 432.725603][ T10] device bridge_slave_1 left promiscuous mode [ 432.733114][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 432.754336][ T10] device bridge_slave_0 left promiscuous mode [ 432.773157][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 432.797060][ T10] device veth1_macvtap left promiscuous mode [ 433.272633][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 433.283391][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 433.324800][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 433.337423][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 433.352959][ T407] bridge0: port 1(bridge_slave_0) entered blocking state [ 433.360147][ T407] bridge0: port 1(bridge_slave_0) entered forwarding state [ 433.388706][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 433.426053][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 433.442975][ T407] bridge0: port 2(bridge_slave_1) entered blocking state [ 433.450289][ T407] bridge0: port 2(bridge_slave_1) entered forwarding state [ 433.465930][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 437.129020][T15808] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.139470][T15808] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.427554][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 437.435679][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 437.444325][T15825] device veth0_vlan left promiscuous mode [ 437.453961][T15825] device veth0_vlan entered promiscuous mode [ 437.494377][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 437.505244][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 437.523642][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿþ€: link becomes ready [ 437.532199][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 437.548672][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 437.580931][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 437.594630][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 437.614999][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 437.629294][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 437.653034][T15776] device veth0_vlan entered promiscuous mode [ 437.781207][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 437.790616][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 437.872063][T15823] bridge0: port 1(bridge_slave_0) entered blocking state [ 437.879251][T15823] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.886741][T15823] device bridge_slave_0 entered promiscuous mode [ 437.919381][T15776] device veth1_macvtap entered promiscuous mode [ 437.952708][T15823] bridge0: port 2(bridge_slave_1) entered blocking state [ 437.963384][ T30] audit: type=1400 audit(1756971354.614:155): avc: denied { read } for pid=15859 comm="syz.2.5631" name="cgroup.subtree_control" dev="cgroup2" ino=152 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 437.988427][T15823] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.997403][T15823] device bridge_slave_1 entered promiscuous mode [ 438.102365][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 438.110087][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 438.118312][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 438.256231][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 438.265014][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 438.515170][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 438.523521][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 438.557663][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 438.576876][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 438.588044][ T651] bridge0: port 1(bridge_slave_0) entered blocking state [ 438.595227][ T651] bridge0: port 1(bridge_slave_0) entered forwarding state [ 438.623242][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 438.648921][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 438.657365][ T651] bridge0: port 2(bridge_slave_1) entered blocking state [ 438.664465][ T651] bridge0: port 2(bridge_slave_1) entered forwarding state [ 438.687933][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 438.697182][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 438.705771][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 438.714748][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 438.725138][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 438.751634][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 438.759978][T15892] FAULT_INJECTION: forcing a failure. [ 438.759978][T15892] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 438.779733][T15892] CPU: 1 PID: 15892 Comm: syz.0.5639 Not tainted syzkaller #0 [ 438.786641][T15823] device veth0_vlan entered promiscuous mode [ 438.787332][T15892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 438.803378][T15892] Call Trace: [ 438.806674][T15892] [ 438.809623][T15892] __dump_stack+0x21/0x30 [ 438.813969][T15892] dump_stack_lvl+0xee/0x150 [ 438.818655][T15892] ? show_regs_print_info+0x20/0x20 [ 438.823875][T15892] ? ioctl_has_perm+0x394/0x4d0 [ 438.828737][T15892] dump_stack+0x15/0x20 [ 438.832983][T15892] should_fail+0x3c1/0x510 [ 438.837410][T15892] should_fail_usercopy+0x1a/0x20 [ 438.842443][T15892] _copy_from_user+0x20/0xd0 [ 438.847077][T15892] __tun_chr_ioctl+0x1ed/0x1eb0 [ 438.851942][T15892] ? tun_flow_create+0x320/0x320 [ 438.856973][T15892] ? mutex_unlock+0x89/0x220 [ 438.861582][T15892] ? __fget_files+0x2c4/0x320 [ 438.866268][T15892] tun_chr_ioctl+0x2a/0x40 [ 438.870687][T15892] ? tun_chr_poll+0x720/0x720 [ 438.875379][T15892] __se_sys_ioctl+0x121/0x1a0 [ 438.880065][T15892] __x64_sys_ioctl+0x7b/0x90 [ 438.884664][T15892] x64_sys_call+0x2f/0x9a0 [ 438.889090][T15892] do_syscall_64+0x4c/0xa0 [ 438.893508][T15892] ? clear_bhb_loop+0x50/0xa0 [ 438.898190][T15892] ? clear_bhb_loop+0x50/0xa0 [ 438.902872][T15892] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 438.908950][T15892] RIP: 0033:0x7fb68cb7abe9 [ 438.913376][T15892] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 438.933077][T15892] RSP: 002b:00007fb68b5e3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 438.941514][T15892] RAX: ffffffffffffffda RBX: 