last executing test programs: 22.750179721s ago: executing program 4 (id=2306): perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000030000000800000001"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000380), &(0x7f00000003c0)='%-010d \x00'}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) 18.64864295s ago: executing program 4 (id=2306): perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000030000000800000001"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000380), &(0x7f00000003c0)='%-010d \x00'}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) 13.149142336s ago: executing program 4 (id=2306): perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000030000000800000001"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000380), &(0x7f00000003c0)='%-010d \x00'}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) 9.440234198s ago: executing program 4 (id=2306): perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000030000000800000001"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000380), &(0x7f00000003c0)='%-010d \x00'}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) 6.259812949s ago: executing program 2 (id=2814): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x17, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'wg2\x00', @broadcast}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000008040000cd00000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="fdf6f4177259f511931b99", @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r7, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r9}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r5) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x8, 0x0, 0x0}}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB="00000000000076701935a0f992fb412f33465580ea1a00"/36, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r11, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 5.908039136s ago: executing program 2 (id=2819): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) socketpair$unix(0x1, 0x1, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x1000000}, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, 0x0, &(0x7f0000000700)}, 0x20) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x3) r3 = perf_event_open(&(0x7f0000001240)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000140)=ANY=[]) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xa, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x7d}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) close(r1) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[], &(0x7f0000000080)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xe160, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={r1, r0, 0x0, r1}, 0x10) 4.6301096s ago: executing program 4 (id=2306): perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000030000000800000001"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000380), &(0x7f00000003c0)='%-010d \x00'}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) 2.6139122s ago: executing program 1 (id=2833): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a500850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00'}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 2.61335424s ago: executing program 2 (id=2834): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0xfffffffffffffde8, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000280)={'wg2\x00'}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kmem_cache_free\x00', r8}, 0x10) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r5, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd6372ce22ff"], 0x3e) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 2.61286166s ago: executing program 3 (id=2835): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000040)=@abs={0x1, 0x2e, 0x4e22}, 0x6e, 0x0}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 2.57281518s ago: executing program 1 (id=2836): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000040)=@abs={0x1, 0x2e, 0x4e22}, 0x6e, 0x0}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 2.155631548s ago: executing program 0 (id=2837): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xfd, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fd, 0x22a0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x4, 0x4, 0x4, 0x8001, 0x808, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) 2.155095058s ago: executing program 1 (id=2838): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000280)="fb6bba88", 0x4}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) 2.141409018s ago: executing program 3 (id=2839): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18020000ffffffff00000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004000000850000007d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_UPDATE_BATCH(0x13, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, 0x38) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x8108, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0x400c78, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = gettid() perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x4, 0x9, 0x5, 0x5, 0x0, 0x1, 0x10200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xffffffffffff6681, 0x9}, 0x30, 0x7, 0xfffff001, 0x3, 0x6, 0x1, 0x8, 0x0, 0x1, 0x0, 0x2}, r4, 0x8, 0xffffffffffffffff, 0x1) setsockopt$sock_attach_bpf(r3, 0x1, 0x42, &(0x7f0000000040), 0x3b) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000001}, 0x0, 0x0, 0x0, 0x0, 0x230, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000f6ff000000001c900000101000000000009500000700000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffba}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="13000000100000000200"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="170000000000000000b600"/29], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r5, 0x4004743d, 0x110e22fff6) write$cgroup_type(r5, &(0x7f0000000280), 0x9) r6 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000600000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001010000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r7}, 0x10) 2.06985703s ago: executing program 1 (id=2840): bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0, r0}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000533bf75332b1065d78faef0cf903b59ad20000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='mm_page_alloc\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xbf, &(0x7f00000008c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x59, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x6, 0x14, &(0x7f0000000680)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x93}, {}, {}, [@cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffd}, @ldst={0x2, 0x1, 0x2, 0x3, 0x0, 0x4, 0x10}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffa}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000300)='GPL\x00', 0x4, 0x56, &(0x7f0000000780)=""/86, 0x40f00, 0x20, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x2, 0x9, 0x7fff, 0x5}, 0x10, r8, r1, 0x3, &(0x7f0000000c40)=[r4], &(0x7f0000000c80)=[{0x3, 0x3, 0x3, 0xa}, {0x5, 0x5, 0x6, 0x7}, {0x1, 0x3, 0x5, 0x5}], 0x10, 0x1ff}, 0x94) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110e22fff6) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000000180)=@abs={0x1, 0x5c, 0x1}, 0x6e, 0x0}, 0x20000) ioctl$TUNGETVNETLE(r6, 0x40047451, &(0x7f0000000180)) syz_clone(0x40001000, &(0x7f00000004c0)="1dcd255f7d74d624082c8e60bfa500ccf245b460a9bff4b5b9f33b503af71ab837cd35d7a04c6b4b70578754c524b77c52feb8c421b7709be30cb772e579d8aa6cb190d25aa1c5f3ea16714b403a50590ea7c6018af42bee3d05e8107b3a8ee451065a73185d305e74a1b096d34d066371efbc807894ded511b5f4a34a7579e7600e99509ed79ac3b5a65ce31993583a0c8e260be98b10bbe63a5353312335247959221fe8513b07dfc5212e", 0xac, &(0x7f00000002c0), &(0x7f00000003c0), &(0x7f0000000580)="6120b8eefc46853747d0eaf7cd1d261521deacd8bb4851f6a4f7ec2e26bd7861e42d0937bec1ff7ee61d87d3c2ef6dd84b5b48345a7ca9b41ac0efa9fca445f91b52dc4ced82d9783a5918d97b99614012ce7cde936cfa9dd80aa8e16adb3298a65f1d7c699d7cd6ee7a1cfaed14e2ced5563347c3e6f51dbc1144fa0d29e8c119a2ddd625064d6754e9b922f4fedd97636798d902845148bf84daa9da5c3e9e234123e3a3efefe0a3684c6a7b75a8b9b08801a111c4b5d5200298abfe06f117cac48f340e1c8c69e011139c1e96b12a25b2c08c8db52eb89da13533808fd4aed4861f945d7b08575096") bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 1.937084832s ago: executing program 2 (id=2841): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000005c0)='F', 0x1}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=""/251, 0x2}], 0x1}, 0x40000100) sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001300)="d3", 0x1}], 0x1}, 0x0) 1.832483745s ago: executing program 3 (id=2842): perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000030000000800000001"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r2}, &(0x7f0000000380), &(0x7f00000003c0)='%-010d \x00'}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) 1.818468335s ago: executing program 2 (id=2843): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0xfffffffffffffde8, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000280)={'wg2\x00'}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, 0x0, 0x2, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kmem_cache_free\x00', r8}, 0x10) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r5, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd6372ce22ff"], 0x3e) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 1.697112757s ago: executing program 3 (id=2844): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0xe, 0x0, &(0x7f0000000140)='syzkaller\x00'}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="8d45007fed044dbdf2f7ba00", @ANYRES32, @ANYBLOB="08f7cc0000000000950000000000000045"], 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x8a, 0x3, 0x0, 0x3, 0x0, 0x10000000000, 0x8808, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={0x0, 0x6}, 0x4108, 0x3, 0x0, 0x6, 0x7, 0xffffffff, 0x802, 0x0, 0xc63}, 0x0, 0xe, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') close(r0) 1.674729708s ago: executing program 0 (id=2845): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a500850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb70200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000000180)=@abs={0x0, 0x5c, 0x1}, 0x6e, 0x0}, 0x20000) ioctl$TUNGETVNETLE(r1, 0x40047451, &(0x7f0000000180)) 1.633635468s ago: executing program 3 (id=2846): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000800000004000000bb7f1a004d00feff000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x4c) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$cgroup_type(r3, &(0x7f0000000100), 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x400}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000500)=[{0x0}], 0x1, &(0x7f0000000b80)=ANY=[@ANYRES32, @ANYBLOB="ffffffff7f0000010000000011000000000000000000000001000000000000000000000014000000000000000000000002000000ff0100000000000014000000000000000000000000000000ed00000000000000640000000000000000000000070000004454a8c3e000000100000f5c6000000100000007ac1e000100000fffac1e010100000000e000000200000772ffffffff0000000100000000000000b7ac1e00010ae08f50e000000200000005ac1e0101000000000000000011000000000000000000000001"], 0x118}, 0x20000004) bpf$PROG_LOAD(0x5, 0x0, 0xffffffd9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0e0000000400000004000000090000000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000009c0), 0x6}, 0x0, 0x0, 0x7, 0x0, 0x58c5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x11000000, &(0x7f0000000180)="5ca44104bacbd4ed9a63193f03d96fcefefd4c2c0d9349", 0x17, &(0x7f00000001c0), &(0x7f0000000280), &(0x7f0000000300)="1f81eef4ee181e80fb2a2d9e44a2ea6c3bb91cc12e751c9611191b10c80c12a93708fa0f91eafae5c809118816a8710c24cd41ce5529bb42ae7cb04953f3b41bc1da72c434430e0e8b310ccad3ce8da4e43133be39d1073241d1") 1.52670753s ago: executing program 0 (id=2847): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000040)=@abs={0x1, 0x2e, 0x4e22}, 0x6e, 0x0}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 1.455576402s ago: executing program 2 (id=2848): socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x16, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x50) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r4, 0x5}, 0x10) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000400000000000000000001851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000016608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x22) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0xaac, 0xffffffff, 0x2, 0x1, r5, 0x4, '\x00', r6, 0xffffffffffffffff, 0x1, 0x5, 0x5, 0x9}, 0x50) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x480, 0x4, @perf_config_ext={0xfd, 0x8}, 0x0, 0x5}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_ext={0x1c, 0x5, &(0x7f0000000600)=@raw=[@map_val={0x18, 0x5, 0x2, 0x0, r7}, @ldst={0x0, 0x1, 0x1, 0xa, 0x6, 0xfffffffffffffffc, 0x1}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffb}], &(0x7f0000000640)='syzkaller\x00', 0x9, 0xc8, &(0x7f0000000780)=""/200, 0x41000, 0xe6d53920166d4952, '\x00', r6, 0x0, r5, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x44db, 0xffffffffffffffff, 0x4, 0x0, &(0x7f0000000680)=[{0x4, 0x4, 0x2}, {0x1, 0x5, 0x9, 0x5}, {0x3, 0x5, 0x2, 0x9}, {0x3, 0x1, 0x2, 0x9}], 0x10, 0xd95b, @value=r2}, 0x94) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x0, 0xf9, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, @perf_config_ext={0x0, 0x10001}, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xf) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)}, 0x3) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x20, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r11}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r9}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.195270127s ago: executing program 1 (id=2849): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000040)=@abs={0x1, 0x2e, 0x4e22}, 0x6e, 0x0}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 1.126144018s ago: executing program 0 (id=2850): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="05000000e4ef1f00810000007f00000001"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x2, 0x4, 0x4, 0x8, 0x0, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0d00000023000000040000000200000040000000", @ANYRES32=r4], 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x2020, 0x0, 0x0, 0x5, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x4, 0x4, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x3e, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007"], 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0x3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYRESDEC], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYRES8=r6, @ANYRES32=r6, @ANYRESHEX=r1], &(0x7f0000000240)='GPL\x00', 0xeb25, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r7}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000007c0)={r5, &(0x7f0000000680), 0x0}, 0x20) recvmsg(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)=@nfc, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000540)=""/160, 0xa0}, {&(0x7f0000000880)=""/143, 0x8f}, {&(0x7f0000000140)=""/34, 0x22}, {&(0x7f0000000940)=""/177, 0xb1}, {&(0x7f0000000a00)=""/194, 0xc2}, {&(0x7f0000000600)=""/109, 0x6d}, {&(0x7f0000000b00)=""/109, 0x6d}, {&(0x7f0000000740)=""/59, 0x3b}, {&(0x7f0000000b80)=""/249, 0xf9}, {&(0x7f0000000c80)=""/240, 0xf0}], 0xa}, 0x2000) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080200000100000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r8, &(0x7f0000000340)="093ca70d1afdec598b1fda19f8f5ef7352ab3164e3549f4d8a00541b4f3c8d90bf2b08df2067afd9db097111302d0ee9e0ab22a5ef26869b13dfc7f92ebd39b42d7b5a8b7bb322c7ff34f9d1afee23e0678bbbe57b57496dcb61ac751bd2c765ec4d153c0a683bcb28206f50ad46cbed4255043369a721396375bc5f1a7c8c1b84ce3f6d3d0a7e031c799f205f07624d48e9b6050cf63a5435807aa297c775faeef6e7a2b1fd718c2f63a6e12232f539c8028504fb3cc0fe8b3aee824c0f92901faca3", &(0x7f0000000200)=""/90, 0x4}, 0x20) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x15}, 0x0, 0xb, 0x6, 0x9, 0x0, 0x1, 0xfffc, 0x0, 0x8}, 0x0, 0xffffffffdfffffff, r3, 0xf) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 899.378423ms ago: executing program 1 (id=2851): openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000fe, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2d, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r3, 0x40047451, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r0}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 692.201617ms ago: executing program 0 (id=2852): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000005c0)='F', 0x1}], 0x1}, 0x0) recvmsg(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=""/251, 0x2}], 0x1}, 0x40000100) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001300)="d3", 0x1}], 0x1}, 0x0) 657.723207ms ago: executing program 0 (id=2853): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100), 0x1}, 0x1f00) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = gettid() r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001280)={0x18, 0x3, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000440)='GPL\x00'}, 0x80) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r5, r7, 0x0, 0x0, 0x0}, 0x30) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r3}, &(0x7f0000000800), &(0x7f0000000840)=r4}, 0x20) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r8}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 581.134979ms ago: executing program 3 (id=2854): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x31) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3, 0xffffffffffffffff}, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa4000000", @ANYRES16=r2, @ANYRES8=r4], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) gettid() syz_clone(0xc6003011, 0x0, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 4 (id=2306): perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000030000000800000001"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000380), &(0x7f00000003c0)='%-010d \x00'}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) kernel console output (not intermixed with test programs): 65.096611][ T4717] RBP: 00007f740ce93090 R08: 0000000000000000 R09: 0000000000000000 [ 165.104559][ T4717] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 165.112507][ T4717] R13: 00007f740e662038 R14: 00007f740e661fa0 R15: 00007ffe322c3df8 [ 165.120459][ T4717] [ 165.177919][ T4727] device pim6reg1 entered promiscuous mode [ 165.214793][ T4729] device wg2 entered promiscuous mode [ 165.454487][ T4746] device pim6reg1 entered promiscuous mode [ 165.936575][ T4776] device wg2 left promiscuous mode [ 166.038201][ T4776] device wg2 entered promiscuous mode [ 166.431490][ T4796] device pim6reg1 entered promiscuous mode [ 166.709072][ T4828] FAULT_INJECTION: forcing a failure. [ 166.709072][ T4828] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 166.772736][ T4828] CPU: 0 PID: 4828 Comm: syz.2.1557 Not tainted syzkaller #0 [ 166.780171][ T4828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 166.790243][ T4828] Call Trace: [ 166.793535][ T4828] [ 166.796471][ T4828] __dump_stack+0x21/0x30 [ 166.800812][ T4828] dump_stack_lvl+0xee/0x150 [ 166.805413][ T4828] ? show_regs_print_info+0x20/0x20 [ 166.810624][ T4828] dump_stack+0x15/0x20 [ 166.814788][ T4828] should_fail+0x3c1/0x510 [ 166.819301][ T4828] should_fail_alloc_page+0x55/0x80 [ 166.824508][ T4828] prepare_alloc_pages+0x156/0x600 [ 166.829630][ T4828] ? __alloc_pages_bulk+0xab0/0xab0 [ 166.834835][ T4828] ? flush_tlb_one_user+0x50/0x50 [ 166.839971][ T4828] ? cgroup_rstat_updated+0xf5/0x370 [ 166.845268][ T4828] __alloc_pages+0x10a/0x440 [ 166.849872][ T4828] ? prep_new_page+0x110/0x110 [ 166.854792][ T4828] wp_page_copy+0x1c9/0x18f0 [ 166.859389][ T4828] ? arch_stack_walk+0xee/0x140 [ 166.864257][ T4828] ? insert_page_into_pte_locked+0x310/0x310 [ 166.870336][ T4828] ? _raw_spin_lock+0x8e/0xe0 [ 166.875074][ T4828] ? _raw_spin_trylock_bh+0x130/0x130 [ 166.880452][ T4828] ? vm_normal_page+0x1dd/0x1f0 [ 166.885397][ T4828] do_wp_page+0x731/0xc90 [ 166.889735][ T4828] ? kvmalloc_node+0x206/0x300 [ 166.894508][ T4828] handle_pte_fault+0x73c/0x2680 [ 166.899468][ T4828] ? sched_clock_cpu+0x18/0x3c0 [ 166.904327][ T4828] ? fault_around_bytes_set+0xc0/0xc0 [ 166.909800][ T4828] ? __set_page_owner+0x2c2/0x2e0 [ 166.914837][ T4828] do_handle_mm_fault+0x1a6d/0x1d50 [ 166.920080][ T4828] ? numa_migrate_prep+0xd0/0xd0 [ 166.925074][ T4828] ? __find_vma+0x30/0x150 [ 166.929502][ T4828] do_user_addr_fault+0x841/0x1180 [ 166.934715][ T4828] ? do_kern_addr_fault+0x80/0x80 [ 166.939841][ T4828] ? preempt_schedule+0xa7/0xb0 [ 166.944704][ T4828] ? schedule_preempt_disabled+0x20/0x20 [ 166.950347][ T4828] ? asm_sysvec_reschedule_ipi+0x1b/0x20 [ 166.955995][ T4828] exc_page_fault+0x51/0xb0 [ 166.960510][ T4828] asm_exc_page_fault+0x27/0x30 [ 166.965384][ T4828] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 166.972072][ T4828] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 89 d1 83 f8 [ 166.991785][ T4828] RSP: 0018:ffffc90000c47ce0 EFLAGS: 00050206 [ 166.997958][ T4828] RAX: ffffffff824bf901 RBX: 000000000000b161 RCX: 00000000000078e1 [ 167.006026][ T4828] RDX: 000000000000b161 RSI: ffff8881112a3880 RDI: 0000200000005000 [ 167.014197][ T4828] RBP: ffffc90000c47d10 R08: 0000000000000001 R09: 0000000000000000 [ 167.022181][ T4828] R10: ffffed102225562c R11: 0000000000001628 R12: 00007ffffffff000 [ 167.030354][ T4828] R13: 000020000000c8e1 R14: ffff8881112a0000 R15: 0000200000001780 [ 167.039031][ T4828] ? _copy_from_user+0x51/0xd0 [ 167.043815][ T4828] ? _copy_to_user+0x78/0x90 [ 167.048504][ T4828] map_lookup_and_delete_elem+0x724/0x8c0 [ 167.054401][ T4828] __sys_bpf+0x4d5/0x730 [ 167.058998][ T4828] ? bpf_link_show_fdinfo+0x310/0x310 [ 167.064382][ T4828] ? debug_smp_processor_id+0x17/0x20 [ 167.069873][ T4828] __x64_sys_bpf+0x7c/0x90 [ 167.074400][ T4828] x64_sys_call+0x4b9/0x9a0 [ 167.078914][ T4828] do_syscall_64+0x4c/0xa0 [ 167.083346][ T4828] ? clear_bhb_loop+0x50/0xa0 [ 167.088031][ T4828] ? clear_bhb_loop+0x50/0xa0 [ 167.092723][ T4828] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 167.098625][ T4828] RIP: 0033:0x7f57dfb27be9 [ 167.103109][ T4828] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 167.122913][ T4828] RSP: 002b:00007f57de590038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 167.131350][ T4828] RAX: ffffffffffffffda RBX: 00007f57dfd5efa0 RCX: 00007f57dfb27be9 [ 167.139342][ T4828] RDX: 0000000000000020 RSI: 0000200000000200 RDI: 0000000000000015 [ 167.147321][ T4828] RBP: 00007f57de590090 R08: 0000000000000000 R09: 0000000000000000 [ 167.155303][ T4828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 167.163281][ T4828] R13: 00007f57dfd5f038 R14: 00007f57dfd5efa0 R15: 00007ffe0cfdeea8 [ 167.171357][ T4828] [ 167.468250][ T4841] device pim6reg1 entered promiscuous mode [ 168.186976][ T4896] device sit0 entered promiscuous mode [ 169.416043][ T4950] syz.0.1604[4950] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.696243][ T4948] device wg2 left promiscuous mode [ 170.035923][ T4959] device pim6reg1 entered promiscuous mode [ 170.522013][ T4973] device pim6reg1 entered promiscuous mode [ 170.842770][ T4979] FAULT_INJECTION: forcing a failure. [ 170.842770][ T4979] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 170.887240][ T4981] device pim6reg1 entered promiscuous mode [ 170.896492][ T4979] CPU: 0 PID: 4979 Comm: syz.2.1613 Not tainted syzkaller #0 [ 170.904007][ T4979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 170.914125][ T4979] Call Trace: [ 170.917506][ T4979] [ 170.920445][ T4979] __dump_stack+0x21/0x30 [ 170.924878][ T4979] dump_stack_lvl+0xee/0x150 [ 170.929565][ T4979] ? show_regs_print_info+0x20/0x20 [ 170.934788][ T4979] ? dump_stack+0x9/0x20 [ 170.939047][ T4979] dump_stack+0x15/0x20 [ 170.943223][ T4979] should_fail+0x3c1/0x510 [ 170.947658][ T4979] should_fail_usercopy+0x1a/0x20 [ 170.952700][ T4979] _copy_to_user+0x20/0x90 [ 170.957134][ T4979] bpf_test_finish+0x20c/0x3b0 [ 170.961911][ T4979] ? convert_skb_to___skb+0x360/0x360 [ 170.967381][ T4979] ? xdp_convert_buff_to_md+0x15c/0x1e0 [ 170.973026][ T4979] bpf_prog_test_run_xdp+0x62d/0x910 [ 170.978337][ T4979] ? dev_put+0x80/0x80 [ 170.982439][ T4979] ? __fget_files+0x2c4/0x320 [ 170.987225][ T4979] ? fput_many+0x15a/0x1a0 [ 170.991654][ T4979] ? dev_put+0x80/0x80 [ 170.995746][ T4979] bpf_prog_test_run+0x3d5/0x620 [ 171.000696][ T4979] ? bpf_prog_query+0x230/0x230 [ 171.005552][ T4979] ? selinux_bpf+0xce/0xf0 [ 171.009980][ T4979] ? security_bpf+0x82/0xa0 [ 171.014493][ T4979] __sys_bpf+0x52c/0x730 [ 171.018831][ T4979] ? bpf_link_show_fdinfo+0x310/0x310 [ 171.024309][ T4979] __x64_sys_bpf+0x7c/0x90 [ 171.028918][ T4979] x64_sys_call+0x4b9/0x9a0 [ 171.033547][ T4979] do_syscall_64+0x4c/0xa0 [ 171.038066][ T4979] ? clear_bhb_loop+0x50/0xa0 [ 171.042770][ T4979] ? clear_bhb_loop+0x50/0xa0 [ 171.047464][ T4979] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 171.053370][ T4979] RIP: 0033:0x7f57dfb27be9 [ 171.057796][ T4979] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 171.077855][ T4979] RSP: 002b:00007f57de590038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 171.086394][ T4979] RAX: ffffffffffffffda RBX: 00007f57dfd5efa0 RCX: 00007f57dfb27be9 [ 171.094555][ T4979] RDX: 0000000000000050 RSI: 00002000000000c0 RDI: 000000000000000a [ 171.102559][ T4979] RBP: 00007f57de590090 R08: 0000000000000000 R09: 0000000000000000 [ 171.110718][ T4979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 171.118733][ T4979] R13: 00007f57dfd5f038 R14: 00007f57dfd5efa0 R15: 00007ffe0cfdeea8 [ 171.126870][ T4979] [ 171.246284][ T4990] device sit0 left promiscuous mode [ 171.322075][ T4990] device sit0 entered promiscuous mode [ 171.387923][ T4994] FAULT_INJECTION: forcing a failure. [ 171.387923][ T4994] name failslab, interval 1, probability 0, space 0, times 0 [ 171.402310][ T4994] CPU: 1 PID: 4994 Comm: syz.4.1620 Not tainted syzkaller #0 [ 171.409916][ T4994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 171.420147][ T4994] Call Trace: [ 171.423431][ T4994] [ 171.426363][ T4994] __dump_stack+0x21/0x30 [ 171.430866][ T4994] dump_stack_lvl+0xee/0x150 [ 171.435453][ T4994] ? show_regs_print_info+0x20/0x20 [ 171.440738][ T4994] dump_stack+0x15/0x20 [ 171.444888][ T4994] should_fail+0x3c1/0x510 [ 171.449404][ T4994] __should_failslab+0xa4/0xe0 [ 171.454163][ T4994] should_failslab+0x9/0x20 [ 171.458695][ T4994] slab_pre_alloc_hook+0x3b/0xe0 [ 171.463630][ T4994] __kmalloc+0x6d/0x2c0 [ 171.467810][ T4994] ? kvmalloc_node+0x206/0x300 [ 171.472658][ T4994] kvmalloc_node+0x206/0x300 [ 171.477369][ T4994] ? vm_mmap+0xb0/0xb0 [ 171.481465][ T4994] ? memcpy+0x56/0x70 [ 171.485456][ T4994] rhashtable_init+0x54b/0xa60 [ 171.490220][ T4994] ? rhashtable_init+0x6c4/0xa60 [ 171.495159][ T4994] br_mdb_hash_init+0x55/0x90 [ 171.499832][ T4994] br_dev_init+0x1c1/0x290 [ 171.504590][ T4994] ? br_dev_setup+0x7c0/0x7c0 [ 171.509262][ T4994] register_netdevice+0x38b/0x13a0 [ 171.514376][ T4994] ? kvmalloc_node+0x231/0x300 [ 171.519137][ T4994] ? netif_stacked_transfer_operstate+0x220/0x220 [ 171.525646][ T4994] ? xdp_rxq_info_reg+0xf1/0x320 [ 171.530581][ T4994] ? alloc_netdev_mqs+0x9b8/0xc90 [ 171.535602][ T4994] br_add_bridge+0xa2/0xf0 [ 171.540019][ T4994] br_ioctl_stub+0x345/0x7a0 [ 171.544605][ T4994] ? vfs_write+0xc17/0xf70 [ 171.549111][ T4994] ? br_dev_siocdevprivate+0x1320/0x1320 [ 171.554748][ T4994] ? __kasan_check_write+0x14/0x20 [ 171.559855][ T4994] ? mutex_lock+0x95/0x1a0 [ 171.564269][ T4994] ? wait_for_completion_killable_timeout+0x10/0x10 [ 171.571199][ T4994] ? selinux_file_ioctl+0x377/0x480 [ 171.576401][ T4994] ? br_dev_siocdevprivate+0x1320/0x1320 [ 171.582250][ T4994] sock_ioctl+0x2e8/0x6b0 [ 171.586584][ T4994] ? sock_poll+0x3d0/0x3d0 [ 171.590994][ T4994] ? __fget_files+0x2c4/0x320 [ 171.595668][ T4994] ? security_file_ioctl+0x84/0xa0 [ 171.600862][ T4994] ? sock_poll+0x3d0/0x3d0 [ 171.605291][ T4994] __se_sys_ioctl+0x121/0x1a0 [ 171.609988][ T4994] __x64_sys_ioctl+0x7b/0x90 [ 171.614661][ T4994] x64_sys_call+0x2f/0x9a0 [ 171.619122][ T4994] do_syscall_64+0x4c/0xa0 [ 171.623546][ T4994] ? clear_bhb_loop+0x50/0xa0 [ 171.628307][ T4994] ? clear_bhb_loop+0x50/0xa0 [ 171.632977][ T4994] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 171.638882][ T4994] RIP: 0033:0x7fd173f5cbe9 [ 171.643299][ T4994] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 171.663281][ T4994] RSP: 002b:00007fd1729c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 171.671703][ T4994] RAX: ffffffffffffffda RBX: 00007fd174193fa0 RCX: 00007fd173f5cbe9 [ 171.679672][ T4994] RDX: 00002000000000c0 RSI: 00000000000089a0 RDI: 0000000000000004 [ 171.687641][ T4994] RBP: 00007fd1729c5090 R08: 0000000000000000 R09: 0000000000000000 [ 171.695608][ T4994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 171.703595][ T4994] R13: 00007fd174194038 R14: 00007fd174193fa0 R15: 00007ffc19e4ecf8 [ 171.711568][ T4994] [ 171.755124][ T5006] syz.1.1623[5006] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.755223][ T5006] syz.1.1623[5006] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.798761][ T5006] FAULT_INJECTION: forcing a failure. [ 171.798761][ T5006] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 171.823406][ T5006] CPU: 1 PID: 5006 Comm: syz.1.1623 Not tainted syzkaller #0 [ 171.830801][ T5006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 171.840860][ T5006] Call Trace: [ 171.844149][ T5006] [ 171.847085][ T5006] __dump_stack+0x21/0x30 [ 171.851429][ T5006] dump_stack_lvl+0xee/0x150 [ 171.856023][ T5006] ? show_regs_print_info+0x20/0x20 [ 171.861234][ T5006] ? exc_page_fault+0x5e/0xb0 [ 171.865917][ T5006] ? asm_exc_page_fault+0x27/0x30 [ 171.870949][ T5006] dump_stack+0x15/0x20 [ 171.875213][ T5006] should_fail+0x3c1/0x510 [ 171.879735][ T5006] should_fail_usercopy+0x1a/0x20 [ 171.884764][ T5006] copy_to_user_nofault+0x9c/0x150 [ 171.889885][ T5006] bpf_probe_write_user+0x98/0xf0 [ 171.895037][ T5006] bpf_prog_c7763bb3f68e5cb3+0x38/0x1f0 [ 171.900703][ T5006] bpf_trace_run7+0xf9/0x210 [ 171.905309][ T5006] ? bpf_trace_run6+0x210/0x210 [ 171.910272][ T5006] ? __kasan_check_write+0x14/0x20 [ 171.915390][ T5006] ? mutex_unlock+0x89/0x220 [ 171.919990][ T5006] __bpf_trace_percpu_alloc_percpu+0x45/0x60 [ 171.925990][ T5006] pcpu_alloc+0x1515/0x1660 [ 171.930508][ T5006] __alloc_percpu_gfp+0x25/0x30 [ 171.935367][ T5006] bpf_map_alloc_percpu+0xc5/0x150 [ 171.940487][ T5006] htab_map_alloc+0x5e2/0x14f0 [ 171.945257][ T5006] ? capable+0x8a/0xe0 [ 171.949336][ T5006] map_create+0x455/0x21b0 [ 171.953764][ T5006] __sys_bpf+0x2cf/0x730 [ 171.958016][ T5006] ? bpf_link_show_fdinfo+0x310/0x310 [ 171.963484][ T5006] ? debug_smp_processor_id+0x17/0x20 [ 171.968952][ T5006] __x64_sys_bpf+0x7c/0x90 [ 171.973391][ T5006] x64_sys_call+0x4b9/0x9a0 [ 171.977910][ T5006] do_syscall_64+0x4c/0xa0 [ 171.982331][ T5006] ? clear_bhb_loop+0x50/0xa0 [ 171.987016][ T5006] ? clear_bhb_loop+0x50/0xa0 [ 171.991702][ T5006] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 171.997609][ T5006] RIP: 0033:0x7fd91030bbe9 [ 172.002075][ T5006] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 172.021702][ T5006] RSP: 002b:00007fd90ed74038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 172.030130][ T5006] RAX: ffffffffffffffda RBX: 00007fd910542fa0 RCX: 00007fd91030bbe9 [ 172.038196][ T5006] RDX: 0000000000000050 RSI: 00002000000003c0 RDI: 0000000000000000 [ 172.046348][ T5006] RBP: 00007fd90ed74090 R08: 0000000000000000 R09: 0000000000000000 [ 172.054417][ T5006] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 172.062399][ T5006] R13: 00007fd910543038 R14: 00007fd910542fa0 R15: 00007ffe3fca56f8 [ 172.070575][ T5006] [ 172.259179][ T5004] device pim6reg1 entered promiscuous mode [ 172.388407][ T5026] device pim6reg1 entered promiscuous mode [ 172.515786][ T5037] FAULT_INJECTION: forcing a failure. [ 172.515786][ T5037] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 172.595842][ T5028] device wg2 entered promiscuous mode [ 172.620856][ T5037] CPU: 0 PID: 5037 Comm: syz.3.1632 Not tainted syzkaller #0 [ 172.628366][ T5037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 172.638520][ T5037] Call Trace: [ 172.641811][ T5037] [ 172.644762][ T5037] __dump_stack+0x21/0x30 [ 172.649114][ T5037] dump_stack_lvl+0xee/0x150 [ 172.653797][ T5037] ? show_regs_print_info+0x20/0x20 [ 172.659004][ T5037] ? __kernel_text_address+0xa0/0x100 [ 172.664389][ T5037] dump_stack+0x15/0x20 [ 172.668577][ T5037] should_fail+0x3c1/0x510 [ 172.673017][ T5037] should_fail_alloc_page+0x55/0x80 [ 172.678323][ T5037] prepare_alloc_pages+0x156/0x600 [ 172.683464][ T5037] ? __alloc_pages_bulk+0xab0/0xab0 [ 172.688683][ T5037] __alloc_pages+0x10a/0x440 [ 172.693290][ T5037] ? prep_new_page+0x110/0x110 [ 172.698062][ T5037] ? __vmalloc_node_range+0x450/0xaf0 [ 172.703442][ T5037] ? kvm_sched_clock_read+0x18/0x40 [ 172.708760][ T5037] ? sched_clock+0x9/0x10 [ 172.713169][ T5037] ? sched_clock_cpu+0x18/0x3c0 [ 172.718033][ T5037] kmalloc_order+0x4c/0x160 [ 172.722555][ T5037] ? page_ext_put+0x1c/0x30 [ 172.727067][ T5037] kmalloc_order_trace+0x18/0xb0 [ 172.732017][ T5037] __kmalloc+0x199/0x2c0 [ 172.736275][ T5037] kvmalloc_node+0x206/0x300 [ 172.740873][ T5037] ? vm_mmap+0xb0/0xb0 [ 172.744957][ T5037] ? ktime_get+0x12f/0x160 [ 172.749377][ T5037] bpf_check+0x147/0xf280 [ 172.753717][ T5037] ? update_stack_state+0x3c7/0x480 [ 172.758927][ T5037] ? 0xffffffffa002a768 [ 172.763259][ T5037] ? is_bpf_text_address+0x177/0x190 [ 172.768558][ T5037] ? bpf_get_btf_vmlinux+0x60/0x60 [ 172.773692][ T5037] ? unwind_get_return_address+0x4d/0x90 [ 172.779339][ T5037] ? stack_trace_save+0xe0/0xe0 [ 172.784202][ T5037] ? arch_stack_walk+0xee/0x140 [ 172.789325][ T5037] ? stack_trace_save+0x98/0xe0 [ 172.794286][ T5037] ? __stack_depot_save+0x34/0x480 [ 172.799413][ T5037] ? __kasan_slab_alloc+0x69/0xf0 [ 172.804449][ T5037] ? _find_next_bit+0x1fa/0x200 [ 172.809309][ T5037] ? __kasan_kmalloc+0xec/0x110 [ 172.814167][ T5037] ? __kasan_kmalloc+0xda/0x110 [ 172.819123][ T5037] ? kmem_cache_alloc_trace+0x119/0x270 [ 172.824780][ T5037] ? selinux_bpf_prog_alloc+0x51/0x140 [ 172.830363][ T5037] ? security_bpf_prog_alloc+0x62/0x90 [ 172.835826][ T5037] ? bpf_prog_load+0x97c/0x1550 [ 172.840804][ T5037] ? __sys_bpf+0x4c3/0x730 [ 172.845249][ T5037] ? __x64_sys_bpf+0x7c/0x90 [ 172.849873][ T5037] ? x64_sys_call+0x4b9/0x9a0 [ 172.854572][ T5037] ? do_syscall_64+0x4c/0xa0 [ 172.859189][ T5037] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 172.865391][ T5037] ? irqentry_exit+0x37/0x40 [ 172.870010][ T5037] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 172.875831][ T5037] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 172.882001][ T5037] ? memset+0x35/0x40 [ 172.885992][ T5037] ? bpf_obj_name_cpy+0x193/0x1e0 [ 172.891026][ T5037] bpf_prog_load+0x1042/0x1550 [ 172.895799][ T5037] ? __kasan_check_write+0x14/0x20 [ 172.900916][ T5037] ? map_freeze+0x360/0x360 [ 172.905434][ T5037] ? selinux_bpf+0xc7/0xf0 [ 172.909958][ T5037] ? security_bpf+0x82/0xa0 [ 172.914474][ T5037] __sys_bpf+0x4c3/0x730 [ 172.918723][ T5037] ? bpf_link_show_fdinfo+0x310/0x310 [ 172.924159][ T5037] ? debug_smp_processor_id+0x17/0x20 [ 172.929624][ T5037] __x64_sys_bpf+0x7c/0x90 [ 172.934046][ T5037] x64_sys_call+0x4b9/0x9a0 [ 172.938556][ T5037] do_syscall_64+0x4c/0xa0 [ 172.943004][ T5037] ? clear_bhb_loop+0x50/0xa0 [ 172.947692][ T5037] ? clear_bhb_loop+0x50/0xa0 [ 172.952548][ T5037] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 172.958449][ T5037] RIP: 0033:0x7f958fd0ebe9 [ 172.962876][ T5037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 172.982782][ T5037] RSP: 002b:00007f958e756038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 172.991729][ T5037] RAX: ffffffffffffffda RBX: 00007f958ff46090 RCX: 00007f958fd0ebe9 [ 173.000016][ T5037] RDX: 0000000000000080 RSI: 0000200000000040 RDI: 0000000000000005 [ 173.008137][ T5037] RBP: 00007f958e756090 R08: 0000000000000000 R09: 0000000000000000 [ 173.016294][ T5037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 173.024350][ T5037] R13: 00007f958ff46128 R14: 00007f958ff46090 R15: 00007ffc51190288 [ 173.032333][ T5037] [ 173.288525][ T5052] device pim6reg1 entered promiscuous mode [ 173.296426][ T5050] device wg2 left promiscuous mode [ 173.309274][ T5037] syz.3.1632 (5037) used greatest stack depth: 21192 bytes left [ 173.776654][ T5075] device pim6reg1 entered promiscuous mode [ 173.921936][ T5069] device wg2 left promiscuous mode [ 173.964207][ T5092] FAULT_INJECTION: forcing a failure. [ 173.964207][ T5092] name failslab, interval 1, probability 0, space 0, times 0 [ 173.978048][ T5092] CPU: 0 PID: 5092 Comm: syz.3.1658 Not tainted syzkaller #0 [ 173.985459][ T5092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 173.995651][ T5092] Call Trace: [ 173.999044][ T5092] [ 174.001971][ T5092] __dump_stack+0x21/0x30 [ 174.006303][ T5092] dump_stack_lvl+0xee/0x150 [ 174.010896][ T5092] ? show_regs_print_info+0x20/0x20 [ 174.016106][ T5092] dump_stack+0x15/0x20 [ 174.020256][ T5092] should_fail+0x3c1/0x510 [ 174.025184][ T5092] __should_failslab+0xa4/0xe0 [ 174.029947][ T5092] should_failslab+0x9/0x20 [ 174.034444][ T5092] slab_pre_alloc_hook+0x3b/0xe0 [ 174.039379][ T5092] __kmalloc+0x6d/0x2c0 [ 174.043540][ T5092] ? kvmalloc_node+0x206/0x300 [ 174.048301][ T5092] kvmalloc_node+0x206/0x300 [ 174.052883][ T5092] ? dev_addr_flush+0x230/0x230 [ 174.057823][ T5092] ? vm_mmap+0xb0/0xb0 [ 174.062060][ T5092] ? memset+0x35/0x40 [ 174.066224][ T5092] alloc_netdev_mqs+0x82a/0xc90 [ 174.071073][ T5092] tun_set_iff+0x535/0xe00 [ 174.075489][ T5092] __tun_chr_ioctl+0x7e8/0x1eb0 [ 174.080344][ T5092] ? tun_flow_create+0x320/0x320 [ 174.085277][ T5092] ? mutex_unlock+0x89/0x220 [ 174.089986][ T5092] ? __fget_files+0x2c4/0x320 [ 174.094670][ T5092] tun_chr_ioctl+0x2a/0x40 [ 174.099181][ T5092] ? tun_chr_poll+0x720/0x720 [ 174.103851][ T5092] __se_sys_ioctl+0x121/0x1a0 [ 174.108526][ T5092] __x64_sys_ioctl+0x7b/0x90 [ 174.113113][ T5092] x64_sys_call+0x2f/0x9a0 [ 174.117524][ T5092] do_syscall_64+0x4c/0xa0 [ 174.121974][ T5092] ? clear_bhb_loop+0x50/0xa0 [ 174.126662][ T5092] ? clear_bhb_loop+0x50/0xa0 [ 174.131422][ T5092] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 174.137324][ T5092] RIP: 0033:0x7f958fd0ebe9 [ 174.141736][ T5092] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 174.161507][ T5092] RSP: 002b:00007f958e777038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 174.170003][ T5092] RAX: ffffffffffffffda RBX: 00007f958ff45fa0 RCX: 00007f958fd0ebe9 [ 174.177972][ T5092] RDX: 0000200000000100 RSI: 00000000400454ca RDI: 0000000000000009 [ 174.185941][ T5092] RBP: 00007f958e777090 R08: 0000000000000000 R09: 0000000000000000 [ 174.193907][ T5092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 174.201878][ T5092] R13: 00007f958ff46038 R14: 00007f958ff45fa0 R15: 00007ffc51190288 [ 174.209856][ T5092] [ 174.248572][ T5104] FAULT_INJECTION: forcing a failure. [ 174.248572][ T5104] name failslab, interval 1, probability 0, space 0, times 0 [ 174.263970][ T5104] CPU: 1 PID: 5104 Comm: syz.1.1662 Not tainted syzkaller #0 [ 174.271478][ T5104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 174.281643][ T5104] Call Trace: [ 174.284943][ T5104] [ 174.287987][ T5104] __dump_stack+0x21/0x30 [ 174.292354][ T5104] dump_stack_lvl+0xee/0x150 [ 174.296982][ T5104] ? show_regs_print_info+0x20/0x20 [ 174.302209][ T5104] ? slab_post_alloc_hook+0x6d/0x2b0 [ 174.307520][ T5104] dump_stack+0x15/0x20 [ 174.311784][ T5104] should_fail+0x3c1/0x510 [ 174.316232][ T5104] __should_failslab+0xa4/0xe0 [ 174.321148][ T5104] should_failslab+0x9/0x20 [ 174.325634][ T5104] slab_pre_alloc_hook+0x3b/0xe0 [ 174.330548][ T5104] ? proc_alloc_inode+0x1d/0xb0 [ 174.335391][ T5104] kmem_cache_alloc+0x44/0x260 [ 174.340218][ T5104] ? proc_invalidate_siblings_dcache+0x3c0/0x3c0 [ 174.346646][ T5104] proc_alloc_inode+0x1d/0xb0 [ 174.351315][ T5104] ? proc_invalidate_siblings_dcache+0x3c0/0x3c0 [ 174.357641][ T5104] new_inode_pseudo+0x62/0x210 [ 174.362481][ T5104] new_inode+0x28/0x1e0 [ 174.366728][ T5104] proc_pid_make_inode+0x27/0x1d0 [ 174.371739][ T5104] proc_ns_dir_lookup+0x573/0x6b0 [ 174.376738][ T5104] ? proc_ns_dir_readdir+0x4c0/0x4c0 [ 174.382164][ T5104] path_openat+0xfcf/0x2f10 [ 174.386864][ T5104] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 174.392732][ T5104] ? do_filp_open+0x3e0/0x3e0 [ 174.397388][ T5104] ? do_filp_open+0x20/0x3e0 [ 174.402145][ T5104] ? memset_erms+0xb/0x10 [ 174.406467][ T5104] do_filp_open+0x1b3/0x3e0 [ 174.411077][ T5104] ? vfs_tmpfile+0x2d0/0x2d0 [ 174.415678][ T5104] ? noop_direct_IO+0x20/0x20 [ 174.420339][ T5104] do_sys_openat2+0x14c/0x7b0 [ 174.424996][ T5104] ? do_sys_open+0xe0/0xe0 [ 174.429410][ T5104] ? kvm_sched_clock_read+0x18/0x40 [ 174.434589][ T5104] ? sched_clock+0x9/0x10 [ 174.438938][ T5104] ? sched_clock_cpu+0x18/0x3c0 [ 174.443780][ T5104] __x64_sys_openat+0x136/0x160 [ 174.448625][ T5104] x64_sys_call+0x219/0x9a0 [ 174.453111][ T5104] do_syscall_64+0x4c/0xa0 [ 174.457503][ T5104] ? clear_bhb_loop+0x50/0xa0 [ 174.462250][ T5104] ? clear_bhb_loop+0x50/0xa0 [ 174.466902][ T5104] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 174.472784][ T5104] RIP: 0033:0x7fd91030a550 [ 174.477224][ T5104] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 174.496818][ T5104] RSP: 002b:00007fd90ed73f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 174.505312][ T5104] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007fd91030a550 [ 174.513262][ T5104] RDX: 0000000000000002 RSI: 00007fd90ed73fa0 RDI: 00000000ffffff9c [ 174.521308][ T5104] RBP: 00007fd90ed73fa0 R08: 0000000000000000 R09: 00007fd90ed73cd5 [ 174.529352][ T5104] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 174.537301][ T5104] R13: 00007fd910543038 R14: 00007fd910542fa0 R15: 00007ffe3fca56f8 [ 174.545476][ T5104] [ 175.045301][ T30] audit: type=1400 audit(1756845287.273:132): avc: denied { create } for pid=5107 comm="syz.1.1663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 175.168771][ T5130] device pim6reg1 entered promiscuous mode [ 175.852062][ T5167] device sit0 left promiscuous mode [ 175.981402][ T5167] device sit0 entered promiscuous mode [ 176.155484][ T30] audit: type=1400 audit(1756845288.383:133): avc: denied { create } for pid=5181 comm="syz.4.1689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 176.544379][ T5206] FAULT_INJECTION: forcing a failure. [ 176.544379][ T5206] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 176.577869][ T5206] CPU: 0 PID: 5206 Comm: syz.1.1696 Not tainted syzkaller #0 [ 176.585314][ T5206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 176.595915][ T5206] Call Trace: [ 176.599211][ T5206] [ 176.602151][ T5206] __dump_stack+0x21/0x30 [ 176.606520][ T5206] dump_stack_lvl+0xee/0x150 [ 176.611138][ T5206] ? show_regs_print_info+0x20/0x20 [ 176.616447][ T5206] ? __kasan_check_write+0x14/0x20 [ 176.621579][ T5206] ? proc_fail_nth_write+0x17a/0x1f0 [ 176.626880][ T5206] ? proc_fail_nth_read+0x210/0x210 [ 176.632369][ T5206] dump_stack+0x15/0x20 [ 176.636536][ T5206] should_fail+0x3c1/0x510 [ 176.640968][ T5206] should_fail_usercopy+0x1a/0x20 [ 176.646098][ T5206] _copy_from_user+0x20/0xd0 [ 176.650721][ T5206] perf_copy_attr+0x154/0x870 [ 176.655424][ T5206] __se_sys_perf_event_open+0xcb/0x1b80 [ 176.661224][ T5206] ? __kasan_check_write+0x14/0x20 [ 176.666449][ T5206] ? mutex_unlock+0x89/0x220 [ 176.671052][ T5206] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 176.676708][ T5206] ? __ia32_sys_read+0x90/0x90 [ 176.681490][ T5206] __x64_sys_perf_event_open+0xbf/0xd0 [ 176.687050][ T5206] x64_sys_call+0x50d/0x9a0 [ 176.691668][ T5206] do_syscall_64+0x4c/0xa0 [ 176.696365][ T5206] ? clear_bhb_loop+0x50/0xa0 [ 176.701154][ T5206] ? clear_bhb_loop+0x50/0xa0 [ 176.705863][ T5206] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 176.711873][ T5206] RIP: 0033:0x7fd91030bbe9 [ 176.716421][ T5206] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 176.737161][ T5206] RSP: 002b:00007fd90ed74038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 176.745611][ T5206] RAX: ffffffffffffffda RBX: 00007fd910542fa0 RCX: 00007fd91030bbe9 [ 176.753612][ T5206] RDX: afffffffffffffff RSI: 0000000000000000 RDI: 0000200000000180 [ 176.761600][ T5206] RBP: 00007fd90ed74090 R08: 0000000000000000 R09: 0000000000000000 [ 176.769587][ T5206] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 176.777668][ T5206] R13: 00007fd910543038 R14: 00007fd910542fa0 R15: 00007ffe3fca56f8 [ 176.785744][ T5206] [ 177.195028][ T5249] device pim6reg1 entered promiscuous mode [ 177.405523][ T5265] device sit0 entered promiscuous mode [ 177.525327][ T5267] device sit0 left promiscuous mode [ 177.543318][ T5271] device sit0 entered promiscuous mode [ 177.820155][ T5257] device sit0 left promiscuous mode [ 177.893446][ T5268] device sit0 entered promiscuous mode [ 177.988190][ T5285] device wg2 left promiscuous mode [ 178.132135][ T5292] device sit0 left promiscuous mode [ 178.144712][ T5287] device wg2 entered promiscuous mode [ 178.201705][ T5292] device sit0 entered promiscuous mode [ 178.432200][ T5297] bond_slave_1: mtu less than device minimum [ 178.526597][ T5308] FAULT_INJECTION: forcing a failure. [ 178.526597][ T5308] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 178.540401][ T5308] CPU: 1 PID: 5308 Comm: syz.4.1734 Not tainted syzkaller #0 [ 178.547893][ T5308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 178.557977][ T5308] Call Trace: [ 178.561279][ T5308] [ 178.564438][ T5308] __dump_stack+0x21/0x30 [ 178.568884][ T5308] dump_stack_lvl+0xee/0x150 [ 178.573582][ T5308] ? show_regs_print_info+0x20/0x20 [ 178.578819][ T5308] dump_stack+0x15/0x20 [ 178.582984][ T5308] should_fail+0x3c1/0x510 [ 178.587425][ T5308] should_fail_usercopy+0x1a/0x20 [ 178.592451][ T5308] _copy_from_user+0x20/0xd0 [ 178.597065][ T5308] bpf_test_init+0x13d/0x1c0 [ 178.601755][ T5308] bpf_prog_test_run_skb+0x193/0x1150 [ 178.607188][ T5308] ? __kasan_check_write+0x14/0x20 [ 178.612306][ T5308] ? fput_many+0x15a/0x1a0 [ 178.616728][ T5308] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 178.622635][ T5308] bpf_prog_test_run+0x3d5/0x620 [ 178.627599][ T5308] ? bpf_prog_query+0x230/0x230 [ 178.632664][ T5308] ? selinux_bpf+0xce/0xf0 [ 178.637096][ T5308] ? security_bpf+0x82/0xa0 [ 178.641617][ T5308] __sys_bpf+0x52c/0x730 [ 178.645865][ T5308] ? bpf_link_show_fdinfo+0x310/0x310 [ 178.651250][ T5308] ? debug_smp_processor_id+0x17/0x20 [ 178.656630][ T5308] __x64_sys_bpf+0x7c/0x90 [ 178.661076][ T5308] x64_sys_call+0x4b9/0x9a0 [ 178.665704][ T5308] do_syscall_64+0x4c/0xa0 [ 178.670167][ T5308] ? clear_bhb_loop+0x50/0xa0 [ 178.674862][ T5308] ? clear_bhb_loop+0x50/0xa0 [ 178.679645][ T5308] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 178.685632][ T5308] RIP: 0033:0x7fd173f5cbe9 [ 178.690140][ T5308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 178.709749][ T5308] RSP: 002b:00007fd1729c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 178.718178][ T5308] RAX: ffffffffffffffda RBX: 00007fd174193fa0 RCX: 00007fd173f5cbe9 [ 178.726246][ T5308] RDX: 0000000000000050 RSI: 00002000000003c0 RDI: 000000000000000a [ 178.734225][ T5308] RBP: 00007fd1729c5090 R08: 0000000000000000 R09: 0000000000000000 [ 178.742295][ T5308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 178.750269][ T5308] R13: 00007fd174194038 R14: 00007fd174193fa0 R15: 00007ffc19e4ecf8 [ 178.758431][ T5308] [ 179.031535][ T5324] device sit0 left promiscuous mode [ 179.081695][ T5324] device sit0 entered promiscuous mode [ 180.634033][ T5366] device pim6reg1 entered promiscuous mode [ 181.203051][ T5381] device wg2 entered promiscuous mode [ 181.353721][ T5400] device sit0 left promiscuous mode [ 181.444175][ T5399] device pim6reg1 entered promiscuous mode [ 181.515470][ T5402] device sit0 entered promiscuous mode [ 181.754218][ T5411] device pim6reg1 entered promiscuous mode [ 182.152695][ T5422] ªªªªªª: renamed from vlan0 [ 182.947592][ T5447] device pim6reg1 entered promiscuous mode [ 183.158429][ T5454] device pim6reg1 entered promiscuous mode [ 183.637279][ T5455] device wg2 left promiscuous