00007fb68cdb1fa0 RCX: 00007fb68cb7abe9 [ 438.949493][T15892] RDX: 0000200000000100 RSI: 00000000400454ca RDI: 0000000000000007 [ 438.957469][T15892] RBP: 00007fb68b5e3090 R08: 0000000000000000 R09: 0000000000000000 [ 438.965444][T15892] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 438.973434][T15892] R13: 00007fb68cdb2038 R14: 00007fb68cdb1fa0 R15: 00007ffcfa34e848 [ 438.981418][T15892] [ 438.995859][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 439.004282][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 439.012275][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 439.080172][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 439.108392][T15823] device veth1_macvtap entered promiscuous mode [ 439.246268][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 439.265820][T15905] FAULT_INJECTION: forcing a failure. [ 439.265820][T15905] name failslab, interval 1, probability 0, space 0, times 0 [ 439.279434][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 439.319135][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 439.352315][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 439.360669][T15905] CPU: 0 PID: 15905 Comm: syz.2.5643 Not tainted syzkaller #0 [ 439.368173][T15905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 439.378252][T15905] Call Trace: [ 439.381623][T15905] [ 439.384564][T15905] __dump_stack+0x21/0x30 [ 439.388906][T15905] dump_stack_lvl+0xee/0x150 [ 439.393513][T15905] ? show_regs_print_info+0x20/0x20 [ 439.398717][T15905] ? __kasan_kmalloc+0xec/0x110 [ 439.403596][T15905] dump_stack+0x15/0x20 [ 439.407768][T15905] should_fail+0x3c1/0x510 [ 439.412647][T15905] __should_failslab+0xa4/0xe0 [ 439.417420][T15905] should_failslab+0x9/0x20 [ 439.421948][T15905] slab_pre_alloc_hook+0x3b/0xe0 [ 439.426974][T15905] ? getname_kernel+0x59/0x2e0 [ 439.431759][T15905] kmem_cache_alloc+0x44/0x260 [ 439.436536][T15905] getname_kernel+0x59/0x2e0 [ 439.441123][T15905] kern_path+0x24/0x1b0 [ 439.445281][T15905] create_local_trace_uprobe+0xa2/0x6f0 [ 439.450830][T15905] ? bpf_get_uprobe_info+0x4e0/0x4e0 [ 439.456122][T15905] ? _copy_from_user+0x95/0xd0 [ 439.461010][T15905] perf_uprobe_init+0xf9/0x1a0 [ 439.465794][T15905] perf_uprobe_event_init+0xe6/0x180 [ 439.471084][T15905] perf_try_init_event+0x14a/0x430 [ 439.476198][T15905] perf_event_alloc+0xedd/0x1a20 [ 439.481145][T15905] __se_sys_perf_event_open+0x5ae/0x1b80 [ 439.486814][T15905] ? __kasan_check_write+0x14/0x20 [ 439.491924][T15905] ? mutex_unlock+0x89/0x220 [ 439.496514][T15905] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 439.502164][T15905] ? __ia32_sys_read+0x90/0x90 [ 439.507013][T15905] __x64_sys_perf_event_open+0xbf/0xd0 [ 439.512470][T15905] x64_sys_call+0x50d/0x9a0 [ 439.516974][T15905] do_syscall_64+0x4c/0xa0 [ 439.521395][T15905] ? clear_bhb_loop+0x50/0xa0 [ 439.526084][T15905] ? clear_bhb_loop+0x50/0xa0 [ 439.530765][T15905] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 439.536672][T15905] RIP: 0033:0x7f5280821be9 [ 439.541090][T15905] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 439.560817][T15905] RSP: 002b:00007f527f28a038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 439.569263][T15905] RAX: ffffffffffffffda RBX: 00007f5280a58fa0 RCX: 00007f5280821be9 [ 439.577340][T15905] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000200000000280 [ 439.585321][T15905] RBP: 00007f527f28a090 R08: 000000000000000a R09: 0000000000000000 [ 439.593389][T15905] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 439.601393][T15905] R13: 00007f5280a59038 R14: 00007f5280a58fa0 R15: 00007ffe397982a8 [ 439.609377][T15905] [ 439.741884][T15894] bridge0: port 1(bridge_slave_0) entered blocking state [ 439.769053][T15894] bridge0: port 1(bridge_slave_0) entered disabled state [ 439.776710][T15894] device bridge_slave_0 entered promiscuous mode [ 439.814059][T15894] bridge0: port 2(bridge_slave_1) entered blocking state [ 439.840694][T15894] bridge0: port 2(bridge_slave_1) entered disabled state [ 439.848307][T15894] device bridge_slave_1 entered promiscuous mode Connection to 10.128.10.36 closed by remote host. [ 440.540103][ T10] device veth1_macvtap left promiscuous mode [ 440.546132][ T10] device veth0_vlan left promiscuous mode [ 441.682005][ T10] GPL: port 1(erspan0) entered disabled state [ 441.691990][ T10] device erspan0 left promiscuous mode [ 441.697536][ T10] GPL: port 1(erspan0) entered disabled state [ 442.059550][ T10] device bridge_slave_1 left promiscuous mode [ 442.065687][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.073365][ T10] device bridge_slave_0 left promiscuous mode [ 442.079654][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.087500][ T10] device bridge_slave_1 left promiscuous mode [ 442.093785][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.101254][ T10] device bridge_slave_0 left promiscuous mode [ 442.107412][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.115736][ T10] device bridge_slave_1 left promiscuous mode [ 442.121908][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.129493][ T10] device bridge_slave_0 left promiscuous mode [ 442.135630][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.143843][ T10] device veth0 left promiscuous mode [ 442.149257][ T10] bridge0: port 3(veth0) entered disabled state [ 442.155815][ T10] device bridge_slave_1 left promiscuous mode [ 442.162008][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.169550][ T10] device bridge_slave_0 left promiscuous mode [ 442.175824][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.183896][ T10] device bridge_slave_1 left promiscuous mode [ 442.190192][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.197838][ T10] device bridge_slave_0 left promiscuous mode [ 442.204051][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.212695][ T10] device veth1_macvtap left promiscuous mode [ 442.218778][ T10] device veth0_vlan left promiscuous mode [ 442.224729][ T10] device veth1_macvtap left promiscuous mode [ 442.230974][ T10] device veth1_macvtap left promiscuous mode [ 442.237144][ T10] device veth1_macvtap left promiscuous mode [ 442.243298][ T10] device veth0_vlan left promiscuous mode