mode [ 184.489140][ T5486] device wg2 entered promiscuous mode [ 184.514809][ T5490] device pim6reg1 entered promiscuous mode [ 184.795669][ T5497] device pim6reg1 entered promiscuous mode [ 185.254743][ T5521] device sit0 left promiscuous mode [ 185.329218][ T5521] device sit0 entered promiscuous mode [ 185.432979][ T5530] device pim6reg1 entered promiscuous mode [ 185.452308][ T30] audit: type=1400 audit(1756845297.673:134): avc: denied { create } for pid=5531 comm="syz.1.1807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 185.657506][ T5537] FAULT_INJECTION: forcing a failure. [ 185.657506][ T5537] name failslab, interval 1, probability 0, space 0, times 0 [ 185.672797][ T5537] CPU: 0 PID: 5537 Comm: syz.3.1809 Not tainted syzkaller #0 [ 185.680473][ T5537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 185.690631][ T5537] Call Trace: [ 185.693911][ T5537] [ 185.696841][ T5537] __dump_stack+0x21/0x30 [ 185.701172][ T5537] dump_stack_lvl+0xee/0x150 [ 185.705760][ T5537] ? show_regs_print_info+0x20/0x20 [ 185.711056][ T5537] dump_stack+0x15/0x20 [ 185.715210][ T5537] should_fail+0x3c1/0x510 [ 185.719623][ T5537] __should_failslab+0xa4/0xe0 [ 185.724561][ T5537] should_failslab+0x9/0x20 [ 185.729063][ T5537] slab_pre_alloc_hook+0x3b/0xe0 [ 185.734015][ T5537] __kmalloc+0x6d/0x2c0 [ 185.738169][ T5537] ? bpf_map_area_alloc+0x49/0xe0 [ 185.743279][ T5537] bpf_map_area_alloc+0x49/0xe0 [ 185.748127][ T5537] sock_map_alloc+0x202/0x330 [ 185.752798][ T5537] map_create+0x455/0x21b0 [ 185.757210][ T5537] __sys_bpf+0x2cf/0x730 [ 185.761448][ T5537] ? bpf_link_show_fdinfo+0x310/0x310 [ 185.766816][ T5537] ? debug_smp_processor_id+0x17/0x20 [ 185.772187][ T5537] __x64_sys_bpf+0x7c/0x90 [ 185.776597][ T5537] x64_sys_call+0x4b9/0x9a0 [ 185.781100][ T5537] do_syscall_64+0x4c/0xa0 [ 185.785510][ T5537] ? clear_bhb_loop+0x50/0xa0 [ 185.790188][ T5537] ? clear_bhb_loop+0x50/0xa0 [ 185.794863][ T5537] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 185.800750][ T5537] RIP: 0033:0x7f958fd0ebe9 [ 185.805165][ T5537] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 185.824769][ T5537] RSP: 002b:00007f958e777038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 185.833179][ T5537] RAX: ffffffffffffffda RBX: 00007f958ff45fa0 RCX: 00007f958fd0ebe9 [ 185.841145][ T5537] RDX: 0000000000000048 RSI: 0000200000000200 RDI: 0000000000000000 [ 185.849114][ T5537] RBP: 00007f958e777090 R08: 0000000000000000 R09: 0000000000000000 [ 185.857081][ T5537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 185.865129][ T5537] R13: 00007f958ff46038 R14: 00007f958ff45fa0 R15: 00007ffc51190288 [ 185.873115][ T5537] [ 186.347997][ T30] audit: type=1400 audit(1756845298.573:135): avc: denied { create } for pid=5558 comm="syz.1.1815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 186.421983][ T30] audit: type=1400 audit(1756845298.613:136): avc: denied { create } for pid=5558 comm="syz.1.1815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 186.734865][ T5566] device sit0 left promiscuous mode [ 186.985635][ T5566] device sit0 entered promiscuous mode [ 187.107560][ T5577] device pim6reg1 entered promiscuous mode [ 187.731458][ T5601] device sit0 left promiscuous mode [ 187.756302][ T5603] device sit0 left promiscuous mode [ 187.792008][ T5601] device sit0 entered promiscuous mode [ 187.883901][ T5603] device sit0 entered promiscuous mode [ 189.149138][ T5652] device sit0 left promiscuous mode [ 189.263286][ T5652] device sit0 entered promiscuous mode [ 190.314054][ T5689] FAULT_INJECTION: forcing a failure. [ 190.314054][ T5689] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 190.357431][ T5689] CPU: 0 PID: 5689 Comm: syz.4.1860 Not tainted syzkaller #0 [ 190.364945][ T5689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 190.375017][ T5689] Call Trace: [ 190.378485][ T5689] [ 190.381425][ T5689] __dump_stack+0x21/0x30 [ 190.385860][ T5689] dump_stack_lvl+0xee/0x150 [ 190.390463][ T5689] ? show_regs_print_info+0x20/0x20 [ 190.395673][ T5689] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 190.401613][ T5689] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 190.407780][ T5689] dump_stack+0x15/0x20 [ 190.411948][ T5689] should_fail+0x3c1/0x510 [ 190.416373][ T5689] should_fail_usercopy+0x1a/0x20 [ 190.421598][ T5689] _copy_to_user+0x20/0x90 [ 190.426024][ T5689] bpf_test_finish+0x20c/0x3b0 [ 190.430893][ T5689] ? convert_skb_to___skb+0x360/0x360 [ 190.436433][ T5689] ? xdp_convert_buff_to_md+0x15c/0x1e0 [ 190.442083][ T5689] bpf_prog_test_run_xdp+0x62d/0x910 [ 190.447724][ T5689] ? dev_put+0x80/0x80 [ 190.451900][ T5689] ? __fget_files+0x2c4/0x320 [ 190.456587][ T5689] ? fput_many+0x15a/0x1a0 [ 190.461183][ T5689] ? dev_put+0x80/0x80 [ 190.465259][ T5689] bpf_prog_test_run+0x3d5/0x620 [ 190.470392][ T5689] ? bpf_prog_query+0x230/0x230 [ 190.475282][ T5689] ? selinux_bpf+0xce/0xf0 [ 190.479806][ T5689] ? security_bpf+0x82/0xa0 [ 190.484749][ T5689] __sys_bpf+0x52c/0x730 [ 190.489094][ T5689] ? bpf_link_show_fdinfo+0x310/0x310 [ 190.494474][ T5689] __x64_sys_bpf+0x7c/0x90 [ 190.498892][ T5689] x64_sys_call+0x4b9/0x9a0 [ 190.503414][ T5689] do_syscall_64+0x4c/0xa0 [ 190.507983][ T5689] ? clear_bhb_loop+0x50/0xa0 [ 190.512678][ T5689] ? clear_bhb_loop+0x50/0xa0 [ 190.517364][ T5689] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 190.523258][ T5689] RIP: 0033:0x7fd173f5cbe9 [ 190.527760][ T5689] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 190.547364][ T5689] RSP: 002b:00007fd1729c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 190.555784][ T5689] RAX: ffffffffffffffda RBX: 00007fd174193fa0 RCX: 00007fd173f5cbe9 [ 190.563852][ T5689] RDX: 0000000000000050 RSI: 00002000000000c0 RDI: 000000000000000a [ 190.571821][ T5689] RBP: 00007fd1729c5090 R08: 0000000000000000 R09: 0000000000000000 [ 190.579818][ T5689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 190.588045][ T5689] R13: 00007fd174194038 R14: 00007fd174193fa0 R15: 00007ffc19e4ecf8 [ 190.596017][ T5689] [ 190.693235][ T5699] device pim6reg1 entered promiscuous mode [ 190.858266][ T5712] device sit0 left promiscuous mode [ 190.939395][ T5712] device sit0 entered promiscuous mode [ 191.537411][ T5717] device wg2 left promiscuous mode [ 191.596869][ T5731] device veth1_macvtap left promiscuous mode [ 191.685245][ T5731] bond_slave_1: mtu less than device minimum [ 192.120290][ T5742] device pim6reg1 entered promiscuous mode [ 192.216178][ T5749] device sit0 left promiscuous mode [ 192.255788][ T5753] device sit0 entered promiscuous mode [ 192.372049][ T5760] device sit0 left promiscuous mode [ 192.451334][ T5761] device sit0 entered promiscuous mode [ 193.236277][ T5802] device veth0_vlan left promiscuous mode [ 193.246231][ T5802] device veth0_vlan entered promiscuous mode [ 193.647607][ T5832] device pim6reg1 entered promiscuous mode [ 193.653666][ T5832] FAULT_INJECTION: forcing a failure. [ 193.653666][ T5832] name failslab, interval 1, probability 0, space 0, times 0 [ 193.666351][ T5832] CPU: 0 PID: 5832 Comm: syz.0.1913 Not tainted syzkaller #0 [ 193.673838][ T5832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 193.685776][ T5832] Call Trace: [ 193.689167][ T5832] [ 193.692118][ T5832] __dump_stack+0x21/0x30 [ 193.696496][ T5832] dump_stack_lvl+0xee/0x150 [ 193.701114][ T5832] ? show_regs_print_info+0x20/0x20 [ 193.706483][ T5832] ? pcpu_alloc+0x1126/0x1660 [ 193.711211][ T5832] dump_stack+0x15/0x20 [ 193.715404][ T5832] should_fail+0x3c1/0x510 [ 193.719860][ T5832] __should_failslab+0xa4/0xe0 [ 193.724747][ T5832] should_failslab+0x9/0x20 [ 193.729366][ T5832] slab_pre_alloc_hook+0x3b/0xe0 [ 193.734354][ T5832] ? __alloc_skb+0xe0/0x740 [ 193.739022][ T5832] kmem_cache_alloc+0x44/0x260 [ 193.743911][ T5832] __alloc_skb+0xe0/0x740 [ 193.748357][ T5832] inet6_rt_notify+0x287/0x470 [ 193.753150][ T5832] ? __x64_sys_ioctl+0x7b/0x90 [ 193.758068][ T5832] ? x64_sys_call+0x2f/0x9a0 [ 193.762684][ T5832] ? rt6_nh_dump_exceptions+0x690/0x690 [ 193.768341][ T5832] fib6_add+0x2279/0x3d10 [ 193.772881][ T5832] ? fib6_update_sernum_stub+0x190/0x190 [ 193.778537][ T5832] ? __kasan_check_write+0x14/0x20 [ 193.783762][ T5832] ? _raw_spin_lock_bh+0x8e/0xe0 [ 193.788722][ T5832] ? _raw_spin_lock_irq+0xe0/0xe0 [ 193.793770][ T5832] ip6_route_add+0x89/0x130 [ 193.798286][ T5832] addrconf_add_dev+0x329/0x430 [ 193.803244][ T5832] ? local_bh_enable+0x30/0x30 [ 193.808033][ T5832] ? __local_bh_enable_ip+0x58/0x80 [ 193.813334][ T5832] ? _raw_write_unlock_bh+0x2f/0x48 [ 193.818739][ T5832] ? addrconf_permanent_addr+0x867/0x8c0 [ 193.824506][ T5832] ? __kasan_check_read+0x11/0x20 [ 193.829572][ T5832] addrconf_init_auto_addrs+0x765/0xb90 [ 193.835148][ T5832] ? addrconf_dad_run+0x5a0/0x5a0 [ 193.840200][ T5832] ? igmpv3_del_delrec+0x700/0x700 [ 193.845329][ T5832] ? __local_bh_enable_ip+0x58/0x80 [ 193.850720][ T5832] ? _raw_spin_unlock_bh+0x51/0x60 [ 193.855846][ T5832] ? __kasan_check_write+0x14/0x20 [ 193.860963][ T5832] ? tun_sock_write_space+0x13b/0x1b0 [ 193.866429][ T5832] ? __kasan_check_write+0x14/0x20 [ 193.871725][ T5832] ? mutex_unlock+0x89/0x220 [ 193.876403][ T5832] ? __mutex_lock_slowpath+0x10/0x10 [ 193.881688][ T5832] ? macsec_notify+0xff/0x490 [ 193.886475][ T5832] ? addrconf_link_ready+0x134/0x190 [ 193.891776][ T5832] addrconf_notify+0x95d/0xde0 [ 193.896567][ T5832] raw_notifier_call_chain+0x90/0x100 [ 193.901943][ T5832] __dev_notify_flags+0x28f/0x500 [ 193.906984][ T5832] ? __dev_change_flags+0x6a0/0x6a0 [ 193.912274][ T5832] ? __dev_change_flags+0x510/0x6a0 [ 193.917468][ T5832] ? dev_get_flags+0x1e0/0x1e0 [ 193.922362][ T5832] ? __kasan_slab_free+0x11/0x20 [ 193.927311][ T5832] dev_change_flags+0xe8/0x1a0 [ 193.932100][ T5832] dev_ifsioc+0x147/0xe70 [ 193.936441][ T5832] ? dev_ioctl+0xd10/0xd10 [ 193.941996][ T5832] ? __kasan_check_write+0x14/0x20 [ 193.947553][ T5832] ? mutex_lock+0x95/0x1a0 [ 193.951981][ T5832] ? wait_for_completion_killable_timeout+0x10/0x10 [ 193.958658][ T5832] ? dev_get_by_name_rcu+0xc8/0xf0 [ 193.963777][ T5832] dev_ioctl+0x560/0xd10 [ 193.968028][ T5832] sock_do_ioctl+0x22e/0x300 [ 193.972637][ T5832] ? sock_show_fdinfo+0xa0/0xa0 [ 193.977752][ T5832] ? selinux_file_ioctl+0x377/0x480 [ 193.983044][ T5832] sock_ioctl+0x4bc/0x6b0 [ 193.987728][ T5832] ? sock_poll+0x3d0/0x3d0 [ 193.992143][ T5832] ? __fget_files+0x2c4/0x320 [ 193.996825][ T5832] ? security_file_ioctl+0x84/0xa0 [ 194.001936][ T5832] ? sock_poll+0x3d0/0x3d0 [ 194.006352][ T5832] __se_sys_ioctl+0x121/0x1a0 [ 194.011215][ T5832] __x64_sys_ioctl+0x7b/0x90 [ 194.015806][ T5832] x64_sys_call+0x2f/0x9a0 [ 194.020220][ T5832] do_syscall_64+0x4c/0xa0 [ 194.024636][ T5832] ? clear_bhb_loop+0x50/0xa0 [ 194.029314][ T5832] ? clear_bhb_loop+0x50/0xa0 [ 194.033985][ T5832] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 194.040065][ T5832] RIP: 0033:0x7f740e42abe9 [ 194.044478][ T5832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 194.064596][ T5832] RSP: 002b:00007f740ce93038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 194.073016][ T5832] RAX: ffffffffffffffda RBX: 00007f740e661fa0 RCX: 00007f740e42abe9 [ 194.081075][ T5832] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 194.089044][ T5832] RBP: 00007f740ce93090 R08: 0000000000000000 R09: 0000000000000000 [ 194.097103][ T5832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 194.105201][ T5832] R13: 00007f740e662038 R14: 00007f740e661fa0 R15: 00007ffe322c3df8 [ 194.113199][ T5832] [ 194.584230][ T5834] device wg2 left promiscuous mode [ 194.666226][ T5849] device veth1_macvtap left promiscuous mode [ 194.714163][ T5849] device macsec0 entered promiscuous mode [ 194.840810][ T5877] FAULT_INJECTION: forcing a failure. [ 194.840810][ T5877] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 194.854398][ T5877] CPU: 1 PID: 5877 Comm: syz.2.1932 Not tainted syzkaller #0 [ 194.861969][ T5877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 194.872040][ T5877] Call Trace: [ 194.875335][ T5877] [ 194.878357][ T5877] __dump_stack+0x21/0x30 [ 194.882694][ T5877] dump_stack_lvl+0xee/0x150 [ 194.887379][ T5877] ? show_regs_print_info+0x20/0x20 [ 194.892606][ T5877] ? stack_trace_save+0x98/0xe0 [ 194.897646][ T5877] ? __stack_depot_save+0x34/0x480 [ 194.902766][ T5877] dump_stack+0x15/0x20 [ 194.906926][ T5877] should_fail+0x3c1/0x510 [ 194.911346][ T5877] should_fail_usercopy+0x1a/0x20 [ 194.916369][ T5877] _copy_from_user+0x20/0xd0 [ 194.920966][ T5877] __copy_msghdr_from_user+0xaf/0x5e0 [ 194.926355][ T5877] ? _kstrtoull+0x3c0/0x4d0 [ 194.930875][ T5877] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 194.936167][ T5877] ? kstrtouint_from_user+0x1a0/0x200 [ 194.941642][ T5877] ___sys_sendmsg+0x156/0x260 [ 194.946369][ T5877] ? __sys_sendmsg+0x250/0x250 [ 194.951144][ T5877] ? __fdget+0x1a1/0x230 [ 194.955402][ T5877] __x64_sys_sendmsg+0x1e2/0x2a0 [ 194.960352][ T5877] ? ___sys_sendmsg+0x260/0x260 [ 194.965510][ T5877] ? ksys_write+0x1eb/0x240 [ 194.970046][ T5877] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 194.976389][ T5877] x64_sys_call+0x4b/0x9a0 [ 194.980817][ T5877] do_syscall_64+0x4c/0xa0 [ 194.985344][ T5877] ? clear_bhb_loop+0x50/0xa0 [ 194.990037][ T5877] ? clear_bhb_loop+0x50/0xa0 [ 194.994723][ T5877] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 195.000625][ T5877] RIP: 0033:0x7f57dfb27be9 [ 195.005055][ T5877] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 195.024859][ T5877] RSP: 002b:00007f57de590038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 195.033281][ T5877] RAX: ffffffffffffffda RBX: 00007f57dfd5efa0 RCX: 00007f57dfb27be9 [ 195.041347][ T5877] RDX: 0000000004040086 RSI: 0000200000000440 RDI: 0000000000000006 [ 195.049343][ T5877] RBP: 00007f57de590090 R08: 0000000000000000 R09: 0000000000000000 [ 195.057515][ T5877] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 195.065633][ T5877] R13: 00007f57dfd5f038 R14: 00007f57dfd5efa0 R15: 00007ffe0cfdeea8 [ 195.073726][ T5877] [ 195.097026][ T5880] device syzkaller0 entered promiscuous mode [ 195.128650][ T5884] device sit0 left promiscuous mode [ 195.155398][ T5884] device sit0 entered promiscuous mode [ 195.351571][ T5906] FAULT_INJECTION: forcing a failure. [ 195.351571][ T5906] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 195.366026][ T5906] CPU: 1 PID: 5906 Comm: syz.3.1941 Not tainted syzkaller #0 [ 195.373527][ T5906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 195.383600][ T5906] Call Trace: [ 195.386891][ T5906] [ 195.389825][ T5906] __dump_stack+0x21/0x30 [ 195.394183][ T5906] dump_stack_lvl+0xee/0x150 [ 195.399080][ T5906] ? show_regs_print_info+0x20/0x20 [ 195.404339][ T5906] ? bpf_cgroup_storage_free+0x8f/0xb0 [ 195.409815][ T5906] dump_stack+0x15/0x20 [ 195.413996][ T5906] should_fail+0x3c1/0x510 [ 195.418555][ T5906] should_fail_usercopy+0x1a/0x20 [ 195.423607][ T5906] _copy_to_user+0x20/0x90 [ 195.428124][ T5906] bpf_test_finish+0x1dd/0x3b0 [ 195.432910][ T5906] ? convert_skb_to___skb+0x360/0x360 [ 195.438303][ T5906] ? xdp_convert_buff_to_md+0x15c/0x1e0 [ 195.443951][ T5906] bpf_prog_test_run_xdp+0x62d/0x910 [ 195.449249][ T5906] ? dev_put+0x80/0x80 [ 195.453337][ T5906] ? __fget_files+0x2c4/0x320 [ 195.458554][ T5906] ? fput_many+0x15a/0x1a0 [ 195.463080][ T5906] ? dev_put+0x80/0x80 [ 195.467205][ T5906] bpf_prog_test_run+0x3d5/0x620 [ 195.472247][ T5906] ? bpf_prog_query+0x230/0x230 [ 195.477107][ T5906] ? selinux_bpf+0xce/0xf0 [ 195.481533][ T5906] ? security_bpf+0x82/0xa0 [ 195.486044][ T5906] __sys_bpf+0x52c/0x730 [ 195.490829][ T5906] ? bpf_link_show_fdinfo+0x310/0x310 [ 195.496245][ T5906] ? debug_smp_processor_id+0x17/0x20 [ 195.501660][ T5906] __x64_sys_bpf+0x7c/0x90 [ 195.506183][ T5906] x64_sys_call+0x4b9/0x9a0 [ 195.510749][ T5906] do_syscall_64+0x4c/0xa0 [ 195.515454][ T5906] ? clear_bhb_loop+0x50/0xa0 [ 195.520152][ T5906] ? clear_bhb_loop+0x50/0xa0 [ 195.524844][ T5906] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 195.530842][ T5906] RIP: 0033:0x7f958fd0ebe9 [ 195.535285][ T5906] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 195.555012][ T5906] RSP: 002b:00007f958e777038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 195.563575][ T5906] RAX: ffffffffffffffda RBX: 00007f958ff45fa0 RCX: 00007f958fd0ebe9 [ 195.571672][ T5906] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 195.579671][ T5906] RBP: 00007f958e777090 R08: 0000000000000000 R09: 0000000000000000 [ 195.587864][ T5906] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 195.595938][ T5906] R13: 00007f958ff46038 R14: 00007f958ff45fa0 R15: 00007ffc51190288 [ 195.603958][ T5906] [ 195.776598][ T5914] device sit0 left promiscuous mode [ 195.863862][ T5914] device sit0 entered promiscuous mode [ 195.960870][ T5933] ÿÿÿÿÿÿ: renamed from vlan1 [ 196.942129][ T5957] device pim6reg1 entered promiscuous mode [ 197.078368][ T30] audit: type=1400 audit(1756845309.303:137): avc: denied { create } for pid=5969 comm="syz.1.1963" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 197.573448][ T5992] FAULT_INJECTION: forcing a failure. [ 197.573448][ T5992] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 197.590418][ T5992] CPU: 1 PID: 5992 Comm: syz.4.1972 Not tainted syzkaller #0 [ 197.597833][ T5992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 197.607899][ T5992] Call Trace: [ 197.611185][ T5992] [ 197.614135][ T5992] __dump_stack+0x21/0x30 [ 197.618566][ T5992] dump_stack_lvl+0xee/0x150 [ 197.623254][ T5992] ? show_regs_print_info+0x20/0x20 [ 197.628465][ T5992] ? vfs_write+0xc17/0xf70 [ 197.632910][ T5992] dump_stack+0x15/0x20 [ 197.637076][ T5992] should_fail+0x3c1/0x510 [ 197.641626][ T5992] should_fail_usercopy+0x1a/0x20 [ 197.646679][ T5992] _copy_from_user+0x20/0xd0 [ 197.651398][ T5992] __sys_bpf+0x233/0x730 [ 197.655673][ T5992] ? bpf_link_show_fdinfo+0x310/0x310 [ 197.661064][ T5992] ? debug_smp_processor_id+0x17/0x20 [ 197.666465][ T5992] __x64_sys_bpf+0x7c/0x90 [ 197.670896][ T5992] x64_sys_call+0x4b9/0x9a0 [ 197.675407][ T5992] do_syscall_64+0x4c/0xa0 [ 197.679831][ T5992] ? clear_bhb_loop+0x50/0xa0 [ 197.684520][ T5992] ? clear_bhb_loop+0x50/0xa0 [ 197.689207][ T5992] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 197.695125][ T5992] RIP: 0033:0x7fd173f5cbe9 [ 197.699569][ T5992] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 197.719349][ T5992] RSP: 002b:00007fd1729c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 197.727869][ T5992] RAX: ffffffffffffffda RBX: 00007fd174193fa0 RCX: 00007fd173f5cbe9 [ 197.735854][ T5992] RDX: 0000000000000020 RSI: 0000200000000080 RDI: 0000000000000004 [ 197.743927][ T5992] RBP: 00007fd1729c5090 R08: 0000000000000000 R09: 0000000000000000 [ 197.751997][ T5992] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.759979][ T5992] R13: 00007fd174194038 R14: 00007fd174193fa0 R15: 00007ffc19e4ecf8 [ 197.767989][ T5992] [ 198.235273][ T6009] device sit0 entered promiscuous mode [ 198.333509][ T6012] device pim6reg1 entered promiscuous mode [ 199.718216][ T6060] device sit0 left promiscuous mode [ 199.774354][ T6060] device sit0 entered promiscuous mode [ 200.345461][ T6078] tap0: tun_chr_ioctl cmd 1074025692 [ 201.301081][ T101] udevd[101]: worker [1541] terminated by signal 33 (Unknown signal 33) [ 201.309980][ T6110] device sit0 left promiscuous mode [ 201.316903][ T101] udevd[101]: worker [1541] failed while handling '/devices/virtual/block/loop4' [ 201.352599][ T6121] device sit0 entered promiscuous mode [ 208.106432][ T6125] device wg2 entered promiscuous mode [ 209.176071][ T6132] device sit0 left promiscuous mode [ 209.250626][ T6132] device sit0 entered promiscuous mode [ 209.479472][ T6145] device sit0 left promiscuous mode [ 209.526955][ T6146] device sit0 entered promiscuous mode [ 209.694465][ T6151] FAULT_INJECTION: forcing a failure. [ 209.694465][ T6151] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 209.941254][ T6151] CPU: 1 PID: 6151 Comm: syz.4.2023 Not tainted syzkaller #0 [ 209.948692][ T6151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 209.958766][ T6151] Call Trace: [ 209.962053][ T6151] [ 209.964988][ T6151] __dump_stack+0x21/0x30 [ 209.969337][ T6151] dump_stack_lvl+0xee/0x150 [ 209.974034][ T6151] ? show_regs_print_info+0x20/0x20 [ 209.979243][ T6151] dump_stack+0x15/0x20 [ 209.983405][ T6151] should_fail+0x3c1/0x510 [ 209.988030][ T6151] should_fail_alloc_page+0x55/0x80 [ 209.993264][ T6151] prepare_alloc_pages+0x156/0x600 [ 209.998406][ T6151] ? __alloc_pages_bulk+0xab0/0xab0 [ 210.003642][ T6151] __alloc_pages+0x10a/0x440 [ 210.008256][ T6151] ? prep_new_page+0x110/0x110 [ 210.013044][ T6151] kmalloc_order+0x4c/0x160 [ 210.017571][ T6151] kmalloc_order_trace+0x18/0xb0 [ 210.022518][ T6151] __kmalloc+0x199/0x2c0 [ 210.026950][ T6151] trie_get_next_key+0x26e/0x6f0 [ 210.032084][ T6151] ? vm_mmap+0xb0/0xb0 [ 210.036169][ T6151] ? __kasan_check_write+0x14/0x20 [ 210.041321][ T6151] ? _copy_from_user+0x95/0xd0 [ 210.046139][ T6151] map_get_next_key+0x2ea/0x4c0 [ 210.050999][ T6151] __sys_bpf+0x390/0x730 [ 210.055253][ T6151] ? bpf_link_show_fdinfo+0x310/0x310 [ 210.060814][ T6151] ? debug_smp_processor_id+0x17/0x20 [ 210.066201][ T6151] __x64_sys_bpf+0x7c/0x90 [ 210.070711][ T6151] x64_sys_call+0x4b9/0x9a0 [ 210.075225][ T6151] do_syscall_64+0x4c/0xa0 [ 210.079787][ T6151] ? clear_bhb_loop+0x50/0xa0 [ 210.084494][ T6151] ? clear_bhb_loop+0x50/0xa0 [ 210.089204][ T6151] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 210.095121][ T6151] RIP: 0033:0x7fd173f5cbe9 [ 210.099560][ T6151] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 210.119514][ T6151] RSP: 002b:00007fd172983038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 210.128054][ T6151] RAX: ffffffffffffffda RBX: 00007fd174194180 RCX: 00007fd173f5cbe9 [ 210.136131][ T6151] RDX: 0000000000000020 RSI: 0000200000000080 RDI: 0000000000000004 [ 210.144308][ T6151] RBP: 00007fd172983090 R08: 0000000000000000 R09: 0000000000000000 [ 210.153011][ T6151] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 210.161134][ T6151] R13: 00007fd174194218 R14: 00007fd174194180 R15: 00007ffc19e4ecf8 [ 210.169133][ T6151] [ 210.219854][ T6159] device sit0 left promiscuous mode [ 210.294027][ T6163] device veth0_vlan left promiscuous mode [ 210.313477][ T6163] device veth0_vlan entered promiscuous mode [ 210.346539][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 210.361827][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 210.369966][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 210.627853][ T6159] device sit0 entered promiscuous mode [ 210.802532][ T6174] device pim6reg1 entered promiscuous mode [ 212.253134][ T6215] device wg2 left promiscuous mode [ 212.671514][ T6233] ÿÿÿÿÿÿ: renamed from vlan1 [ 213.437789][ T6274] device sit0 left promiscuous mode [ 213.572573][ T6274] device sit0 entered promiscuous mode [ 213.654545][ T6280] FAULT_INJECTION: forcing a failure. [ 213.654545][ T6280] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 213.712427][ T6280] CPU: 0 PID: 6280 Comm: syz.4.2071 Not tainted syzkaller #0 [ 213.720037][ T6280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 213.730202][ T6280] Call Trace: [ 213.733587][ T6280] [ 213.736534][ T6280] __dump_stack+0x21/0x30 [ 213.740965][ T6280] dump_stack_lvl+0xee/0x150 [ 213.745568][ T6280] ? show_regs_print_info+0x20/0x20 [ 213.750786][ T6280] dump_stack+0x15/0x20 [ 213.755158][ T6280] should_fail+0x3c1/0x510 [ 213.759589][ T6280] should_fail_usercopy+0x1a/0x20 [ 213.764661][ T6280] _copy_from_iter+0x21a/0x1050 [ 213.769520][ T6280] ? __kasan_check_write+0x14/0x20 [ 213.774640][ T6280] ? skb_set_owner_w+0x24d/0x370 [ 213.779593][ T6280] ? copy_mc_pipe_to_iter+0x770/0x770 [ 213.784977][ T6280] ? __kernel_text_address+0xa0/0x100 [ 213.790364][ T6280] ? check_stack_object+0x81/0x140 [ 213.795574][ T6280] ? __kasan_check_read+0x11/0x20 [ 213.800711][ T6280] ? __check_object_size+0x2f4/0x3c0 [ 213.806188][ T6280] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 213.812068][ T6280] ? skb_put+0x10e/0x1f0 [ 213.816321][ T6280] tun_get_user+0xc3c/0x33c0 [ 213.820933][ T6280] ? __kasan_init_slab_obj+0x10/0x40 [ 213.826311][ T6280] ? kmem_cache_free+0x100/0x320 [ 213.831269][ T6280] ? __x64_sys_openat+0x136/0x160 [ 213.836396][ T6280] ? x64_sys_call+0x219/0x9a0 [ 213.841084][ T6280] ? tun_do_read+0x1c40/0x1c40 [ 213.845861][ T6280] ? kstrtouint_from_user+0x1a0/0x200 [ 213.851339][ T6280] ? kstrtol_from_user+0x260/0x260 [ 213.856550][ T6280] ? bpf_probe_read_kernel_str+0x4a/0x70 [ 213.862223][ T6280] ? avc_policy_seqno+0x1b/0x70 [ 213.867102][ T6280] ? selinux_file_permission+0x2aa/0x510 [ 213.872840][ T6280] tun_chr_write_iter+0x1eb/0x2e0 [ 213.877885][ T6280] vfs_write+0x802/0xf70 [ 213.882184][ T6280] ? file_end_write+0x1b0/0x1b0 [ 213.887046][ T6280] ? __fget_files+0x2c4/0x320 [ 213.891748][ T6280] ? __fdget_pos+0x1f7/0x380 [ 213.896571][ T6280] ? ksys_write+0x71/0x240 [ 213.901098][ T6280] ksys_write+0x140/0x240 [ 213.905466][ T6280] ? __ia32_sys_read+0x90/0x90 [ 213.910249][ T6280] ? debug_smp_processor_id+0x17/0x20 [ 213.915733][ T6280] __x64_sys_write+0x7b/0x90 [ 213.920341][ T6280] x64_sys_call+0x8ef/0x9a0 [ 213.924961][ T6280] do_syscall_64+0x4c/0xa0 [ 213.929409][ T6280] ? clear_bhb_loop+0x50/0xa0 [ 213.934096][ T6280] ? clear_bhb_loop+0x50/0xa0 [ 213.938872][ T6280] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 213.944786][ T6280] RIP: 0033:0x7fd173f5cbe9 [ 213.949310][ T6280] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 213.969193][ T6280] RSP: 002b:00007fd1729c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 213.977802][ T6280] RAX: ffffffffffffffda RBX: 00007fd174193fa0 RCX: 00007fd173f5cbe9 [ 213.986230][ T6280] RDX: 000000000000ffc0 RSI: 0000200000000000 RDI: 00000000000000c8 [ 213.994398][ T6280] RBP: 00007fd1729c5090 R08: 0000000000000000 R09: 0000000000000000 [ 214.002475][ T6280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 214.010460][ T6280] R13: 00007fd174194038 R14: 00007fd174193fa0 R15: 00007ffc19e4ecf8 [ 214.018550][ T6280] [ 214.310250][ T6292] device syzkaller0 entered promiscuous mode [ 214.472333][ T6300] device pim6reg1 entered promiscuous mode [ 214.638067][ T6308] FAULT_INJECTION: forcing a failure. [ 214.638067][ T6308] name failslab, interval 1, probability 0, space 0, times 0 [ 214.698667][ T6308] CPU: 0 PID: 6308 Comm: syz.2.2083 Not tainted syzkaller #0 [ 214.706189][ T6308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 214.716355][ T6308] Call Trace: [ 214.719654][ T6308] [ 214.722787][ T6308] __dump_stack+0x21/0x30 [ 214.727151][ T6308] dump_stack_lvl+0xee/0x150 [ 214.731780][ T6308] ? show_regs_print_info+0x20/0x20 [ 214.737108][ T6308] dump_stack+0x15/0x20 [ 214.741295][ T6308] should_fail+0x3c1/0x510 [ 214.745742][ T6308] __should_failslab+0xa4/0xe0 [ 214.750530][ T6308] should_failslab+0x9/0x20 [ 214.755060][ T6308] slab_pre_alloc_hook+0x3b/0xe0 [ 214.760014][ T6308] ? security_inode_alloc+0x33/0x110 [ 214.765314][ T6308] kmem_cache_alloc+0x44/0x260 [ 214.770182][ T6308] security_inode_alloc+0x33/0x110 [ 214.775297][ T6308] inode_init_always+0x711/0x990 [ 214.780236][ T6308] new_inode_pseudo+0x91/0x210 [ 214.785004][ T6308] new_inode+0x28/0x1e0 [ 214.789173][ T6308] proc_pid_make_inode+0x27/0x1d0 [ 214.794199][ T6308] proc_ns_dir_lookup+0x573/0x6b0 [ 214.799221][ T6308] ? proc_ns_dir_readdir+0x4c0/0x4c0 [ 214.804592][ T6308] path_openat+0xfcf/0x2f10 [ 214.809202][ T6308] ? do_filp_open+0x3e0/0x3e0 [ 214.813884][ T6308] do_filp_open+0x1b3/0x3e0 [ 214.818399][ T6308] ? vfs_tmpfile+0x2d0/0x2d0 [ 214.822989][ T6308] ? noop_direct_IO+0x20/0x20 [ 214.827667][ T6308] do_sys_openat2+0x14c/0x7b0 [ 214.832347][ T6308] ? do_sys_open+0xe0/0xe0 [ 214.836764][ T6308] ? kvm_sched_clock_read+0x18/0x40 [ 214.842050][ T6308] ? sched_clock+0x9/0x10 [ 214.846382][ T6308] ? sched_clock_cpu+0x18/0x3c0 [ 214.851254][ T6308] __x64_sys_openat+0x136/0x160 [ 214.856196][ T6308] x64_sys_call+0x219/0x9a0 [ 214.860792][ T6308] do_syscall_64+0x4c/0xa0 [ 214.865215][ T6308] ? clear_bhb_loop+0x50/0xa0 [ 214.869897][ T6308] ? clear_bhb_loop+0x50/0xa0 [ 214.874572][ T6308] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 214.880471][ T6308] RIP: 0033:0x7f57dfb26550 [ 214.884891][ T6308] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 214.904677][ T6308] RSP: 002b:00007f57de58ff10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 214.913100][ T6308] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f57dfb26550 [ 214.921596][ T6308] RDX: 0000000000000002 RSI: 00007f57de58ffa0 RDI: 00000000ffffff9c [ 214.929578][ T6308] RBP: 00007f57de58ffa0 R08: 0000000000000000 R09: 00007f57de58fcd4 [ 214.937900][ T6308] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 214.945868][ T6308] R13: 00007f57dfd5f038 R14: 00007f57dfd5efa0 R15: 00007ffe0cfdeea8 [ 214.953851][ T6308] [ 214.964799][ T6312] device wg2 entered promiscuous mode [ 215.030880][ T6325] device sit0 left promiscuous mode [ 215.054255][ T6325] device sit0 entered promiscuous mode [ 215.330643][ T6338] FAULT_INJECTION: forcing a failure. [ 215.330643][ T6338] name failslab, interval 1, probability 0, space 0, times 0 [ 215.349129][ T6338] CPU: 0 PID: 6338 Comm: syz.4.2093 Not tainted syzkaller #0 [ 215.356562][ T6338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 215.366652][ T6338] Call Trace: [ 215.370041][ T6338] [ 215.372992][ T6338] __dump_stack+0x21/0x30 [ 215.377349][ T6338] dump_stack_lvl+0xee/0x150 [ 215.381953][ T6338] ? show_regs_print_info+0x20/0x20 [ 215.387173][ T6338] dump_stack+0x15/0x20 [ 215.391347][ T6338] should_fail+0x3c1/0x510 [ 215.395783][ T6338] __should_failslab+0xa4/0xe0 [ 215.400672][ T6338] should_failslab+0x9/0x20 [ 215.405196][ T6338] slab_pre_alloc_hook+0x3b/0xe0 [ 215.410160][ T6338] ? security_inode_alloc+0x33/0x110 [ 215.415470][ T6338] kmem_cache_alloc+0x44/0x260 [ 215.420257][ T6338] security_inode_alloc+0x33/0x110 [ 215.425391][ T6338] inode_init_always+0x711/0x990 [ 215.430355][ T6338] new_inode_pseudo+0x91/0x210 [ 215.435341][ T6338] new_inode+0x28/0x1e0 [ 215.439592][ T6338] proc_pid_make_inode+0x27/0x1d0 [ 215.444701][ T6338] proc_ns_dir_lookup+0x573/0x6b0 [ 215.449775][ T6338] ? proc_ns_dir_readdir+0x4c0/0x4c0 [ 215.455281][ T6338] path_openat+0xfcf/0x2f10 [ 215.459842][ T6338] ? do_filp_open+0x3e0/0x3e0 [ 215.464541][ T6338] do_filp_open+0x1b3/0x3e0 [ 215.469164][ T6338] ? vfs_tmpfile+0x2d0/0x2d0 [ 215.473778][ T6338] ? noop_direct_IO+0x20/0x20 [ 215.478566][ T6338] do_sys_openat2+0x14c/0x7b0 [ 215.483354][ T6338] ? do_sys_open+0xe0/0xe0 [ 215.487877][ T6338] ? kvm_sched_clock_read+0x18/0x40 [ 215.493113][ T6338] ? sched_clock+0x9/0x10 [ 215.497483][ T6338] ? sched_clock_cpu+0x18/0x3c0 [ 215.502429][ T6338] __x64_sys_openat+0x136/0x160 [ 215.507302][ T6338] x64_sys_call+0x219/0x9a0 [ 215.511912][ T6338] do_syscall_64+0x4c/0xa0 [ 215.516349][ T6338] ? clear_bhb_loop+0x50/0xa0 [ 215.521044][ T6338] ? clear_bhb_loop+0x50/0xa0 [ 215.525831][ T6338] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 215.531740][ T6338] RIP: 0033:0x7fd173f5b550 [ 215.536174][ T6338] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 215.556210][ T6338] RSP: 002b:00007fd1729c4f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 215.564840][ T6338] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007fd173f5b550 [ 215.573029][ T6338] RDX: 0000000000000002 RSI: 00007fd1729c4fa0 RDI: 00000000ffffff9c [ 215.581202][ T6338] RBP: 00007fd1729c4fa0 R08: 0000000000000000 R09: 00007fd1729c4cd4 [ 215.589394][ T6338] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 215.597558][ T6338] R13: 00007fd174194038 R14: 00007fd174193fa0 R15: 00007ffc19e4ecf8 [ 215.605546][ T6338] [ 215.733419][ T6346] device syzkaller0 entered promiscuous mode [ 215.942319][ T6359] device wg2 left promiscuous mode [ 216.067837][ T6359] device wg2 entered promiscuous mode [ 216.146582][ T6346] device syzkaller0 left promiscuous mode [ 216.477696][ T6367] device wg2 left promiscuous mode [ 217.544449][ T6416] FAULT_INJECTION: forcing a failure. [ 217.544449][ T6416] name failslab, interval 1, probability 0, space 0, times 0 [ 217.606129][ T6416] CPU: 1 PID: 6416 Comm: syz.3.2118 Not tainted syzkaller #0 [ 217.613659][ T6416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 217.623905][ T6416] Call Trace: [ 217.627196][ T6416] [ 217.630130][ T6416] __dump_stack+0x21/0x30 [ 217.634573][ T6416] dump_stack_lvl+0xee/0x150 [ 217.639184][ T6416] ? show_regs_print_info+0x20/0x20 [ 217.644486][ T6416] dump_stack+0x15/0x20 [ 217.648779][ T6416] should_fail+0x3c1/0x510 [ 217.653212][ T6416] __should_failslab+0xa4/0xe0 [ 217.657985][ T6416] should_failslab+0x9/0x20 [ 217.662554][ T6416] slab_pre_alloc_hook+0x3b/0xe0 [ 217.667528][ T6416] ? security_inode_alloc+0x33/0x110 [ 217.673186][ T6416] kmem_cache_alloc+0x44/0x260 [ 217.689003][ T6416] security_inode_alloc+0x33/0x110 [ 217.696553][ T6416] inode_init_always+0x711/0x990 [ 217.701618][ T6416] new_inode_pseudo+0x91/0x210 [ 217.706398][ T6416] new_inode+0x28/0x1e0 [ 217.710587][ T6416] proc_pid_make_inode+0x27/0x1d0 [ 217.715731][ T6416] proc_ns_dir_lookup+0x573/0x6b0 [ 217.720791][ T6416] ? proc_ns_dir_readdir+0x4c0/0x4c0 [ 217.726111][ T6416] path_openat+0xfcf/0x2f10 [ 217.730653][ T6416] ? do_filp_open+0x3e0/0x3e0 [ 217.735644][ T6416] do_filp_open+0x1b3/0x3e0 [ 217.740269][ T6416] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 217.746625][ T6416] ? vfs_tmpfile+0x2d0/0x2d0 [ 217.751248][ T6416] ? noop_direct_IO+0x20/0x20 [ 217.756029][ T6416] do_sys_openat2+0x14c/0x7b0 [ 217.760819][ T6416] ? do_sys_open+0xe0/0xe0 [ 217.765374][ T6416] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 217.771769][ T6416] __x64_sys_openat+0x136/0x160 [ 217.776654][ T6416] x64_sys_call+0x219/0x9a0 [ 217.781168][ T6416] do_syscall_64+0x4c/0xa0 [ 217.785608][ T6416] ? clear_bhb_loop+0x50/0xa0 [ 217.790392][ T6416] ? clear_bhb_loop+0x50/0xa0 [ 217.795094][ T6416] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 217.801099][ T6416] RIP: 0033:0x7f958fd0d550 [ 217.805533][ T6416] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 217.825847][ T6416] RSP: 002b:00007f958e776f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 217.834289][ T6416] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f958fd0d550 [ 217.842433][ T6416] RDX: 0000000000000002 RSI: 00007f958e776fa0 RDI: 00000000ffffff9c [ 217.850402][ T6416] RBP: 00007f958e776fa0 R08: 0000000000000000 R09: 00007f958e776cd4 [ 217.858546][ T6416] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 217.866771][ T6416] R13: 00007f958ff46038 R14: 00007f958ff45fa0 R15: 00007ffc51190288 [ 217.874751][ T6416] [ 217.926428][ T6421] device sit0 left promiscuous mode [ 217.955327][ T6421] device sit0 entered promiscuous mode [ 218.881719][ T6458] device pim6reg1 entered promiscuous mode [ 219.067577][ T6468] FAULT_INJECTION: forcing a failure. [ 219.067577][ T6468] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 219.110035][ T6468] CPU: 0 PID: 6468 Comm: syz.1.2137 Not tainted syzkaller #0 [ 219.117464][ T6468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 219.127615][ T6468] Call Trace: [ 219.130903][ T6468] [ 219.133844][ T6468] __dump_stack+0x21/0x30 [ 219.138187][ T6468] dump_stack_lvl+0xee/0x150 [ 219.142787][ T6468] ? show_regs_print_info+0x20/0x20 [ 219.147993][ T6468] ? vfs_write+0xc17/0xf70 [ 219.152445][ T6468] dump_stack+0x15/0x20 [ 219.156835][ T6468] should_fail+0x3c1/0x510 [ 219.161371][ T6468] should_fail_usercopy+0x1a/0x20 [ 219.166413][ T6468] _copy_from_user+0x20/0xd0 [ 219.171026][ T6468] __sys_bpf+0x233/0x730 [ 219.175278][ T6468] ? bpf_link_show_fdinfo+0x310/0x310 [ 219.180663][ T6468] ? debug_smp_processor_id+0x17/0x20 [ 219.186047][ T6468] __x64_sys_bpf+0x7c/0x90 [ 219.190468][ T6468] x64_sys_call+0x4b9/0x9a0 [ 219.194978][ T6468] do_syscall_64+0x4c/0xa0 [ 219.199409][ T6468] ? clear_bhb_loop+0x50/0xa0 [ 219.204100][ T6468] ? clear_bhb_loop+0x50/0xa0 [ 219.208784][ T6468] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 219.214692][ T6468] RIP: 0033:0x7fd91030bbe9 [ 219.219217][ T6468] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 219.239194][ T6468] RSP: 002b:00007fd90ed74038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 219.247634][ T6468] RAX: ffffffffffffffda RBX: 00007fd910542fa0 RCX: 00007fd91030bbe9 [ 219.255725][ T6468] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 219.263803][ T6468] RBP: 00007fd90ed74090 R08: 0000000000000000 R09: 0000000000000000 [ 219.271953][ T6468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 219.280017][ T6468] R13: 00007fd910543038 R14: 00007fd910542fa0 R15: 00007ffe3fca56f8 [ 219.288189][ T6468] [ 219.440365][ T6474] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.447824][ T6474] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.483845][ T6477] device bridge_slave_1 left promiscuous mode [ 219.491043][ T6477] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.516161][ T6477] device bridge_slave_0 left promiscuous mode [ 219.525452][ T6477] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.086453][ T6505] device wg2 entered promiscuous mode [ 220.169997][ T6511] device pim6reg1 entered promiscuous mode [ 220.378117][ T6516] device wg2 left promiscuous mode [ 220.394997][ T6518] device pim6reg1 entered promiscuous mode [ 220.804236][ T6542] device pim6reg1 entered promiscuous mode [ 220.897274][ T6546] device wg2 entered promiscuous mode [ 220.992688][ T6552] device pim6reg1 entered promiscuous mode [ 221.252879][ T6568] FAULT_INJECTION: forcing a failure. [ 221.252879][ T6568] name failslab, interval 1, probability 0, space 0, times 0 [ 221.277084][ T6568] CPU: 0 PID: 6568 Comm: syz.0.2175 Not tainted syzkaller #0 [ 221.284836][ T6568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 221.294915][ T6568] Call Trace: [ 221.298214][ T6568] [ 221.301160][ T6568] __dump_stack+0x21/0x30 [ 221.305509][ T6568] dump_stack_lvl+0xee/0x150 [ 221.310209][ T6568] ? show_regs_print_info+0x20/0x20 [ 221.315540][ T6568] ? avc_denied+0x1b0/0x1b0 [ 221.320066][ T6568] dump_stack+0x15/0x20 [ 221.324240][ T6568] should_fail+0x3c1/0x510 [ 221.328846][ T6568] __should_failslab+0xa4/0xe0 [ 221.333767][ T6568] should_failslab+0x9/0x20 [ 221.338382][ T6568] slab_pre_alloc_hook+0x3b/0xe0 [ 221.343328][ T6568] ? perf_event_alloc+0x116/0x1a20 [ 221.348463][ T6568] kmem_cache_alloc+0x44/0x260 [ 221.353241][ T6568] perf_event_alloc+0x116/0x1a20 [ 221.358198][ T6568] ? _raw_spin_unlock+0x4d/0x70 [ 221.363235][ T6568] ? alloc_fd+0x4ba/0x570 [ 221.367590][ T6568] __se_sys_perf_event_open+0x6c5/0x1b80 [ 221.373332][ T6568] ? __kasan_check_write+0x14/0x20 [ 221.378547][ T6568] ? mutex_unlock+0x89/0x220 [ 221.383154][ T6568] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 221.388895][ T6568] ? __ia32_sys_read+0x90/0x90 [ 221.393765][ T6568] __x64_sys_perf_event_open+0xbf/0xd0 [ 221.399334][ T6568] x64_sys_call+0x50d/0x9a0 [ 221.404025][ T6568] do_syscall_64+0x4c/0xa0 [ 221.408447][ T6568] ? clear_bhb_loop+0x50/0xa0 [ 221.413143][ T6568] ? clear_bhb_loop+0x50/0xa0 [ 221.417935][ T6568] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 221.424020][ T6568] RIP: 0033:0x7f740e42abe9 [ 221.428450][ T6568] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 221.448603][ T6568] RSP: 002b:00007f740ce93038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 221.457047][ T6568] RAX: ffffffffffffffda RBX: 00007f740e661fa0 RCX: 00007f740e42abe9 [ 221.465135][ T6568] RDX: afffffffffffffff RSI: 0000000000000000 RDI: 0000200000000180 [ 221.473257][ T6568] RBP: 00007f740ce93090 R08: 0000000000000000 R09: 0000000000000000 [ 221.481759][ T6568] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 221.489741][ T6568] R13: 00007f740e662038 R14: 00007f740e661fa0 R15: 00007ffe322c3df8 [ 221.497735][ T6568] [ 221.889755][ T30] audit: type=1400 audit(1756845334.113:138): avc: denied { create } for pid=6589 comm="syz.4.2182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 221.932099][ T6586] device wg2 entered promiscuous mode [ 223.712218][ C0] sched: RT throttling activated [ 226.846370][ T6621] device pim6reg1 entered promiscuous mode [ 227.020576][ T6623] device pim6reg1 entered promiscuous mode [ 227.892498][ T6647] device sit0 left promiscuous mode [ 227.981893][ T6647] device sit0 entered promiscuous mode [ 228.403065][ T6659] syz.4.2205[6659] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 228.403141][ T6659] syz.4.2205[6659] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 228.480294][ T6659] FAULT_INJECTION: forcing a failure. [ 228.480294][ T6659] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 228.512390][ T6659] CPU: 0 PID: 6659 Comm: syz.4.2205 Not tainted syzkaller #0 [ 228.519818][ T6659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 228.530072][ T6659] Call Trace: [ 228.533546][ T6659] [ 228.536535][ T6659] __dump_stack+0x21/0x30 [ 228.540966][ T6659] dump_stack_lvl+0xee/0x150 [ 228.545565][ T6659] ? show_regs_print_info+0x20/0x20 [ 228.550891][ T6659] ? get_page_from_freelist+0x2cc5/0x2d50 [ 228.556968][ T6659] dump_stack+0x15/0x20 [ 228.561151][ T6659] should_fail+0x3c1/0x510 [ 228.565701][ T6659] should_fail_alloc_page+0x55/0x80 [ 228.571013][ T6659] prepare_alloc_pages+0x156/0x600 [ 228.576234][ T6659] ? __alloc_pages_bulk+0xab0/0xab0 [ 228.581471][ T6659] ? _find_next_bit+0x1fa/0x200 [ 228.586339][ T6659] __alloc_pages+0x10a/0x440 [ 228.591029][ T6659] ? prep_new_page+0x110/0x110 [ 228.595803][ T6659] pcpu_populate_chunk+0x184/0xcb0 [ 228.601096][ T6659] ? _find_next_bit+0x106/0x200 [ 228.605962][ T6659] pcpu_alloc+0xc4d/0x1660 [ 228.610827][ T6659] __alloc_percpu_gfp+0x25/0x30 [ 228.615689][ T6659] bpf_map_alloc_percpu+0xc5/0x150 [ 228.620926][ T6659] htab_map_alloc+0xc1b/0x14f0 [ 228.625706][ T6659] map_create+0x455/0x21b0 [ 228.630131][ T6659] __sys_bpf+0x2cf/0x730 [ 228.634378][ T6659] ? bpf_link_show_fdinfo+0x310/0x310 [ 228.639774][ T6659] ? debug_smp_processor_id+0x17/0x20 [ 228.645172][ T6659] __x64_sys_bpf+0x7c/0x90 [ 228.649614][ T6659] x64_sys_call+0x4b9/0x9a0 [ 228.654233][ T6659] do_syscall_64+0x4c/0xa0 [ 228.658869][ T6659] ? clear_bhb_loop+0x50/0xa0 [ 228.663671][ T6659] ? clear_bhb_loop+0x50/0xa0 [ 228.668469][ T6659] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 228.674373][ T6659] RIP: 0033:0x7fd173f5cbe9 [ 228.678807][ T6659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 228.698454][ T6659] RSP: 002b:00007fd1729c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 228.706901][ T6659] RAX: ffffffffffffffda RBX: 00007fd174193fa0 RCX: 00007fd173f5cbe9 [ 228.714993][ T6659] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 228.723060][ T6659] RBP: 00007fd1729c5090 R08: 0000000000000000 R09: 0000000000000000 [ 228.731148][ T6659] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 228.739324][ T6659] R13: 00007fd174194038 R14: 00007fd174193fa0 R15: 00007ffc19e4ecf8 [ 228.747569][ T6659] [ 228.997522][ T6675] device pim6reg1 entered promiscuous mode [ 229.057733][ T6678] device pim6reg1 entered promiscuous mode [ 229.546498][ T6691] device sit0 left promiscuous mode [ 229.666994][ T6683] device wg2 left promiscuous mode [ 229.715636][ T6692] device sit0 entered promiscuous mode [ 230.448681][ T30] audit: type=1400 audit(1756845342.673:139): avc: denied { create } for pid=6719 comm="syz.3.2228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 230.713615][ T6728] FAULT_INJECTION: forcing a failure. [ 230.713615][ T6728] name failslab, interval 1, probability 0, space 0, times 0 [ 230.726530][ T6728] CPU: 1 PID: 6728 Comm: syz.2.2231 Not tainted syzkaller #0 [ 230.734089][ T6728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 230.744869][ T6728] Call Trace: [ 230.748164][ T6728] [ 230.751108][ T6728] __dump_stack+0x21/0x30 [ 230.755556][ T6728] dump_stack_lvl+0xee/0x150 [ 230.760164][ T6728] ? show_regs_print_info+0x20/0x20 [ 230.765548][ T6728] dump_stack+0x15/0x20 [ 230.769712][ T6728] should_fail+0x3c1/0x510 [ 230.774138][ T6728] ? alloc_skb_with_frags+0xa8/0x620 [ 230.779523][ T6728] __should_failslab+0xa4/0xe0 [ 230.784302][ T6728] should_failslab+0x9/0x20 [ 230.788828][ T6728] slab_pre_alloc_hook+0x3b/0xe0 [ 230.793780][ T6728] ? alloc_skb_with_frags+0xa8/0x620 [ 230.799077][ T6728] ? alloc_skb_with_frags+0xa8/0x620 [ 230.804372][ T6728] __kmalloc_track_caller+0x6c/0x2c0 [ 230.809779][ T6728] ? alloc_skb_with_frags+0xa8/0x620 [ 230.815182][ T6728] ? alloc_skb_with_frags+0xa8/0x620 [ 230.820500][ T6728] __alloc_skb+0x21a/0x740 [ 230.825134][ T6728] alloc_skb_with_frags+0xa8/0x620 [ 230.830360][ T6728] ? fib6_lookup+0x2a0/0x2a0 [ 230.835071][ T6728] sock_alloc_send_pskb+0x853/0x980 [ 230.840392][ T6728] ? sock_kzfree_s+0x60/0x60 [ 230.844997][ T6728] ? __local_bh_enable_ip+0x58/0x80 [ 230.850219][ T6728] ? local_bh_enable+0x1f/0x30 [ 230.855104][ T6728] ? ip6_dst_lookup_tail+0xd01/0x1370 [ 230.860773][ T6728] sock_alloc_send_skb+0x32/0x40 [ 230.865743][ T6728] __ip6_append_data+0x252e/0x37e0 [ 230.870899][ T6728] ? icmpv6_route_lookup+0x457/0x4e0 [ 230.876315][ T6728] ? ip6_setup_cork+0x1290/0x1290 [ 230.881370][ T6728] ? __kasan_check_read+0x11/0x20 [ 230.886445][ T6728] ? ip6_setup_cork+0xd10/0x1290 [ 230.891593][ T6728] ip6_append_data+0x1d0/0x330 [ 230.896379][ T6728] ? icmpv6_route_lookup+0x4e0/0x4e0 [ 230.901680][ T6728] ? icmpv6_route_lookup+0x4e0/0x4e0 [ 230.906961][ T6728] icmp6_send+0xeb8/0x14c0 [ 230.911380][ T6728] ? icmpv6_push_pending_frames+0x440/0x440 [ 230.917271][ T6728] ? __dev_queue_xmit+0x17bd/0x2d80 [ 230.922554][ T6728] ? netdev_core_pick_tx+0x260/0x310 [ 230.927839][ T6728] ? __bpf_redirect+0x68a/0xe60 [ 230.932864][ T6728] ? __sys_bpf+0x52c/0x730 [ 230.937277][ T6728] ? memset+0x35/0x40 [ 230.941355][ T6728] ? ip_mtu_from_fib_result+0x330/0x330 [ 230.946906][ T6728] icmpv6_ndo_send+0x13f/0x4c0 [ 230.951672][ T6728] ? ip_route_output_key_hash_rcu+0x17ab/0x2060 [ 230.957910][ T6728] ? udp6_set_csum+0x5f0/0x5f0 [ 230.962673][ T6728] ? ip_route_output_flow+0x1d2/0x2d0 [ 230.968070][ T6728] ? ipv4_sk_update_pmtu+0x1320/0x1320 [ 230.973801][ T6728] tnl_update_pmtu+0x7e2/0xbc0 [ 230.978670][ T6728] ip_tunnel_xmit+0xf41/0x21c0 [ 230.983434][ T6728] ? ip_tunnel_xmit+0xd0/0x21c0 [ 230.988289][ T6728] ? unwind_get_return_address+0x4d/0x90 [ 230.994011][ T6728] ? ip4_dst_hoplimit+0x110/0x110 [ 230.999121][ T6728] ? skb_network_protocol+0x501/0x740 [ 231.005016][ T6728] ? gre_build_header+0x229/0x850 [ 231.010137][ T6728] ipgre_xmit+0x7c0/0xb30 [ 231.014567][ T6728] dev_hard_start_xmit+0x244/0x670 [ 231.019796][ T6728] __dev_queue_xmit+0x17bd/0x2d80 [ 231.024933][ T6728] ? dev_queue_xmit+0x20/0x20 [ 231.029616][ T6728] ? __kasan_check_write+0x14/0x20 [ 231.034724][ T6728] ? skb_release_data+0x1c6/0xa10 [ 231.039754][ T6728] ? __kasan_check_write+0x14/0x20 [ 231.044954][ T6728] ? pskb_expand_head+0xbe6/0x11d0 [ 231.050080][ T6728] dev_queue_xmit+0x17/0x20 [ 231.054586][ T6728] __bpf_redirect+0x68a/0xe60 [ 231.059353][ T6728] bpf_clone_redirect+0x242/0x380 [ 231.064381][ T6728] bpf_prog_e2f29814702bf05a+0x56/0x734 [ 231.069926][ T6728] ? __kasan_slab_alloc+0xcf/0xf0 [ 231.075125][ T6728] ? __kasan_slab_alloc+0xbd/0xf0 [ 231.080148][ T6728] ? slab_post_alloc_hook+0x4f/0x2b0 [ 231.085459][ T6728] ? kmem_cache_alloc+0xf7/0x260 [ 231.090585][ T6728] ? __build_skb+0x2d/0x310 [ 231.095182][ T6728] ? build_skb+0x24/0x200 [ 231.099860][ T6728] ? bpf_prog_test_run_skb+0x279/0x1150 [ 231.105403][ T6728] ? bpf_prog_test_run+0x3d5/0x620 [ 231.110523][ T6728] ? __sys_bpf+0x52c/0x730 [ 231.114931][ T6728] ? __x64_sys_bpf+0x7c/0x90 [ 231.119523][ T6728] ? x64_sys_call+0x4b9/0x9a0 [ 231.124637][ T6728] ? do_syscall_64+0x4c/0xa0 [ 231.129241][ T6728] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 231.135327][ T6728] ? __kasan_check_read+0x11/0x20 [ 231.140362][ T6728] ? kvm_sched_clock_read+0x18/0x40 [ 231.145566][ T6728] ? sched_clock+0x9/0x10 [ 231.149905][ T6728] bpf_test_run+0x537/0x8d0 [ 231.154409][ T6728] ? convert___skb_to_skb+0x4f0/0x4f0 [ 231.159792][ T6728] ? eth_get_headlen+0x1f0/0x1f0 [ 231.164835][ T6728] ? convert___skb_to_skb+0x41/0x4f0 [ 231.170126][ T6728] bpf_prog_test_run_skb+0x9ec/0x1150 [ 231.175591][ T6728] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 231.181670][ T6728] bpf_prog_test_run+0x3d5/0x620 [ 231.186735][ T6728] ? bpf_prog_query+0x230/0x230 [ 231.191607][ T6728] ? selinux_bpf+0xce/0xf0 [ 231.196137][ T6728] ? security_bpf+0x82/0xa0 [ 231.200726][ T6728] __sys_bpf+0x52c/0x730 [ 231.204967][ T6728] ? bpf_link_show_fdinfo+0x310/0x310 [ 231.210337][ T6728] ? debug_smp_processor_id+0x17/0x20 [ 231.215715][ T6728] __x64_sys_bpf+0x7c/0x90 [ 231.220132][ T6728] x64_sys_call+0x4b9/0x9a0 [ 231.224654][ T6728] do_syscall_64+0x4c/0xa0 [ 231.229112][ T6728] ? clear_bhb_loop+0x50/0xa0 [ 231.233913][ T6728] ? clear_bhb_loop+0x50/0xa0 [ 231.238688][ T6728] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 231.244607][ T6728] RIP: 0033:0x7f57dfb27be9 [ 231.249041][ T6728] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 231.268751][ T6728] RSP: 002b:00007f57de590038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 231.277373][ T6728] RAX: ffffffffffffffda RBX: 00007f57dfd5efa0 RCX: 00007f57dfb27be9 [ 231.285519][ T6728] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 231.293727][ T6728] RBP: 00007f57de590090 R08: 0000000000000000 R09: 0000000000000000 [ 231.302167][ T6728] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 231.310334][ T6728] R13: 00007f57dfd5f038 R14: 00007f57dfd5efa0 R15: 00007ffe0cfdeea8 [ 231.318336][ T6728] [ 231.331326][ T6730] device sit0 left promiscuous mode [ 231.362857][ T6733] device sit0 entered promiscuous mode [ 231.415432][ T6741] nr0: tun_chr_ioctl cmd 1074025677 [ 231.422175][ T6741] nr0: linktype set to 270 [ 231.492371][ T6747] device sit0 left promiscuous mode [ 231.590859][ T6750] device sit0 entered promiscuous mode [ 231.683456][ T30] audit: type=1400 audit(1756845343.903:140): avc: denied { create } for pid=6746 comm="syz.0.2237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 231.814061][ T6756] FAULT_INJECTION: forcing a failure. [ 231.814061][ T6756] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 231.838881][ T6756] CPU: 0 PID: 6756 Comm: syz.0.2240 Not tainted syzkaller #0 [ 231.846492][ T6756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 231.856854][ T6756] Call Trace: [ 231.860218][ T6756] [ 231.863292][ T6756] __dump_stack+0x21/0x30 [ 231.867763][ T6756] dump_stack_lvl+0xee/0x150 [ 231.872474][ T6756] ? show_regs_print_info+0x20/0x20 [ 231.877755][ T6756] dump_stack+0x15/0x20 [ 231.881905][ T6756] should_fail+0x3c1/0x510 [ 231.886337][ T6756] should_fail_usercopy+0x1a/0x20 [ 231.891398][ T6756] _copy_from_iter+0x21a/0x1050 [ 231.896240][ T6756] ? __kasan_check_write+0x14/0x20 [ 231.901344][ T6756] ? skb_set_owner_w+0x24d/0x370 [ 231.906275][ T6756] ? copy_mc_pipe_to_iter+0x770/0x770 [ 231.911702][ T6756] ? __kernel_text_address+0xa0/0x100 [ 231.917275][ T6756] ? check_stack_object+0x81/0x140 [ 231.922406][ T6756] ? __kasan_check_read+0x11/0x20 [ 231.927442][ T6756] ? __check_object_size+0x2f4/0x3c0 [ 231.932737][ T6756] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 231.938780][ T6756] ? skb_put+0x10e/0x1f0 [ 231.943046][ T6756] tun_get_user+0xc3c/0x33c0 [ 231.947665][ T6756] ? __kasan_init_slab_obj+0x10/0x40 [ 231.952956][ T6756] ? irqentry_exit+0x37/0x40 [ 231.957561][ T6756] ? tun_do_read+0x1c40/0x1c40 [ 231.962325][ T6756] ? kstrtouint_from_user+0x1a0/0x200 [ 231.967792][ T6756] ? kstrtol_from_user+0x260/0x260 [ 231.972931][ T6756] ? slab_debug_trace_open+0x210/0x210 [ 231.978811][ T6756] ? bpf_probe_read_user+0x68/0x70 [ 231.984032][ T6756] ? avc_policy_seqno+0x1b/0x70 [ 231.989142][ T6756] ? selinux_file_permission+0x2aa/0x510 [ 231.994775][ T6756] tun_chr_write_iter+0x1eb/0x2e0 [ 231.999806][ T6756] vfs_write+0x802/0xf70 [ 232.004056][ T6756] ? file_end_write+0x1b0/0x1b0 [ 232.009003][ T6756] ? __fget_files+0x2c4/0x320 [ 232.014080][ T6756] ? __fdget_pos+0x1f7/0x380 [ 232.018675][ T6756] ? ksys_write+0x71/0x240 [ 232.023092][ T6756] ksys_write+0x140/0x240 [ 232.027607][ T6756] ? __ia32_sys_read+0x90/0x90 [ 232.032509][ T6756] ? debug_smp_processor_id+0x17/0x20 [ 232.037993][ T6756] __x64_sys_write+0x7b/0x90 [ 232.042690][ T6756] x64_sys_call+0x8ef/0x9a0 [ 232.047224][ T6756] do_syscall_64+0x4c/0xa0 [ 232.051777][ T6756] ? clear_bhb_loop+0x50/0xa0 [ 232.056459][ T6756] ? clear_bhb_loop+0x50/0xa0 [ 232.061227][ T6756] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 232.067299][ T6756] RIP: 0033:0x7f740e42abe9 [ 232.071973][ T6756] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 232.091670][ T6756] RSP: 002b:00007f740ce93038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 232.100545][ T6756] RAX: ffffffffffffffda RBX: 00007f740e661fa0 RCX: 00007f740e42abe9 [ 232.108675][ T6756] RDX: 000000000000fdef RSI: 0000200000000300 RDI: 00000000000000c8 [ 232.116747][ T6756] RBP: 00007f740ce93090 R08: 0000000000000000 R09: 0000000000000000 [ 232.124815][ T6756] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 232.133218][ T6756] R13: 00007f740e662038 R14: 00007f740e661fa0 R15: 00007ffe322c3df8 [ 232.141284][ T6756] [ 232.272861][ T6767] device wg2 left promiscuous mode [ 232.387409][ T6767] device wg2 entered promiscuous mode [ 233.328305][ T6799] device wg2 left promiscuous mode [ 236.784873][ T6927] device pim6reg1 entered promiscuous mode [ 237.749736][ T6955] device pim6reg1 entered promiscuous mode [ 237.793410][ T6959] device pim6reg1 entered promiscuous mode [ 237.802782][ T6952] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.810038][ T6952] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.827994][ T6952] device bridge_slave_0 entered promiscuous mode [ 237.844448][ T6952] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.861984][ T6952] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.875821][ T6952] device bridge_slave_1 entered promiscuous mode [ 237.943173][ T6964] device sit0 left promiscuous mode [ 237.959522][ T6965] device sit0 entered promiscuous mode [ 238.318124][ T30] audit: type=1400 audit(1756845350.543:141): avc: denied { write } for pid=6952 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 238.392383][ T30] audit: type=1400 audit(1756845350.573:142): avc: denied { read } for pid=6952 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 238.714910][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.726954][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.783758][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.833760][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.888750][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.895878][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.911476][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.920014][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.928467][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.935528][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.976274][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.016199][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 239.060860][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 239.098441][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 239.130678][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 239.232637][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 239.241168][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 239.253612][ T6952] device veth0_vlan entered promiscuous mode [ 239.277707][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 239.286169][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 239.297572][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 239.306308][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 239.353264][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 239.362173][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 239.371667][ T6952] device veth1_macvtap entered promiscuous mode [ 239.416775][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 239.428726][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 239.480081][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 239.492827][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 239.515030][ T7026] device pim6reg1 entered promiscuous mode [ 239.624058][ T30] audit: type=1400 audit(1756845351.853:143): avc: denied { create } for pid=7033 comm="syz.3.2334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 239.663416][ T7032] device wg2 entered promiscuous mode [ 239.733985][ T332] device veth0_macvtap left promiscuous mode [ 239.752397][ T332] bridge0: port 3(veth0_macvtap) entered disabled state [ 239.762857][ T332] device bridge_slave_1 left promiscuous mode [ 239.769109][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.777209][ T332] device bridge_slave_0 left promiscuous mode [ 239.783960][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.112170][ T7048] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.119513][ T7048] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.130434][ T7048] device bridge_slave_0 entered promiscuous mode [ 240.150845][ T7048] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.174566][ T7048] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.214510][ T7048] device bridge_slave_1 entered promiscuous mode [ 240.576646][ T7082] syz.3.2352[7082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.577046][ T7082] syz.3.2352[7082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.771735][ T7093] device veth1_macvtap left promiscuous mode [ 240.893764][ T7098] device veth1_macvtap entered promiscuous mode [ 240.926985][ T7098] device macsec0 entered promiscuous mode [ 240.972502][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.993248][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 241.080337][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 241.151517][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 241.198855][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.205968][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.264210][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.291727][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 241.301404][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.308510][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.317922][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 241.326716][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 241.335116][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 241.343784][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 241.351948][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 241.378233][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 241.407384][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 241.416681][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 241.424451][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 241.435534][ T7048] device veth0_vlan entered promiscuous mode [ 241.486643][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 241.501414][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 241.511544][ T30] audit: type=1400 audit(1756845353.733:144): avc: denied { create } for pid=7116 comm="syz.0.2363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 241.546672][ T7120] FAULT_INJECTION: forcing a failure. [ 241.546672][ T7120] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 241.564554][ T7048] device veth1_macvtap entered promiscuous mode [ 241.578805][ T7120] CPU: 0 PID: 7120 Comm: syz.1.2365 Not tainted syzkaller #0 [ 241.586229][ T7120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 241.596375][ T7120] Call Trace: [ 241.599703][ T7120] [ 241.602633][ T7120] __dump_stack+0x21/0x30 [ 241.607247][ T7120] dump_stack_lvl+0xee/0x150 [ 241.611883][ T7120] ? show_regs_print_info+0x20/0x20 [ 241.617186][ T7120] dump_stack+0x15/0x20 [ 241.621350][ T7120] should_fail+0x3c1/0x510 [ 241.625804][ T7120] should_fail_alloc_page+0x55/0x80 [ 241.631004][ T7120] prepare_alloc_pages+0x156/0x600 [ 241.636200][ T7120] ? __alloc_pages_bulk+0xab0/0xab0 [ 241.641485][ T7120] __alloc_pages+0x10a/0x440 [ 241.646208][ T7120] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 241.652479][ T7120] ? prep_new_page+0x110/0x110 [ 241.657329][ T7120] ? __kasan_check_write+0x14/0x20 [ 241.662446][ T7120] ? kasan_check_range+0x16a/0x290 [ 241.667566][ T7120] __get_free_pages+0x10/0x30 [ 241.672417][ T7120] kasan_populate_vmalloc_pte+0x29/0x120 [ 241.678136][ T7120] __apply_to_page_range+0x8b0/0xbf0 [ 241.683522][ T7120] ? kasan_populate_vmalloc+0x70/0x70 [ 241.689105][ T7120] ? kasan_populate_vmalloc+0x70/0x70 [ 241.694478][ T7120] apply_to_page_range+0x3b/0x50 [ 241.699418][ T7120] kasan_populate_vmalloc+0x60/0x70 [ 241.704641][ T7120] alloc_vmap_area+0x185c/0x1990 [ 241.709808][ T7120] ? vm_map_ram+0xa60/0xa60 [ 241.714316][ T7120] ? __get_vm_area_node+0x11d/0x350 [ 241.719511][ T7120] __get_vm_area_node+0x14e/0x350 [ 241.724626][ T7120] __vmalloc_node_range+0xdf/0xaf0 [ 241.729732][ T7120] ? array_map_alloc+0x27c/0x6d0 [ 241.734673][ T7120] ? security_capable+0x87/0xb0 [ 241.739520][ T7120] bpf_map_area_alloc+0xd5/0xe0 [ 241.744457][ T7120] ? array_map_alloc+0x27c/0x6d0 [ 241.749576][ T7120] array_map_alloc+0x27c/0x6d0 [ 241.754335][ T7120] ? asm_common_interrupt+0x1/0x40 [ 241.759533][ T7120] map_create+0x455/0x21b0 [ 241.763964][ T7120] __sys_bpf+0x2cf/0x730 [ 241.768300][ T7120] ? bpf_link_show_fdinfo+0x310/0x310 [ 241.773694][ T7120] ? debug_smp_processor_id+0x17/0x20 [ 241.779070][ T7120] __x64_sys_bpf+0x7c/0x90 [ 241.783480][ T7120] x64_sys_call+0x4b9/0x9a0 [ 241.788101][ T7120] do_syscall_64+0x4c/0xa0 [ 241.792512][ T7120] ? clear_bhb_loop+0x50/0xa0 [ 241.797204][ T7120] ? clear_bhb_loop+0x50/0xa0 [ 241.802017][ T7120] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 241.807918][ T7120] RIP: 0033:0x7fd91030bbe9 [ 241.812333][ T7120] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 241.832119][ T7120] RSP: 002b:00007fd90ed74038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 241.840549][ T7120] RAX: ffffffffffffffda RBX: 00007fd910542fa0 RCX: 00007fd91030bbe9 [ 241.848633][ T7120] RDX: 0000000000000048 RSI: 0000200000000040 RDI: 0000000000000000 [ 241.856615][ T7120] RBP: 00007fd90ed74090 R08: 0000000000000000 R09: 0000000000000000 [ 241.864632][ T7120] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 241.872812][ T7120] R13: 00007fd910543038 R14: 00007fd910542fa0 R15: 00007ffe3fca56f8 [ 241.880934][ T7120] [ 241.954736][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 241.964766][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 241.973433][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 241.982860][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 241.991534][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 242.190807][ T7134] device pim6reg1 entered promiscuous mode [ 242.346078][ T332] device bridge_slave_1 left promiscuous mode [ 242.354467][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.362610][ T332] device bridge_slave_0 left promiscuous mode [ 242.369039][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.378279][ T332] device veth1_macvtap left promiscuous mode [ 242.384558][ T332] device veth0_vlan left promiscuous mode [ 242.542545][ T7140] tap0: tun_chr_ioctl cmd 2147767521 [ 242.826215][ T7139] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.873840][ T7139] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.901711][ T7139] device bridge_slave_0 entered promiscuous mode [ 242.914743][ T7139] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.955341][ T7139] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.963589][ T7139] device bridge_slave_1 entered promiscuous mode [ 243.653931][ T7174] device pim6reg1 entered promiscuous mode [ 243.745702][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 243.753946][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 243.779008][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 243.794520][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 243.806436][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.813523][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 243.832987][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 243.841860][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 243.850400][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.857473][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 243.866894][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 243.884299][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 243.893787][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 243.901975][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 243.938185][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 243.946103][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 243.954885][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 243.967806][ T7139] device veth0_vlan entered promiscuous mode [ 243.979862][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 243.988171][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 244.011474][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 244.026317][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 244.040486][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 244.057577][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 244.074847][ T7139] device veth1_macvtap entered promiscuous mode [ 244.128599][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 244.147180][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 244.184761][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 244.212571][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 244.258076][ T7195] FAULT_INJECTION: forcing a failure. [ 244.258076][ T7195] name failslab, interval 1, probability 0, space 0, times 0 [ 244.275692][ T7195] CPU: 0 PID: 7195 Comm: syz.1.2388 Not tainted syzkaller #0 [ 244.283377][ T7195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 244.293849][ T7195] Call Trace: [ 244.297324][ T7195] [ 244.300442][ T7195] __dump_stack+0x21/0x30 [ 244.304814][ T7195] dump_stack_lvl+0xee/0x150 [ 244.309509][ T7195] ? show_regs_print_info+0x20/0x20 [ 244.314893][ T7195] dump_stack+0x15/0x20 [ 244.319062][ T7195] should_fail+0x3c1/0x510 [ 244.323493][ T7195] __should_failslab+0xa4/0xe0 [ 244.328348][ T7195] should_failslab+0x9/0x20 [ 244.332855][ T7195] slab_pre_alloc_hook+0x3b/0xe0 [ 244.337898][ T7195] ? __alloc_skb+0xe0/0x740 [ 244.342425][ T7195] kmem_cache_alloc+0x44/0x260 [ 244.347194][ T7195] __alloc_skb+0xe0/0x740 [ 244.351535][ T7195] alloc_skb_with_frags+0xa8/0x620 [ 244.356773][ T7195] ? memcpy+0x56/0x70 [ 244.360817][ T7195] sock_alloc_send_pskb+0x853/0x980 [ 244.366133][ T7195] ? sock_kzfree_s+0x60/0x60 [ 244.370742][ T7195] ? __kasan_check_write+0x14/0x20 [ 244.375864][ T7195] ? _raw_spin_lock+0x8e/0xe0 [ 244.380660][ T7195] ? _raw_spin_trylock_bh+0x130/0x130 [ 244.386052][ T7195] ? security_socket_getpeersec_dgram+0xaa/0xc0 [ 244.392305][ T7195] unix_dgram_sendmsg+0x5ea/0x1880 [ 244.398294][ T7195] ? stack_trace_save+0xe0/0xe0 [ 244.403156][ T7195] ? unix_dgram_poll+0x6b0/0x6b0 [ 244.408099][ T7195] ? security_socket_sendmsg+0x82/0xa0 [ 244.413656][ T7195] ? unix_dgram_poll+0x6b0/0x6b0 [ 244.418596][ T7195] ____sys_sendmsg+0x5a2/0x8c0 [ 244.423375][ T7195] ? __sys_sendmsg_sock+0x40/0x40 [ 244.428403][ T7195] ? kstrtouint_from_user+0x1a0/0x200 [ 244.433780][ T7195] ? import_iovec+0x7c/0xb0 [ 244.438292][ T7195] ___sys_sendmsg+0x1f0/0x260 [ 244.442974][ T7195] ? __sys_sendmsg+0x250/0x250 [ 244.447752][ T7195] ? __fdget+0x1a1/0x230 [ 244.452000][ T7195] __x64_sys_sendmsg+0x1e2/0x2a0 [ 244.456943][ T7195] ? ___sys_sendmsg+0x260/0x260 [ 244.461808][ T7195] ? ksys_write+0x1eb/0x240 [ 244.466327][ T7195] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 244.472505][ T7195] x64_sys_call+0x4b/0x9a0 [ 244.477027][ T7195] do_syscall_64+0x4c/0xa0 [ 244.481447][ T7195] ? clear_bhb_loop+0x50/0xa0 [ 244.486127][ T7195] ? clear_bhb_loop+0x50/0xa0 [ 244.490921][ T7195] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 244.496847][ T7195] RIP: 0033:0x7fd91030bbe9 [ 244.501309][ T7195] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 244.521180][ T7195] RSP: 002b:00007fd90ed74038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 244.529599][ T7195] RAX: ffffffffffffffda RBX: 00007fd910542fa0 RCX: 00007fd91030bbe9 [ 244.537583][ T7195] RDX: 0000000004040086 RSI: 0000200000000440 RDI: 0000000000000006 [ 244.545558][ T7195] RBP: 00007fd90ed74090 R08: 0000000000000000 R09: 0000000000000000 [ 244.553539][ T7195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 244.561702][ T7195] R13: 00007fd910543038 R14: 00007fd910542fa0 R15: 00007ffe3fca56f8 [ 244.569888][ T7195] [ 245.144560][ T7206] syz.3.2392[7206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.144627][ T7206] syz.3.2392[7206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.537155][ T7201] ÿÿÿÿÿÿ_“–ÿ’¯: renamed from vlan1 [ 246.382716][ T332] device bridge_slave_1 left promiscuous mode [ 246.391302][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.413170][ T332] device bridge_slave_0 left promiscuous mode [ 246.430129][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.452336][ T332] device veth1_macvtap left promiscuous mode [ 246.458479][ T332] device veth0_vlan left promiscuous mode [ 246.587460][ T7231] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.596808][ T7231] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.612187][ T7231] device bridge_slave_0 entered promiscuous mode [ 246.665481][ T7231] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.677107][ T7231] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.692374][ T7231] device bridge_slave_1 entered promiscuous mode [ 247.074874][ T7261] device pim6reg1 entered promiscuous mode [ 247.135648][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 247.146817][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 247.181648][ T7265] device pim6reg1 entered promiscuous mode [ 247.203675][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 247.238162][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.268213][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.275318][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.293925][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 247.302452][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.312581][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.319650][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.327659][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 247.337832][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 247.368316][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 247.393678][ T7277] device sit0 left promiscuous mode [ 247.426895][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 247.448403][ T7277] device sit0 entered promiscuous mode [ 247.467509][ T7231] device veth0_vlan entered promiscuous mode [ 247.484410][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 247.494329][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 247.516481][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 247.539630][ T7231] device veth1_macvtap entered promiscuous mode [ 247.557283][ T7283] device sit0 left promiscuous mode [ 247.612092][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 247.629493][ T7286] device sit0 entered promiscuous mode [ 247.656453][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 247.682006][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 248.121238][ T332] device bridge_slave_1 left promiscuous mode [ 248.127452][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.134950][ T332] device bridge_slave_0 left promiscuous mode [ 248.141260][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.148938][ T332] device veth1_macvtap left promiscuous mode [ 248.154987][ T332] device veth0_vlan left promiscuous mode [ 248.381834][ T30] audit: type=1400 audit(1756845360.603:145): avc: denied { create } for pid=7296 comm="syz.1.2420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 248.424054][ T7302] device wg2 left promiscuous mode [ 248.433834][ T7304] device pim6reg1 entered promiscuous mode [ 248.614360][ T7306] device wg2 entered promiscuous mode [ 248.982666][ T7307] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.009976][ T7307] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.042143][ T7307] device bridge_slave_0 entered promiscuous mode [ 249.071813][ T7323] device pim6reg1 entered promiscuous mode [ 249.089935][ T7307] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.105061][ T7307] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.129162][ T7307] device bridge_slave_1 entered promiscuous mode [ 249.305605][ T30] audit: type=1400 audit(1756845361.533:146): avc: denied { create } for pid=7331 comm="syz.3.2432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 249.327154][ T7330] device pim6reg1 entered promiscuous mode [ 249.377221][ T30] audit: type=1400 audit(1756845361.603:147): avc: denied { read } for pid=7333 comm="syz.0.2433" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 249.399865][ T30] audit: type=1400 audit(1756845361.603:148): avc: denied { open } for pid=7333 comm="syz.0.2433" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 249.513604][ T7339] device pim6reg1 entered promiscuous mode [ 249.672355][ T332] device bridge_slave_1 left promiscuous mode [ 249.680851][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.732563][ T332] device bridge_slave_0 left promiscuous mode [ 249.738803][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.783149][ T332] device veth1_macvtap left promiscuous mode [ 249.789465][ T332] device veth0_vlan left promiscuous mode [ 249.896947][ T7307] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.904021][ T7307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.911280][ T7307] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.918458][ T7307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.947157][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.954851][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.978912][ T30] audit: type=1400 audit(1756845362.193:149): avc: denied { create } for pid=7365 comm="syz.2.2442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 250.058371][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 250.066335][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 250.082820][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 250.099254][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 250.111129][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.118332][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.126269][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 250.135539][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.143924][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.151071][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.169732][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 250.178490][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 250.187565][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 250.198934][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 250.237914][ T7307] device veth0_vlan entered promiscuous mode [ 250.244637][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 250.255808][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 250.264770][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 250.273143][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 250.288425][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 250.317551][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 250.358587][ T7307] device veth1_macvtap entered promiscuous mode [ 250.617298][ T7372] device wg2 entered promiscuous mode [ 250.627027][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 250.637886][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 250.649201][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 250.694117][ T7378] device wg2 left promiscuous mode [ 250.761258][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 250.781718][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 250.800604][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 250.809621][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 250.844000][ T7383] device pim6reg1 entered promiscuous mode [ 251.579812][ T7398] device pim6reg1 entered promiscuous mode [ 251.871891][ T7402] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.879619][ T7402] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.888579][ T7402] device bridge_slave_0 entered promiscuous mode [ 251.996774][ T7402] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.004383][ T7402] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.012127][ T7402] device bridge_slave_1 entered promiscuous mode [ 252.662535][ T7435] device pim6reg1 entered promiscuous mode [ 252.674263][ T7437] device pim6reg1 entered promiscuous mode [ 252.743247][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 252.763562][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.801238][ T332] device bridge_slave_1 left promiscuous mode [ 252.814368][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.828501][ T332] device bridge_slave_0 left promiscuous mode [ 252.835647][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.845387][ T332] device veth1_macvtap left promiscuous mode [ 252.851535][ T332] device veth0_vlan left promiscuous mode [ 252.926107][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 252.935925][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.944429][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.951496][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.959314][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 252.967823][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.976123][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.983181][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.000901][ T7446] device sit0 left promiscuous mode [ 253.017174][ T7402] device veth0_vlan entered promiscuous mode [ 253.025947][ T7450] device sit0 entered promiscuous mode [ 253.038008][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 253.047380][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 253.056513][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 253.064726][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 253.073115][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 253.081101][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 253.089726][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 253.098450][ T7451] device pim6reg1 entered promiscuous mode [ 253.104755][ T7451] FAULT_INJECTION: forcing a failure. [ 253.104755][ T7451] name failslab, interval 1, probability 0, space 0, times 0 [ 253.117988][ T7451] CPU: 1 PID: 7451 Comm: syz.0.2469 Not tainted syzkaller #0 [ 253.125383][ T7451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 253.135552][ T7451] Call Trace: [ 253.138912][ T7451] [ 253.141954][ T7451] __dump_stack+0x21/0x30 [ 253.146298][ T7451] dump_stack_lvl+0xee/0x150 [ 253.150982][ T7451] ? show_regs_print_info+0x20/0x20 [ 253.156199][ T7451] ? __kasan_check_write+0x14/0x20 [ 253.161512][ T7451] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 253.167080][ T7451] ? _raw_spin_lock+0xe0/0xe0 [ 253.171765][ T7451] ? kasan_quarantine_put+0x34/0x190 [ 253.177148][ T7451] dump_stack+0x15/0x20 [ 253.181308][ T7451] should_fail+0x3c1/0x510 [ 253.185744][ T7451] __should_failslab+0xa4/0xe0 [ 253.190537][ T7451] should_failslab+0x9/0x20 [ 253.195136][ T7451] slab_pre_alloc_hook+0x3b/0xe0 [ 253.200356][ T7451] kmem_cache_alloc_trace+0x48/0x270 [ 253.205651][ T7451] ? ____ip_mc_inc_group+0x1ab/0x860 [ 253.210967][ T7451] ____ip_mc_inc_group+0x1ab/0x860 [ 253.216116][ T7451] ip_mc_up+0x112/0x1f0 [ 253.220374][ T7451] inetdev_event+0xc5d/0x10a0 [ 253.225065][ T7451] ? devinet_exit_net+0x220/0x220 [ 253.230132][ T7451] ? up_read+0x56/0x1d0 [ 253.234385][ T7451] raw_notifier_call_chain+0x90/0x100 [ 253.239934][ T7451] __dev_notify_flags+0x28f/0x500 [ 253.245257][ T7451] ? __dev_change_flags+0x6a0/0x6a0 [ 253.250564][ T7451] ? __dev_change_flags+0x510/0x6a0 [ 253.255941][ T7451] ? dev_get_flags+0x1e0/0x1e0 [ 253.260695][ T7451] ? __request_module+0x3dc/0x8a0 [ 253.265738][ T7451] dev_change_flags+0xe8/0x1a0 [ 253.270523][ T7451] dev_ifsioc+0x147/0xe70 [ 253.274867][ T7451] ? dev_ioctl+0xd10/0xd10 [ 253.279481][ T7451] ? __mutex_lock_slowpath+0xe/0x10 [ 253.284825][ T7451] ? mutex_lock+0x100/0x1a0 [ 253.289339][ T7451] ? wait_for_completion_killable_timeout+0x10/0x10 [ 253.295925][ T7451] ? security_capable+0x87/0xb0 [ 253.300890][ T7451] dev_ioctl+0x560/0xd10 [ 253.305141][ T7451] sock_do_ioctl+0x22e/0x300 [ 253.309830][ T7451] ? sock_show_fdinfo+0xa0/0xa0 [ 253.314679][ T7451] ? selinux_file_ioctl+0x377/0x480 [ 253.319893][ T7451] sock_ioctl+0x4bc/0x6b0 [ 253.324220][ T7451] ? sock_poll+0x3d0/0x3d0 [ 253.328809][ T7451] ? __fget_files+0x2c4/0x320 [ 253.333576][ T7451] ? security_file_ioctl+0x84/0xa0 [ 253.338971][ T7451] ? sock_poll+0x3d0/0x3d0 [ 253.343384][ T7451] __se_sys_ioctl+0x121/0x1a0 [ 253.348149][ T7451] __x64_sys_ioctl+0x7b/0x90 [ 253.352821][ T7451] x64_sys_call+0x2f/0x9a0 [ 253.357234][ T7451] do_syscall_64+0x4c/0xa0 [ 253.361654][ T7451] ? clear_bhb_loop+0x50/0xa0 [ 253.366327][ T7451] ? clear_bhb_loop+0x50/0xa0 [ 253.371006][ T7451] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 253.376907][ T7451] RIP: 0033:0x7f740e42abe9 [ 253.381328][ T7451] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 253.400954][ T7451] RSP: 002b:00007f740ce72038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 253.409383][ T7451] RAX: ffffffffffffffda RBX: 00007f740e662090 RCX: 00007f740e42abe9 [ 253.417368][ T7451] RDX: 0000200000000380 RSI: 0000000000008914 RDI: 0000000000000008 [ 253.425354][ T7451] RBP: 00007f740ce72090 R08: 0000000000000000 R09: 0000000000000000 [ 253.433566][ T7451] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 253.441778][ T7451] R13: 00007f740e662128 R14: 00007f740e662090 R15: 00007ffe322c3df8 [ 253.449952][ T7451] [ 253.539143][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 253.548132][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 253.583011][ T7402] device veth1_macvtap entered promiscuous mode [ 253.675538][ T7468] FAULT_INJECTION: forcing a failure. [ 253.675538][ T7468] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 253.689234][ T7468] CPU: 0 PID: 7468 Comm: syz.3.2476 Not tainted syzkaller #0 [ 253.696726][ T7468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 253.706801][ T7468] Call Trace: [ 253.710215][ T7468] [ 253.713156][ T7468] __dump_stack+0x21/0x30 [ 253.717502][ T7468] dump_stack_lvl+0xee/0x150 [ 253.722326][ T7468] ? show_regs_print_info+0x20/0x20 [ 253.727631][ T7468] ? _raw_spin_lock+0x8e/0xe0 [ 253.732319][ T7468] ? _raw_spin_trylock_bh+0x130/0x130 [ 253.737711][ T7468] dump_stack+0x15/0x20 [ 253.742195][ T7468] should_fail+0x3c1/0x510 [ 253.746794][ T7468] should_fail_alloc_page+0x55/0x80 [ 253.752348][ T7468] prepare_alloc_pages+0x156/0x600 [ 253.757492][ T7468] ? __alloc_pages_bulk+0xab0/0xab0 [ 253.762968][ T7468] ? fault_around_bytes_set+0xc0/0xc0 [ 253.768364][ T7468] __alloc_pages+0x10a/0x440 [ 253.772968][ T7468] ? prep_new_page+0x110/0x110 [ 253.777802][ T7468] shmem_alloc_and_acct_page+0x42b/0x870 [ 253.783454][ T7468] ? shmem_swapin_page+0x14c0/0x14c0 [ 253.788752][ T7468] ? xas_load+0x2ea/0x300 [ 253.793087][ T7468] ? pagecache_get_page+0xcbd/0xda0 [ 253.798293][ T7468] ? page_cache_prev_miss+0x270/0x270 [ 253.803673][ T7468] shmem_getpage_gfp+0xfe5/0x2310 [ 253.808722][ T7468] shmem_write_begin+0xce/0x1b0 [ 253.813584][ T7468] generic_perform_write+0x2ad/0x670 [ 253.818887][ T7468] ? grab_cache_page_write_begin+0xb0/0xb0 [ 253.824697][ T7468] ? file_remove_privs+0x590/0x590 [ 253.829917][ T7468] ? rwsem_write_trylock+0x130/0x300 [ 253.835292][ T7468] ? _raw_spin_lock+0x8e/0xe0 [ 253.839984][ T7468] ? clear_nonspinnable+0x60/0x60 [ 253.845015][ T7468] ? avc_policy_seqno+0x1b/0x70 [ 253.849875][ T7468] __generic_file_write_iter+0x268/0x480 [ 253.855514][ T7468] generic_file_write_iter+0xa9/0x1d0 [ 253.861154][ T7468] vfs_write+0x802/0xf70 [ 253.865403][ T7468] ? file_end_write+0x1b0/0x1b0 [ 253.870258][ T7468] ? wait_for_completion_killable_timeout+0x10/0x10 [ 253.877028][ T7468] ? __fget_files+0x2c4/0x320 [ 253.881803][ T7468] ? __fdget_pos+0x2d2/0x380 [ 253.886576][ T7468] ? ksys_write+0x71/0x240 [ 253.891088][ T7468] ksys_write+0x140/0x240 [ 253.895424][ T7468] ? __ia32_sys_read+0x90/0x90 [ 253.900190][ T7468] ? debug_smp_processor_id+0x17/0x20 [ 253.905660][ T7468] __x64_sys_write+0x7b/0x90 [ 253.910356][ T7468] x64_sys_call+0x8ef/0x9a0 [ 253.914876][ T7468] do_syscall_64+0x4c/0xa0 [ 253.919497][ T7468] ? clear_bhb_loop+0x50/0xa0 [ 253.924352][ T7468] ? clear_bhb_loop+0x50/0xa0 [ 253.929220][ T7468] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 253.935146][ T7468] RIP: 0033:0x7f958fd0ebe9 [ 253.939760][ T7468] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 253.959468][ T7468] RSP: 002b:00007f958e777038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 253.968011][ T7468] RAX: ffffffffffffffda RBX: 00007f958ff45fa0 RCX: 00007f958fd0ebe9 [ 253.976082][ T7468] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000007 [ 253.984259][ T7468] RBP: 00007f958e777090 R08: 0000000000000000 R09: 0000000000000000 [ 253.992327][ T7468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 254.000387][ T7468] R13: 00007f958ff46038 R14: 00007f958ff45fa0 R15: 00007ffc51190288 [ 254.008542][ T7468] [ 254.077415][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 254.109565][ T7473] device pim6reg1 entered promiscuous mode [ 254.159345][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 254.222844][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 254.290019][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 254.346056][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 255.220897][ T7497] device pim6reg1 entered promiscuous mode [ 255.317335][ T7504] device pim6reg1 entered promiscuous mode [ 255.443642][ T7510] device pim6reg1 entered promiscuous mode [ 255.450669][ T7500] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.466919][ T7500] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.502493][ T7500] device bridge_slave_0 entered promiscuous mode [ 255.560673][ T7500] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.571608][ T7500] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.579466][ T7500] device bridge_slave_1 entered promiscuous mode [ 255.661298][ T7522] bond_slave_1: mtu less than device minimum [ 255.709969][ T7524] bond_slave_1: mtu less than device minimum [ 255.938622][ T7500] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.945771][ T7500] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.953095][ T7500] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.960120][ T7500] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.086187][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.095235][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.106907][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.201299][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 256.220448][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.227563][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.236266][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 256.244854][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.251921][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.286754][ T332] device bridge_slave_1 left promiscuous mode [ 256.295368][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.316476][ T332] device bridge_slave_0 left promiscuous mode [ 256.327293][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.338733][ T332] device veth1_macvtap left promiscuous mode [ 256.353397][ T332] device veth0_vlan left promiscuous mode [ 256.431779][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 256.440528][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 256.448686][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 256.456908][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 256.494200][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 256.503450][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 256.511725][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 256.519800][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 256.528112][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 256.535793][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 256.555244][ T7500] device veth0_vlan entered promiscuous mode [ 256.567442][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 256.576141][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 256.593929][ T7500] device veth1_macvtap entered promiscuous mode [ 256.612709][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 256.621053][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 256.630585][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 256.644701][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 256.658627][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 256.708092][ T7585] syzkaller0: refused to change device tx_queue_len [ 257.741080][ T7604] device pim6reg1 entered promiscuous mode [ 258.053837][ T7610] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.061114][ T7610] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.069169][ T7610] device bridge_slave_0 entered promiscuous mode [ 258.092523][ T7610] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.102328][ T7610] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.110205][ T7610] device bridge_slave_1 entered promiscuous mode [ 258.140522][ T332] device bridge_slave_1 left promiscuous mode [ 258.146933][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.155145][ T332] device bridge_slave_0 left promiscuous mode [ 258.162518][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.171090][ T332] device veth1_macvtap left promiscuous mode [ 258.177509][ T332] device veth0_vlan left promiscuous mode [ 258.379086][ T7654] FAULT_INJECTION: forcing a failure. [ 258.379086][ T7654] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 258.392653][ T7654] CPU: 0 PID: 7654 Comm: syz.2.2539 Not tainted syzkaller #0 [ 258.400069][ T7654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 258.410248][ T7654] Call Trace: [ 258.413567][ T7654] [ 258.416526][ T7654] __dump_stack+0x21/0x30 [ 258.420976][ T7654] dump_stack_lvl+0xee/0x150 [ 258.425569][ T7654] ? show_regs_print_info+0x20/0x20 [ 258.430773][ T7654] dump_stack+0x15/0x20 [ 258.434953][ T7654] should_fail+0x3c1/0x510 [ 258.439382][ T7654] should_fail_alloc_page+0x55/0x80 [ 258.444605][ T7654] prepare_alloc_pages+0x156/0x600 [ 258.449732][ T7654] ? __alloc_pages_bulk+0xab0/0xab0 [ 258.454932][ T7654] ? __alloc_pages_bulk+0x47f/0xab0 [ 258.460232][ T7654] __alloc_pages+0x10a/0x440 [ 258.464981][ T7654] ? prep_new_page+0x110/0x110 [ 258.469749][ T7654] ? __vmalloc_node_range+0x375/0xaf0 [ 258.475119][ T7654] __vmalloc_node_range+0x505/0xaf0 [ 258.480315][ T7654] bpf_map_area_alloc+0xd5/0xe0 [ 258.485162][ T7654] ? htab_map_alloc+0xb29/0x14f0 [ 258.490336][ T7654] htab_map_alloc+0xb29/0x14f0 [ 258.495124][ T7654] map_create+0x455/0x21b0 [ 258.499560][ T7654] __sys_bpf+0x2cf/0x730 [ 258.503862][ T7654] ? bpf_link_show_fdinfo+0x310/0x310 [ 258.509263][ T7654] ? debug_smp_processor_id+0x17/0x20 [ 258.514648][ T7654] __x64_sys_bpf+0x7c/0x90 [ 258.519148][ T7654] x64_sys_call+0x4b9/0x9a0 [ 258.523657][ T7654] do_syscall_64+0x4c/0xa0 [ 258.528089][ T7654] ? clear_bhb_loop+0x50/0xa0 [ 258.532761][ T7654] ? clear_bhb_loop+0x50/0xa0 [ 258.537433][ T7654] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 258.543411][ T7654] RIP: 0033:0x7f57dfb27be9 [ 258.547822][ T7654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 258.567713][ T7654] RSP: 002b:00007f57de590038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 258.576127][ T7654] RAX: ffffffffffffffda RBX: 00007f57dfd5efa0 RCX: 00007f57dfb27be9 [ 258.584204][ T7654] RDX: 0000000000000050 RSI: 0000200000000640 RDI: 0000000000000000 [ 258.592263][ T7654] RBP: 00007f57de590090 R08: 0000000000000000 R09: 0000000000000000 [ 258.600317][ T7654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 258.608379][ T7654] R13: 00007f57dfd5f038 R14: 00007f57dfd5efa0 R15: 00007ffe0cfdeea8 [ 258.616361][ T7654] [ 258.620001][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 258.628206][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 258.643718][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 258.652546][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 258.661066][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.668354][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.676244][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 258.684941][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 258.693472][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.700627][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.721280][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 258.730113][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 258.739064][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 258.756817][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 258.782701][ T7610] device veth0_vlan entered promiscuous mode [ 258.789293][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 258.798735][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 258.806565][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 258.827622][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 258.844925][ T7610] device veth1_macvtap entered promiscuous mode [ 258.862469][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 258.878186][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 260.235440][ T7691] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.242711][ T7691] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.250491][ T7691] device bridge_slave_0 entered promiscuous mode [ 260.257831][ T7701] device sit0 left promiscuous mode [ 260.367678][ T7691] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.375276][ T7691] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.383276][ T7691] device bridge_slave_1 entered promiscuous mode [ 260.617992][ T332] device bridge_slave_1 left promiscuous mode [ 260.624939][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.633541][ T332] device bridge_slave_0 left promiscuous mode [ 260.639894][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.664834][ T332] device veth1_macvtap left promiscuous mode [ 260.671030][ T332] device veth0_vlan left promiscuous mode [ 260.979628][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 260.988749][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 261.043605][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 261.072019][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 261.114359][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.121449][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 261.148330][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 261.159526][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 261.168114][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.175196][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 261.227011][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 261.236292][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 261.244709][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 261.260502][ T7691] device veth0_vlan entered promiscuous mode [ 261.268390][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 261.277021][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 261.291701][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 261.300729][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 261.328118][ T7691] device veth1_macvtap entered promiscuous mode [ 261.369816][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 261.400132][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 261.431578][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 261.498127][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 261.520186][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 261.735104][ T7740] device pim6reg1 entered promiscuous mode [ 262.766510][ T7746] device pim6reg1 entered promiscuous mode [ 263.211930][ T332] device bridge_slave_1 left promiscuous mode [ 263.224944][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.503609][ T332] device bridge_slave_0 left promiscuous mode [ 263.509896][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.536746][ T332] device veth1_macvtap left promiscuous mode [ 263.545138][ T332] device veth0_vlan left promiscuous mode [ 263.946322][ T7770] device wg2 left promiscuous mode [ 264.240797][ T7753] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.261190][ T7753] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.275506][ T7753] device bridge_slave_0 entered promiscuous mode [ 264.325566][ T7753] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.333356][ T7753] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.341015][ T7753] device bridge_slave_1 entered promiscuous mode [ 264.348357][ T7789] device pim6reg1 entered promiscuous mode [ 264.456931][ T7753] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.464063][ T7753] bridge0: port 2(bridge_slave_1) entered forwarding state [ 264.471660][ T7753] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.479134][ T7753] bridge0: port 1(bridge_slave_0) entered forwarding state [ 264.529828][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 264.537973][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.545572][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.577058][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 264.628321][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.635423][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 264.700301][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 264.725245][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.732359][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 264.768182][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 264.798237][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 264.883216][ T7753] device veth0_vlan entered promiscuous mode [ 264.922589][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 264.931165][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 264.941809][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 264.949606][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 264.965537][ T7753] device veth1_macvtap entered promiscuous mode [ 264.997163][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 265.017585][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 265.040681][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 265.055962][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 265.071285][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 265.106043][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 265.114559][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 266.481839][ T332] device bridge_slave_1 left promiscuous mode [ 266.494038][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.544063][ T332] device bridge_slave_0 left promiscuous mode [ 266.579518][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.615811][ T332] device veth1_macvtap left promiscuous mode [ 266.654867][ T332] device veth0_vlan left promiscuous mode [ 266.741187][ T7831] device pim6reg1 entered promiscuous mode [ 266.968009][ T7833] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.006618][ T7833] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.028792][ T7833] device bridge_slave_0 entered promiscuous mode [ 267.110536][ T7833] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.124911][ T7833] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.144482][ T7833] device bridge_slave_1 entered promiscuous mode [ 267.929713][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 267.941783][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 268.008438][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 268.027824][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 268.052976][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.060104][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.102345][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 268.130875][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 268.142756][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.150054][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 268.218171][ T7874] device wg2 entered promiscuous mode [ 268.264299][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 268.274578][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 268.289892][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 268.335290][ T7878] device pim6reg1 entered promiscuous mode [ 268.349082][ T7833] device veth0_vlan entered promiscuous mode [ 268.364969][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 268.380252][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 268.404224][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 268.412884][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 268.441839][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 268.452018][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 268.487248][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 268.501143][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 268.518023][ T7833] device veth1_macvtap entered promiscuous mode [ 268.530968][ T7882] device pim6reg1 entered promiscuous mode [ 268.558594][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 268.566592][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 268.575069][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 268.584186][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 268.593751][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 268.636223][ T7884] device pim6reg1 entered promiscuous mode [ 268.776368][ T7887] device wg2 left promiscuous mode [ 270.434522][ T7906] device wg2 entered promiscuous mode [ 270.704983][ T7904] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.712072][ T7904] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.740229][ T7904] device bridge_slave_0 entered promiscuous mode [ 270.807942][ T7904] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.815330][ T7904] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.822923][ T7904] device bridge_slave_1 entered promiscuous mode [ 270.839806][ T7918] device pim6reg1 entered promiscuous mode [ 270.862342][ T332] device bridge_slave_1 left promiscuous mode [ 270.868628][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.876345][ T332] device bridge_slave_0 left promiscuous mode [ 270.883002][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.892948][ T332] device veth1_macvtap left promiscuous mode [ 270.899039][ T332] device veth0_vlan left promiscuous mode [ 270.973876][ T7921] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 270.979810][ T7921] syzkaller0: persist disabled [ 271.039388][ T7904] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.046464][ T7904] bridge0: port 2(bridge_slave_1) entered forwarding state [ 271.053857][ T7904] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.060938][ T7904] bridge0: port 1(bridge_slave_0) entered forwarding state [ 271.102929][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 271.111050][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.119874][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.137294][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 271.145696][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.152769][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 271.160234][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 271.168584][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.175632][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 271.182964][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 271.191004][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 271.227239][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 271.237781][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 271.246802][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 271.254251][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 271.262949][ T7904] device veth0_vlan entered promiscuous mode [ 271.275402][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 271.290099][ T7904] device veth1_macvtap entered promiscuous mode [ 271.306893][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 271.320400][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 271.358422][ T7944] FAULT_INJECTION: forcing a failure. [ 271.358422][ T7944] name failslab, interval 1, probability 0, space 0, times 0 [ 271.371915][ T7944] CPU: 0 PID: 7944 Comm: syz.1.2628 Not tainted syzkaller #0 [ 271.379411][ T7944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 271.389467][ T7944] Call Trace: [ 271.392751][ T7944] [ 271.395665][ T7944] __dump_stack+0x21/0x30 [ 271.399982][ T7944] dump_stack_lvl+0xee/0x150 [ 271.404554][ T7944] ? show_regs_print_info+0x20/0x20 [ 271.409763][ T7944] ? avc_denied+0x1b0/0x1b0 [ 271.414261][ T7944] dump_stack+0x15/0x20 [ 271.418487][ T7944] should_fail+0x3c1/0x510 [ 271.422889][ T7944] __should_failslab+0xa4/0xe0 [ 271.427636][ T7944] should_failslab+0x9/0x20 [ 271.432219][ T7944] slab_pre_alloc_hook+0x3b/0xe0 [ 271.437151][ T7944] ? new_inode_pseudo+0x7a/0x210 [ 271.442086][ T7944] kmem_cache_alloc+0x44/0x260 [ 271.446936][ T7944] new_inode_pseudo+0x7a/0x210 [ 271.451718][ T7944] __ns_get_path+0x15c/0x470 [ 271.456316][ T7944] ns_get_path+0x54/0x90 [ 271.460551][ T7944] proc_ns_get_link+0xf3/0x200 [ 271.465299][ T7944] ? proc_ns_instantiate+0xf0/0xf0 [ 271.470520][ T7944] ? security_inode_follow_link+0xc4/0x110 [ 271.476521][ T7944] ? proc_ns_instantiate+0xf0/0xf0 [ 271.481809][ T7944] pick_link+0x6d4/0xe00 [ 271.486213][ T7944] step_into+0xaec/0xd10 [ 271.490527][ T7944] ? set_root+0x400/0x400 [ 271.494839][ T7944] ? d_splice_alias+0x111/0x390 [ 271.499772][ T7944] path_openat+0x1629/0x2f10 [ 271.504344][ T7944] ? do_filp_open+0x3e0/0x3e0 [ 271.509017][ T7944] ? memset_erms+0xb/0x10 [ 271.513445][ T7944] do_filp_open+0x1b3/0x3e0 [ 271.517952][ T7944] ? vfs_tmpfile+0x2d0/0x2d0 [ 271.522527][ T7944] do_sys_openat2+0x14c/0x7b0 [ 271.527297][ T7944] ? irqentry_exit+0x37/0x40 [ 271.531887][ T7944] ? do_sys_open+0xe0/0xe0 [ 271.536324][ T7944] ? __sanitizer_cov_trace_const_cmp8+0x1/0x80 [ 271.542478][ T7944] __x64_sys_openat+0x136/0x160 [ 271.547319][ T7944] x64_sys_call+0x219/0x9a0 [ 271.551817][ T7944] do_syscall_64+0x4c/0xa0 [ 271.556348][ T7944] ? clear_bhb_loop+0x50/0xa0 [ 271.561018][ T7944] ? clear_bhb_loop+0x50/0xa0 [ 271.565694][ T7944] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 271.571578][ T7944] RIP: 0033:0x7fd91030a550 [ 271.575975][ T7944] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 271.595562][ T7944] RSP: 002b:00007fd90ed73f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 271.604309][ T7944] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007fd91030a550 [ 271.612388][ T7944] RDX: 0000000000000002 RSI: 00007fd90ed73fa0 RDI: 00000000ffffff9c [ 271.620436][ T7944] RBP: 00007fd90ed73fa0 R08: 0000000000000000 R09: 00007fd90ed73cd4 [ 271.628485][ T7944] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 271.636468][ T7944] R13: 00007fd910543038 R14: 00007fd910542fa0 R15: 00007ffe3fca56f8 [ 271.644503][ T7944] [ 273.155422][ T7957] device wg2 entered promiscuous mode [ 273.270737][ T7958] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.283421][ T7958] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.291518][ T7958] device bridge_slave_0 entered promiscuous mode [ 273.347385][ T7958] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.354642][ T7958] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.362734][ T7958] device bridge_slave_1 entered promiscuous mode [ 273.449567][ T332] device bridge_slave_1 left promiscuous mode [ 273.456930][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.469048][ T332] device bridge_slave_0 left promiscuous mode [ 273.479311][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.494760][ T332] device veth1_macvtap left promiscuous mode [ 273.505216][ T332] device veth0_vlan left promiscuous mode [ 273.672497][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 273.682964][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 273.712692][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 273.732163][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 273.765591][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.772699][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 273.780410][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 273.811860][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 273.834073][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 273.846479][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.853572][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 273.903615][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 273.947762][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 273.978899][ T7958] device veth0_vlan entered promiscuous mode [ 273.991602][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 274.000476][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 274.009526][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 274.017650][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 274.069644][ T7958] device veth1_macvtap entered promiscuous mode [ 274.080824][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 274.155053][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 274.194014][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 276.031578][ T332] device bridge_slave_1 left promiscuous mode [ 276.040284][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.062895][ T332] device bridge_slave_0 left promiscuous mode [ 276.084643][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.099030][ T332] device veth1_macvtap left promiscuous mode [ 276.106869][ T332] device veth0_vlan left promiscuous mode [ 276.287917][ T30] audit: type=1400 audit(1756845388.513:150): avc: denied { create } for pid=8039 comm="syz.1.2659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 276.313759][ T8040] device sit0 left promiscuous mode [ 276.333510][ T8042] device sit0 entered promiscuous mode [ 276.435964][ T8025] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.445390][ T8025] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.465991][ T8025] device bridge_slave_0 entered promiscuous mode [ 276.550139][ T8025] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.557461][ T8025] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.565125][ T8025] device bridge_slave_1 entered promiscuous mode [ 276.608103][ T8057] device pim6reg1 entered promiscuous mode [ 276.640356][ T8059] device pim6reg1 entered promiscuous mode [ 276.972944][ T8070] device sit0 entered promiscuous mode [ 277.031422][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 277.040634][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 277.088522][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 277.111389][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 277.140264][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.147458][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 277.202642][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 277.233745][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 277.257073][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.264410][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 277.276879][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 277.285216][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 277.293640][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 277.467944][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 277.489000][ T8025] device veth0_vlan entered promiscuous mode [ 277.539280][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 277.550048][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 277.564270][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 277.584981][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 277.596782][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 277.652687][ T8025] device veth1_macvtap entered promiscuous mode [ 277.690603][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 277.700600][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 277.719122][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 277.811127][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 277.830812][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 279.043578][ T332] device bridge_slave_1 left promiscuous mode [ 279.049780][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.057358][ T332] device bridge_slave_0 left promiscuous mode [ 279.063618][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.071419][ T332] device veth1_macvtap left promiscuous mode [ 279.077459][ T332] device veth0_vlan left promiscuous mode [ 280.014810][ T8117] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.021883][ T8117] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.032613][ T8117] device bridge_slave_0 entered promiscuous mode [ 280.039679][ T8117] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.047396][ T8117] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.055302][ T8117] device bridge_slave_1 entered promiscuous mode [ 280.085733][ T8124] device sit0 left promiscuous mode [ 280.101337][ T8124] device sit0 entered promiscuous mode [ 280.128623][ T8109] device wg2 left promiscuous mode [ 280.223496][ T8128] device wg2 left promiscuous mode [ 280.442006][ T8128] device wg2 entered promiscuous mode [ 280.685732][ T8117] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.692859][ T8117] bridge0: port 2(bridge_slave_1) entered forwarding state [ 280.700160][ T8117] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.707237][ T8117] bridge0: port 1(bridge_slave_0) entered forwarding state [ 280.842079][ T8152] device pim6reg1 entered promiscuous mode [ 280.888241][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 280.897049][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.914726][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.944367][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 280.957431][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 280.974274][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.981462][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 281.042514][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 281.050931][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 281.069641][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.076786][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 281.094592][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 281.103123][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 281.112769][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 281.122094][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 281.166316][ T8165] device sit0 left promiscuous mode [ 281.193085][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 281.201599][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 281.213733][ T8167] device sit0 entered promiscuous mode [ 281.237589][ T8117] device veth0_vlan entered promiscuous mode [ 281.293577][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 281.319018][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 281.606081][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 281.616142][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 281.623954][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 281.632576][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 281.643186][ T8117] device veth1_macvtap entered promiscuous mode [ 281.702709][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 281.711668][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 281.724545][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 281.770109][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 281.787492][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 282.724765][ T8] device bridge_slave_1 left promiscuous mode [ 282.731035][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.746041][ T8] device bridge_slave_0 left promiscuous mode [ 282.755476][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.768689][ T8] device veth1_macvtap left promiscuous mode [ 282.774884][ T8] device veth0_vlan left promiscuous mode [ 283.693833][ T8203] device wg2 entered promiscuous mode [ 283.713447][ T8206] device pim6reg1 entered promiscuous mode [ 283.732817][ T8208] device sit0 left promiscuous mode [ 283.773605][ T8208] device sit0 entered promiscuous mode [ 284.121136][ T8213] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.135753][ T8213] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.168545][ T8213] device bridge_slave_0 entered promiscuous mode [ 284.255445][ T8213] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.262794][ T8213] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.270416][ T8213] device bridge_slave_1 entered promiscuous mode [ 284.701423][ T8256] device wg2 left promiscuous mode [ 284.762788][ T8258] device pim6reg1 entered promiscuous mode [ 285.021621][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 285.039635][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 285.098905][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 285.134639][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 285.161000][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.168130][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 285.181231][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 285.190254][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 285.198981][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.206054][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 285.233158][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 285.310606][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 285.335430][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 285.352558][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 285.430373][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 285.438887][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 285.451998][ T8213] device veth0_vlan entered promiscuous mode [ 285.458891][ T8279] device pim6reg1 entered promiscuous mode [ 285.478321][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 285.487510][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 285.530573][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 285.553418][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 285.580582][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 285.589145][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 285.598463][ T8213] device veth1_macvtap entered promiscuous mode [ 285.715014][ T8289] device wg2 left promiscuous mode [ 285.848142][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 285.856150][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 285.864885][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 285.900354][ T8289] device wg2 entered promiscuous mode [ 285.906608][ T8294] device veth0_vlan left promiscuous mode [ 285.914128][ T8294] device veth0_vlan entered promiscuous mode [ 285.967818][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 285.979901][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 285.988264][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 285.996269][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 286.005437][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 286.157374][ T8296] device pim6reg1 entered promiscuous mode [ 287.900420][ T8] device bridge_slave_1 left promiscuous mode [ 287.933402][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.993555][ T8] device bridge_slave_0 left promiscuous mode [ 287.999926][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.082447][ T8] device veth1_macvtap left promiscuous mode [ 288.101293][ T8] device veth0_vlan left promiscuous mode [ 288.246046][ T8316] €Â0: renamed from pim6reg1 [ 288.251812][ T8319] device pim6reg1 entered promiscuous mode [ 288.258266][ T8321] device sit0 left promiscuous mode [ 288.268537][ T8324] device sit0 entered promiscuous mode [ 288.460238][ T8335] device pim6reg1 entered promiscuous mode [ 288.631862][ T8315] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.645864][ T8315] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.661714][ T8315] device bridge_slave_0 entered promiscuous mode [ 288.698743][ T8315] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.705937][ T8315] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.713744][ T8315] device bridge_slave_1 entered promiscuous mode [ 289.055256][ T8349] device wg2 entered promiscuous mode [ 289.063631][ T8361] device sit0 left promiscuous mode [ 289.094194][ T8361] device sit0 entered promiscuous mode [ 289.123613][ T8315] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.130733][ T8315] bridge0: port 2(bridge_slave_1) entered forwarding state [ 289.138180][ T8315] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.145275][ T8315] bridge0: port 1(bridge_slave_0) entered forwarding state [ 289.161590][ T8373] device sit0 left promiscuous mode [ 289.174340][ T8370] device pim6reg1 entered promiscuous mode [ 289.264764][ T2396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 289.757389][ T2396] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.766279][ T2396] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.777962][ T8373] device sit0 entered promiscuous mode [ 289.879593][ T8377] device wg2 left promiscuous mode [ 289.900014][ T2396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 289.914648][ T2396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 289.924750][ T2396] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.931853][ T2396] bridge0: port 1(bridge_slave_0) entered forwarding state [ 289.942933][ T8378] device wg2 left promiscuous mode [ 289.961508][ T2396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 290.006504][ T2396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 290.055427][ T2396] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.062624][ T2396] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.142670][ T8393] device macsec0 left promiscuous mode [ 290.282214][ T2396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 290.295405][ T2396] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 290.304279][ T2396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 290.312628][ T2396] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 290.352451][ T8400] device sit0 left promiscuous mode [ 290.397364][ T2396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 290.408551][ T2396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 290.418000][ T8401] device sit0 entered promiscuous mode [ 290.562600][ T2396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 290.584376][ T2396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 290.622858][ T2396] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 290.653809][ T2396] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 290.674299][ T8408] syz.3.2774[8408] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.674391][ T8408] syz.3.2774[8408] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.736196][ T8315] device veth0_vlan entered promiscuous mode [ 290.854576][ T2396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 290.883167][ T2396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 290.903917][ T8315] device veth1_macvtap entered promiscuous mode [ 290.983185][ T2396] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 291.011174][ T2396] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 291.061842][ T2396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 291.110962][ T2396] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 291.126080][ T2396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 291.199263][ T8420] FAULT_INJECTION: forcing a failure. [ 291.199263][ T8420] name failslab, interval 1, probability 0, space 0, times 0 [ 291.216122][ T8420] CPU: 1 PID: 8420 Comm: syz.2.2779 Not tainted syzkaller #0 [ 291.223889][ T8420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 291.234051][ T8420] Call Trace: [ 291.237344][ T8420] [ 291.240286][ T8420] __dump_stack+0x21/0x30 [ 291.244658][ T8420] dump_stack_lvl+0xee/0x150 [ 291.249345][ T8420] ? show_regs_print_info+0x20/0x20 [ 291.254644][ T8420] dump_stack+0x15/0x20 [ 291.258897][ T8420] should_fail+0x3c1/0x510 [ 291.263337][ T8420] __should_failslab+0xa4/0xe0 [ 291.268118][ T8420] should_failslab+0x9/0x20 [ 291.272720][ T8420] slab_pre_alloc_hook+0x3b/0xe0 [ 291.277670][ T8420] ? __alloc_skb+0xe0/0x740 [ 291.282190][ T8420] kmem_cache_alloc+0x44/0x260 [ 291.286970][ T8420] __alloc_skb+0xe0/0x740 [ 291.291314][ T8420] tipc_msg_build+0xd1/0xfb0 [ 291.295922][ T8420] ? perf_pmu_sched_task+0x180/0x180 [ 291.301222][ T8420] ? tipc_nametbl_lookup_mcast_nodes+0x3fa/0x960 [ 291.307565][ T8420] __tipc_sendmsg+0x19dd/0x2680 [ 291.312435][ T8420] ? local_bh_enable+0x30/0x30 [ 291.317208][ T8420] ? preempt_schedule_irq+0xbb/0x110 [ 291.322738][ T8420] ? wait_woken+0x170/0x170 [ 291.327254][ T8420] ? avc_has_perm+0x158/0x240 [ 291.331940][ T8420] ? __kasan_check_write+0x14/0x20 [ 291.337057][ T8420] ? _raw_spin_lock_bh+0x8e/0xe0 [ 291.341997][ T8420] ? _raw_spin_lock_irq+0xe0/0xe0 [ 291.347137][ T8420] ? __local_bh_enable_ip+0x58/0x80 [ 291.352358][ T8420] ? lock_sock_nested+0x1f1/0x290 [ 291.357389][ T8420] ? sock_init_data+0xc0/0xc0 [ 291.362068][ T8420] ? stack_trace_save+0x98/0xe0 [ 291.366919][ T8420] ? __update_load_avg_cfs_rq+0xaf/0x2f0 [ 291.372564][ T8420] tipc_sendmsg+0x55/0x70 [ 291.376904][ T8420] ? tipc_recvmsg+0x13a0/0x13a0 [ 291.381754][ T8420] ____sys_sendmsg+0x5a2/0x8c0 [ 291.386521][ T8420] ? __sys_sendmsg_sock+0x40/0x40 [ 291.391545][ T8420] ? import_iovec+0x7c/0xb0 [ 291.396054][ T8420] ___sys_sendmsg+0x1f0/0x260 [ 291.400744][ T8420] ? __sys_sendmsg+0x250/0x250 [ 291.405531][ T8420] ? update_curr+0x35f/0x5b0 [ 291.410140][ T8420] ? __update_idle_core+0x2a0/0x2a0 [ 291.415346][ T8420] ? sched_clock_cpu+0x18/0x3c0 [ 291.420218][ T8420] ? __fdget+0x1a1/0x230 [ 291.424470][ T8420] __x64_sys_sendmsg+0x1e2/0x2a0 [ 291.429406][ T8420] ? release_firmware_map_entry+0x190/0x190 [ 291.435419][ T8420] ? ___sys_sendmsg+0x260/0x260 [ 291.440269][ T8420] ? __kasan_check_write+0x14/0x20 [ 291.445395][ T8420] ? switch_fpu_return+0x15d/0x2c0 [ 291.450529][ T8420] x64_sys_call+0x4b/0x9a0 [ 291.454955][ T8420] do_syscall_64+0x4c/0xa0 [ 291.459371][ T8420] ? clear_bhb_loop+0x50/0xa0 [ 291.464220][ T8420] ? clear_bhb_loop+0x50/0xa0 [ 291.468895][ T8420] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 291.474799][ T8420] RIP: 0033:0x7f57dfb27be9 [ 291.479298][ T8420] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 291.499006][ T8420] RSP: 002b:00007f57de590038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 291.507542][ T8420] RAX: ffffffffffffffda RBX: 00007f57dfd5efa0 RCX: 00007f57dfb27be9 [ 291.515515][ T8420] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000009 [ 291.523587][ T8420] RBP: 00007f57de590090 R08: 0000000000000000 R09: 0000000000000000 [ 291.531556][ T8420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 291.539629][ T8420] R13: 00007f57dfd5f038 R14: 00007f57dfd5efa0 R15: 00007ffe0cfdeea8 [ 291.547867][ T8420] [ 291.617421][ T8428] device sit0 left promiscuous mode [ 291.713531][ T8428] device sit0 entered promiscuous mode [ 293.323091][ T8] device bridge_slave_1 left promiscuous mode [ 293.329231][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.336656][ T8] device bridge_slave_0 left promiscuous mode [ 293.342821][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.350303][ T8] device veth1_macvtap left promiscuous mode [ 293.356344][ T8] device veth0_vlan left promiscuous mode [ 293.489376][ T8437] device pim6reg1 entered promiscuous mode [ 293.621636][ T8444] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.628779][ T8444] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.636512][ T8444] device bridge_slave_0 entered promiscuous mode [ 293.643818][ T8444] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.651064][ T8444] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.658828][ T8444] device bridge_slave_1 entered promiscuous mode [ 293.693176][ T8452] device syzkaller0 entered promiscuous mode [ 294.214334][ T8444] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.221518][ T8444] bridge0: port 2(bridge_slave_1) entered forwarding state [ 294.229041][ T8444] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.236190][ T8444] bridge0: port 1(bridge_slave_0) entered forwarding state [ 294.260773][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 294.269782][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.303390][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.326106][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 294.339385][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.346551][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 294.354990][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 294.363726][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.371177][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 294.378875][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 294.387017][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 294.446780][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 294.460927][ T8444] device veth0_vlan entered promiscuous mode [ 294.525424][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 294.535149][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 294.543027][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 294.655264][ T8481] device sit0 left promiscuous mode [ 294.664171][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 294.674347][ T8485] device sit0 entered promiscuous mode [ 294.719644][ T8487] device pim6reg1 entered promiscuous mode [ 294.743051][ T8444] device veth1_macvtap entered promiscuous mode [ 294.774461][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 294.783255][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 294.791751][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 294.801694][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 294.814742][ T8492] device pim6reg1 entered promiscuous mode [ 294.820841][ T8492] FAULT_INJECTION: forcing a failure. [ 294.820841][ T8492] name failslab, interval 1, probability 0, space 0, times 0 [ 294.834101][ T8492] CPU: 1 PID: 8492 Comm: syz.0.2803 Not tainted syzkaller #0 [ 294.841579][ T8492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 294.851644][ T8492] Call Trace: [ 294.855114][ T8492] [ 294.858055][ T8492] __dump_stack+0x21/0x30 [ 294.862404][ T8492] dump_stack_lvl+0xee/0x150 [ 294.867004][ T8492] ? show_regs_print_info+0x20/0x20 [ 294.872267][ T8492] dump_stack+0x15/0x20 [ 294.876437][ T8492] should_fail+0x3c1/0x510 [ 294.880865][ T8492] __should_failslab+0xa4/0xe0 [ 294.885643][ T8492] should_failslab+0x9/0x20 [ 294.890159][ T8492] slab_pre_alloc_hook+0x3b/0xe0 [ 294.895129][ T8492] kmem_cache_alloc_trace+0x48/0x270 [ 294.900594][ T8492] ? ipv6_add_addr+0x3d6/0xd40 [ 294.905668][ T8492] ipv6_add_addr+0x3d6/0xd40 [ 294.910286][ T8492] ? ipv6_generate_stable_address+0x5e0/0x5e0 [ 294.916432][ T8492] addrconf_add_linklocal+0x21b/0x620 [ 294.921923][ T8492] ? inet6_addr_del+0x540/0x540 [ 294.926757][ T8492] ? __local_bh_enable_ip+0x58/0x80 [ 294.932109][ T8492] ? _raw_spin_unlock_bh+0x51/0x60 [ 294.937210][ T8492] ? ipv6_generate_stable_address+0x48b/0x5e0 [ 294.943371][ T8492] addrconf_addr_gen+0x468/0x5b0 [ 294.948288][ T8492] ? ip6_route_add+0x104/0x130 [ 294.953035][ T8492] ? addrconf_sysctl_register+0x1a0/0x1a0 [ 294.958735][ T8492] ? addrconf_add_dev+0x329/0x430 [ 294.963746][ T8492] ? local_bh_enable+0x30/0x30 [ 294.968555][ T8492] ? __local_bh_enable_ip+0x58/0x80 [ 294.973825][ T8492] ? addrconf_permanent_addr+0x867/0x8c0 [ 294.979519][ T8492] ? __kasan_check_read+0x11/0x20 [ 294.984522][ T8492] addrconf_init_auto_addrs+0x842/0xb90 [ 294.990043][ T8492] ? addrconf_dad_run+0x5a0/0x5a0 [ 294.995052][ T8492] ? igmpv3_del_delrec+0x700/0x700 [ 295.000269][ T8492] ? __local_bh_enable_ip+0x58/0x80 [ 295.005444][ T8492] ? _raw_spin_unlock_bh+0x51/0x60 [ 295.010723][ T8492] ? __kasan_check_write+0x14/0x20 [ 295.015815][ T8492] ? tun_sock_write_space+0x13b/0x1b0 [ 295.021167][ T8492] ? __kasan_check_write+0x14/0x20 [ 295.026269][ T8492] ? mutex_unlock+0x89/0x220 [ 295.030924][ T8492] ? __mutex_lock_slowpath+0x10/0x10 [ 295.036198][ T8492] ? macsec_notify+0xff/0x490 [ 295.040865][ T8492] ? addrconf_link_ready+0x134/0x190 [ 295.046211][ T8492] addrconf_notify+0x95d/0xde0 [ 295.050967][ T8492] raw_notifier_call_chain+0x90/0x100 [ 295.056317][ T8492] __dev_notify_flags+0x28f/0x500 [ 295.061323][ T8492] ? __dev_change_flags+0x6a0/0x6a0 [ 295.066611][ T8492] ? __dev_change_flags+0x510/0x6a0 [ 295.071817][ T8492] ? dev_get_flags+0x1e0/0x1e0 [ 295.076558][ T8492] dev_change_flags+0xe8/0x1a0 [ 295.081414][ T8492] dev_ifsioc+0x147/0xe70 [ 295.085818][ T8492] ? dev_ioctl+0xd10/0xd10 [ 295.090310][ T8492] ? __mutex_lock_slowpath+0xe/0x10 [ 295.095591][ T8492] ? mutex_lock+0x100/0x1a0 [ 295.100092][ T8492] ? wait_for_completion_killable_timeout+0x10/0x10 [ 295.106697][ T8492] ? dev_get_by_name_rcu+0xc8/0xf0 [ 295.111819][ T8492] dev_ioctl+0x560/0xd10 [ 295.116256][ T8492] sock_do_ioctl+0x22e/0x300 [ 295.121102][ T8492] ? sock_show_fdinfo+0xa0/0xa0 [ 295.125939][ T8492] ? selinux_file_ioctl+0x377/0x480 [ 295.131120][ T8492] sock_ioctl+0x4bc/0x6b0 [ 295.135435][ T8492] ? sock_poll+0x3d0/0x3d0 [ 295.139827][ T8492] ? __fget_files+0x2c4/0x320 [ 295.144496][ T8492] ? security_file_ioctl+0x84/0xa0 [ 295.149671][ T8492] ? sock_poll+0x3d0/0x3d0 [ 295.154167][ T8492] __se_sys_ioctl+0x121/0x1a0 [ 295.158896][ T8492] __x64_sys_ioctl+0x7b/0x90 [ 295.163511][ T8492] x64_sys_call+0x2f/0x9a0 [ 295.168042][ T8492] do_syscall_64+0x4c/0xa0 [ 295.172461][ T8492] ? clear_bhb_loop+0x50/0xa0 [ 295.177222][ T8492] ? clear_bhb_loop+0x50/0xa0 [ 295.181895][ T8492] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 295.187784][ T8492] RIP: 0033:0x7f740e42abe9 [ 295.192199][ T8492] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 295.211803][ T8492] RSP: 002b:00007f740ce93038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 295.220220][ T8492] RAX: ffffffffffffffda RBX: 00007f740e661fa0 RCX: 00007f740e42abe9 [ 295.228189][ T8492] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 295.236158][ T8492] RBP: 00007f740ce93090 R08: 0000000000000000 R09: 0000000000000000 [ 295.244125][ T8492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 295.252097][ T8492] R13: 00007f740e662038 R14: 00007f740e661fa0 R15: 00007ffe322c3df8 [ 295.260074][ T8492] [ 296.642752][ T8] device bridge_slave_1 left promiscuous mode [ 296.648870][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.656283][ T8] device bridge_slave_0 left promiscuous mode [ 296.662456][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.669971][ T8] device veth1_macvtap left promiscuous mode [ 296.676010][ T8] device veth0_vlan left promiscuous mode [ 297.897290][ T8512] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.909028][ T8512] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.939476][ T8512] device bridge_slave_0 entered promiscuous mode [ 297.974305][ T8512] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.009248][ T8512] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.041187][ T8512] device bridge_slave_1 entered promiscuous mode [ 298.577855][ T8536] device wg2 entered promiscuous mode [ 298.618478][ T8512] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.625606][ T8512] bridge0: port 2(bridge_slave_1) entered forwarding state [ 298.676054][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.685246][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 298.699464][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 298.730598][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 298.785464][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 298.839906][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.847063][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.860441][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 298.876575][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.883705][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 298.963911][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 298.985571][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 299.012764][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 299.027681][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 299.043611][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 299.051675][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 299.063615][ T8512] device veth0_vlan entered promiscuous mode [ 299.338341][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 299.350159][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 299.376500][ T8512] device veth1_macvtap entered promiscuous mode [ 299.857761][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 299.867930][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 299.894027][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 299.925437][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 299.935197][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 300.069813][ T8590] device sit0 left promiscuous mode [ 300.108357][ T8590] device sit0 entered promiscuous mode [ 301.802779][ T8] device bridge_slave_1 left promiscuous mode [ 301.809238][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.817012][ T8] device bridge_slave_0 left promiscuous mode [ 301.823316][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.831032][ T8] device veth1_macvtap left promiscuous mode [ 301.837064][ T8] device veth0_vlan left promiscuous mode [ 302.221833][ T8596] FAULT_INJECTION: forcing a failure. [ 302.221833][ T8596] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 302.236052][ T8598] device wg2 left promiscuous mode [ 302.256152][ T8596] CPU: 1 PID: 8596 Comm: syz.0.2832 Not tainted syzkaller #0 [ 302.263585][ T8596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 302.273652][ T8596] Call Trace: [ 302.276943][ T8596] [ 302.279877][ T8596] __dump_stack+0x21/0x30 [ 302.284230][ T8596] dump_stack_lvl+0xee/0x150 [ 302.288833][ T8596] ? show_regs_print_info+0x20/0x20 [ 302.294041][ T8596] dump_stack+0x15/0x20 [ 302.298207][ T8596] should_fail+0x3c1/0x510 [ 302.302726][ T8596] should_fail_usercopy+0x1a/0x20 [ 302.307754][ T8596] _copy_to_user+0x20/0x90 [ 302.312165][ T8596] simple_read_from_buffer+0xe9/0x160 [ 302.317625][ T8596] proc_fail_nth_read+0x19a/0x210 [ 302.322649][ T8596] ? proc_fault_inject_write+0x2f0/0x2f0 [ 302.328410][ T8596] ? security_file_permission+0x83/0xa0 [ 302.334053][ T8596] ? proc_fault_inject_write+0x2f0/0x2f0 [ 302.339680][ T8596] vfs_read+0x282/0xbe0 [ 302.343833][ T8596] ? kernel_read+0x1f0/0x1f0 [ 302.348429][ T8596] ? __kasan_check_write+0x14/0x20 [ 302.353550][ T8596] ? mutex_lock+0x95/0x1a0 [ 302.357983][ T8596] ? wait_for_completion_killable_timeout+0x10/0x10 [ 302.364653][ T8596] ? __fget_files+0x2c4/0x320 [ 302.369349][ T8596] ? __fdget_pos+0x2d2/0x380 [ 302.373960][ T8596] ? ksys_read+0x71/0x240 [ 302.378648][ T8596] ksys_read+0x140/0x240 [ 302.382896][ T8596] ? vfs_write+0xf70/0xf70 [ 302.387333][ T8596] ? sched_clock_cpu+0x18/0x3c0 [ 302.392204][ T8596] __x64_sys_read+0x7b/0x90 [ 302.396813][ T8596] x64_sys_call+0x96d/0x9a0 [ 302.401313][ T8596] do_syscall_64+0x4c/0xa0 [ 302.405731][ T8596] ? clear_bhb_loop+0x50/0xa0 [ 302.410435][ T8596] ? clear_bhb_loop+0x50/0xa0 [ 302.415124][ T8596] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 302.421100][ T8596] RIP: 0033:0x7f740e4295fc [ 302.425522][ T8596] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 302.445241][ T8596] RSP: 002b:00007f740ce93030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 302.453757][ T8596] RAX: ffffffffffffffda RBX: 00007f740e661fa0 RCX: 00007f740e4295fc [ 302.461936][ T8596] RDX: 000000000000000f RSI: 00007f740ce930a0 RDI: 0000000000000009 [ 302.470065][ T8596] RBP: 00007f740ce93090 R08: 0000000000000000 R09: 0000000000000000 [ 302.478045][ T8596] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 302.486284][ T8596] R13: 00007f740e662038 R14: 00007f740e661fa0 R15: 00007ffe322c3df8 [ 302.494441][ T8596] [ 302.679938][ T8598] device wg2 entered promiscuous mode [ 302.773096][ T8603] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.787287][ T8603] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.799285][ T8603] device bridge_slave_0 entered promiscuous mode [ 302.849509][ T8603] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.864955][ T8603] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.913756][ T8603] device bridge_slave_1 entered promiscuous mode [ 302.976483][ T8621] device sit0 left promiscuous mode [ 303.021470][ T8621] device sit0 entered promiscuous mode [ 303.040066][ T8623] device wg2 left promiscuous mode [ 303.171210][ T8630] device wg2 entered promiscuous mode [ 303.447583][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 303.465441][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 303.504665][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 303.536143][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 303.590044][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.597245][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.691028][ T8646] device veth0_vlan left promiscuous mode [ 303.742812][ T8646] device veth0_vlan entered promiscuous mode [ 303.805194][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 303.818517][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 303.847333][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 303.882046][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.889174][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.932524][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 303.948533][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 303.965037][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 304.061634][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 304.080220][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 304.097153][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 304.128376][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 304.175406][ T8603] device veth0_vlan entered promiscuous mode [ 304.189566][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 304.208755][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 304.233167][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 304.251367][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 304.271751][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 304.300104][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 304.357712][ T8662] device pim6reg1 entered promiscuous mode [ 304.391854][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 304.413706][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 304.444092][ T8603] device veth1_macvtap entered promiscuous mode [ 304.538239][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 304.563023][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 304.602522][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 304.632136][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 304.652615][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 304.759707][ T8603] syz-executor (8603) used greatest stack depth: 21120 bytes left [ 305.592854][ T8] device bridge_slave_1 left promiscuous mode [ 305.598994][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 305.606711][ T8] device bridge_slave_0 left promiscuous mode [ 305.612911][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.620431][ T8] device veth1_macvtap left promiscuous mode [ 305.626450][ T8] device veth0_vlan left promiscuous mode [ 307.323442][ T8] device bridge_slave_1 left promiscuous mode [ 307.329584][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.337108][ T8] device bridge_slave_0 left promiscuous mode [ 307.343409][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.351247][ T8] device bridge_slave_1 left promiscuous mode [ 307.357420][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.364920][ T8] device bridge_slave_0 left promiscuous mode [ 307.371166][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.379948][ T8] device veth1_macvtap left promiscuous mode [ 307.386301][ T8] device veth0_vlan left promiscuous mode [ 307.392361][ T8] device veth1_macvtap left promiscuous mode [ 307.398654][ T8] device veth0_vlan left promiscuous mode